SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Mwakalinga G Jeffy) "

Sökning: WFRF:(Mwakalinga G Jeffy)

  • Resultat 1-10 av 19
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Karokola, Geoffrey Rwezaura, et al. (författare)
  • Secure e-Government Adoption: A Case Study of Tanzania
  • 2011
  • Ingår i: Proceedings of the European Security Conference (ESC 2011), Örebro, Sweden. ; , s. 18-32
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a case study for secure e-government services adoption in Tanzania, where four organizations are studied. In the process, to compare the adoption process both private and public organizations were critically studied. The study utilizes a mixed research method that combines the use of both qualitative and quantitative methods for questionnaire preparation, data collection, and processing and analysis. The study also reviewed different adoption models, where seven hypotheses were constructed. The results show that out of the seven constructed hypothesis four were supported: Perceived usefulness has a positive influence on the behavioral intention and use of e-government services; perceived trust has a positive influence on the behavioral intention of a user on the usage of e-government service; higher levels of perceived IT security has a positive and significant effect on perceived trust; and behavioral intention has a direct and positive effect on the actual usage and adoption of technology of e-government services. Also, we found that private organization appears to be earlier adopters of technology and offers more secure e-services sooner than public organizations.
  •  
2.
  • Mwakalinga, G. Jeffy, et al. (författare)
  • A Holistic and Immune System inspired Security Framework
  • 2009
  • Ingår i: International Conference on Information Security and Privacy (ISP-09).
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a Framework for adaptive information security systems for securing information systems. Information systems today are vulnerable and not adaptive to the dynamic environments because initial development of these systems focused on computer technology and communications protocol only. Most research in information security does not consider culture of users, system environments and does not pay enough attention to the enemies of information systems. As a result, users serve technology instead of technology serving users. We apply the Systemic-Holistic Approach, the living systems theory, the Immune system, Systems theory, Cybernetics, and Socio-Technical systems to provide adaptability features, to consider culture of users and system environments in developing and designing information security systems. We apply socio-technical measures to secure the weak links in information security systems that have been created by culture of users. This security framework will help researchers and designers consider not only communication protocols and technology but also values of people like culture, legal, and traditions; environments where information systems run; and adaptive features in information security systems
  •  
3.
  • Mwakalinga, G Jeffy, et al. (författare)
  • A Holistic and Immune System inspired Security Framework
  • 2009
  • Ingår i: International Conference on Information Security and Privacy (ISP-09). - 7050 South Kirkman Road Orlando, FL, 32819-8284, USA : International Conference on Information Security and Privacy (ISP-09).
  • Konferensbidrag (refereegranskat)
  •  
4.
  •  
5.
  • Mwakalinga, G Jeffy, et al. (författare)
  • Applying the new Security Framework for Telemedicine
  • 2009
  • Ingår i: Proceedings for E-asia conference 2009. - Bandaranaike Memorial International Conference Hall (BMICH),Colombo, Sri Lanka. : E-Asia.
  • Konferensbidrag (refereegranskat)
  •  
6.
  • Mwakalinga, G Jeffy, et al. (författare)
  • Framework for Securing Mobile Software Agents
  • 2006
  • Ingår i: Proceedings of the ISSA 2006 from Insight to Foresight Conference. - : ACM Sigmod.
  • Konferensbidrag (refereegranskat)abstract
    • Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems provide intrusion detection, prevention, protection, response, and recovery services but most of these services are manual and the reaction time is usually from a number of hours to days depending on the complexity of the systems. There are efforts of using mobile software agents to provide these services automatically, thereby reducing reaction time, but the technology is not widely accepted due to security issues of mobile agents. In this work, we have created a framework for securing mobile software agents in information systems. Communication security between platforms, protection of the baggage carried by agents, and protection of agents are provided. The framework has five components: deterrence, protection, detection, response and recovery sub-systems. The framework has been partially implemented and has an interface for administrators, monitored systems, NIST vulnerability database, patches‘ database, sensors, and Secure Mobile agents Run-Time System. This framework provides security for mobile agents at different levels and this increases trust in agents‘ technology. The response time, after intrusions are detected, is shortened. The framework helps systems to adapt by improving the performance of new generations of agents.
  •  
7.
  • Mwakalinga, G Jeffy, et al. (författare)
  • Framework for Securing Mobile Software Agents
  • 2006
  • Ingår i: Proceedings of the ISSA 2006 from Insight to Foresight Conference. - : ACM Sigmod. - 1868546365
  • Konferensbidrag (refereegranskat)
  •  
8.
  • Mwakalinga, G. Jeffy, et al. (författare)
  • Integrated Security System for E-Government based on SAML Standard
  • 2004
  • Ingår i: Proceedings of Information Security South Africa ISSA2004.
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes an integrated security system for electronic-government services. Many governments are transforming manual government services to electronic government services. This transformation is in most cases done without involving users of the services. This makes users of these services have little trust in the e-government. Security is in most cases not addressed from the early stages of e-government development. Some governments depend on security solutions from private vendors and these governments do not have full control of security. E-government services have different levels of classification and so they require different types of authentication and authorization methods. Most e-government systems today use one form of authentication in all types of services without considering the different sensitivity levels. All countries have different levels of e-literacy and users with low levels of e-literacy do not understand some of today‘s e-government security systems. This security system provides multiple authentication methods. Some e-government services require simple authentication while other highly classified transactions demand strong authentication. This security system provides multiple authorization schemes, information integrity schemes and digital signature schemes. These schemes can be configured to accommodate different e-literacy levels. The system integrates a registration system, a certification system, an authorization system, and a smart card system. It bases on the Security Assertion Markup Language (SAML) standard, which is an XML-based framework for exchanging security information. The system can be integrated in existing e-government systems and can be built-in in new e-government systems. Information of different levels of classification can be stored in same websites and can be accessed through multiple authentication and authorization methods. This system enables the society to perform secure e-government transactions and accommodates different e-literacy levels.
  •  
9.
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 19

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy