Please use this identifier to cite or link to this item:
https://rfos.fon.bg.ac.rs/handle/123456789/627Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.creator | Milovanović, Miloš | |
| dc.creator | Bogićević Sretenović, Marija | |
| dc.creator | Lazović, Miroslav | |
| dc.creator | Simić, Dejan | |
| dc.creator | Starčević, Dušan | |
| dc.date.accessioned | 2023-05-12T10:14:41Z | - |
| dc.date.available | 2023-05-12T10:14:41Z | - |
| dc.date.issued | 2010 | |
| dc.identifier.uri | https://rfos.fon.bg.ac.rs/handle/123456789/627 | - |
| dc.description.abstract | E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. Application of electronic approach in completing an e-Procurement process opens up a lot of issues regarding security. The transparent nature of the process at hand is requiring a sophisticated security system. Unauthorized access or different kinds of intrusion present a legitimate threat. On the other hand, the attempt to develop such a system in developing countries like Serbia may face many difficulties. Some of the difficulties may be caused by legal obstacles, technical weaknesses, or human resistance towards change. This paper presents a review of authentication techniques used in the European e-Government systems and according to that this paper is focused on the methods we used to overcome those difficulties, as well as on the provision of a strong security system that would guarantee the protection of sensitive data. | en |
| dc.publisher | IEEE Computer Soc, Los Alamitos | |
| dc.rights | restrictedAccess | |
| dc.source | Fifth International Conference on Availability, Reliability, and Security: Ares 2010, Proceedings | |
| dc.subject | Security | en |
| dc.subject | public services | en |
| dc.subject | e-Procurement | en |
| dc.subject | e-Government | en |
| dc.subject | Authentication | en |
| dc.title | Choosing Authentication Techniques in e-Procurement System in Serbia | en |
| dc.type | conferenceObject | |
| dc.rights.license | ARR | |
| dc.citation.epage | 379 | |
| dc.citation.other | : 374-379 | |
| dc.citation.spage | 374 | |
| dc.identifier.doi | 10.1109/ARES.2010.82 | |
| dc.identifier.rcub | conv_1256 | |
| dc.identifier.scopus | 2-s2.0-77952338697 | |
| dc.identifier.wos | 000278197800054 | |
| dc.type.version | publishedVersion | |
| item.cerifentitytype | Publications | - |
| item.fulltext | With Fulltext | - |
| item.grantfulltext | restricted | - |
| item.openairetype | conferenceObject | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| Appears in Collections: | Radovi istraživača / Researchers’ publications | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 623.pdf Restricted Access | 670.34 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.