Securing e-Government and e-Voting with an open cloud computing architecture

نویسندگان

  • Dimitrios Zissis
  • Dimitrios Lekkas
چکیده

Available online 12 March 2011

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

E-Voting security system through Biometric Cloud Computing Integration with virtual server application

Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based computing through biometrics then it will create more authentication, transparency and security in voting system. To operate e-voting manag...

متن کامل

بررسی تأثیرات رایانش ابری بر یادگیری الکترونیکی

In the world of training, online training is introduced as a modern model of training services. Cloud computing is a modern technology which is provided software, infrastructure and platform as internet. Also, online training is introduced as a modern model of training services on the web. In this research, the impact of cloud computing on e-learning on the case of Mehralborz online university ...

متن کامل

Cloud Computing for Secure Services in E-Government Architecture

E-government tries to take advantage of new technology to provide better service to citizens. Some of the main challenges in the face of E-government are query processing high volume applications, data center management, data security and E-government services. Cloud computing can be a good option for responding to these issues and fixing them, and guarantee the realization of E-government, wit...

متن کامل

Using Cloud Computing for E-Government: Challenges and Benefits

Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture. And its aim is to provide computing, communication and storage resources in a safe environment based on service, as fast as possible, which is virtually provided via Internet platform. Con...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Government Information Quarterly

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2011