A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya
Abstract
Keywords
References
- [1] Ernst & Young. Identity and Access Management: Beyond Compliance. Technical report. Ernst & Young, http://www.ey.com/Publication/vwLUAssets/EY_- _Evolving_identity_and_access_management/$FILE/E Y-Evolving-identity-and-access-management.pdf, 2013.
- [2] R. Wagner, “Identity and Access Management: Key Initiative Overview.” Gartner Inc., 2010.
- [3] T. Smedinghoff, “Building an Online Identity Legal Framework: The Proposed National Strategy,” The Bureau of National Affairs, USA, Report 800-372- 1033, 2010.
- [4] ISC, “PKI Assessment Guidelines.” Information Security Committee, American Bar Association, 2003.
- [5] C. M. Ringle, S. Wende, and J.-M. Becker, “SmartPLS 3,” A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2014. [Online]. Available: http://www.smartpls.com. [Accessed: 03- Jan-2015].
- [6] K. K.-K. Wong, “Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS,” Marketing Bulletin, vol. Technical Note, no. 1, 2013.
- [7] N. Merlo-Schett, M. Glinz, and A. Mukhija, “COCOMO,” presented at the Seminar on Software Cost Estimation, Zurich, Switzerland, 2002.
- [8] P. Johnson, R. Lagerstrom, M. Ekstedt, and M. Osterlind, IT Management with Enterprise Architecture. Stockholm, Sweden: Royal Institute of Technology, 2014.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Geoffrey Wekesa Chemwa
This is me
Publication Date
March 1, 2016
Submission Date
-
Acceptance Date
-
Published in Issue
Year 2016 Volume: 5 Number: 1