<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chun-Ta Li</style></author><author><style face="normal" font="default" size="100%">Jau-Ji Shen</style></author><author><style face="normal" font="default" size="100%">Yen-Ping Chu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges in E-Government and Security of Information</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Success</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">Factor</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">9-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to the advances made in Information and Communication Technologies (ICT), e-Government users can easily use the available services from places and at time that are convenient to them through WWW browsers. To easily and securely provide the required services through Information Technology (IT) has been an important issue in e-Government. In this article, the authors propose an explicit classification of e-Government applications and some challenges and obstacles in e-Government considered from four perspectives. Finally, a comprehensive view of some critical success factors in e-Government is proposed.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iuon-Chang Lin</style></author><author><style face="normal" font="default" size="100%">Hsia-Hung Ou</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two Secure Transportation Schemes for Mobile Agents</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Mobile agents</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">secure transportation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">87-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Mobile agents are a new emerging popular research topic. Nowadays, the mobile agents are widely spread and implemented on the Internet. Application areas of mobile agents include electronic commerce, electronic marketing, enterprise information systems, etc. Since all the information about a mobile agent is transported over the Internet, the security policies become very important. However, the transportation security is usually neglected. In this paper, we propose two secure transportation schemes for mobile agents. They can prevent all possible attacks during the process of transporting agents. Furthermore, users can choose the best transportation scheme according to the system's scale.</style></abstract></record></records></xml>