Comparative Analysis of E-Governance Models

Main Article Content

Ms. Vani Jain, Dr. Devesh Bandil, Sachin Jain


Online working of a government or providing its services online to its citizens at their access is known as E-Governance. E-Governance is E-Commerce tool means online accessibility of government services. The technology and the methods used in E-Governance plan provide a roadmap for well-organized delivery of services at the door step. In today’s time the development of any country depends on the uses of E-Governance and also their dispersion Development of any country can be reviewed by the extent of E-Governance in that country. Moreover, today’s government has also full confidence in E-Governance and its widespread network across the world proves it. E-government security is a key problem to confine the structure and development of E-government systems in any country over the world. E-Government security models are broadly used in the implementation and development of e-government systems. Due to the deference situation of the countries over the world there are diverse security models applied in each country. . Based on this analysis, the security requirements of the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability as well the access requirements of the roles. The overall aim of this research is to review the available existing E-governance security models, find out their merits and demerits and analysis of the available models with respect of security in E-Governance. This paper discusses about the possible threats and vulnerabilities for different data locations separately for different models. Here data are considered for four states: data in store, data in process, data in transit and data in destination.

Article Details

How to Cite
Ms. Vani Jain, Dr. Devesh Bandil, Sachin Jain. (2019). Comparative Analysis of E-Governance Models. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 5(5), 101–108. Retrieved from