2014
DOI: 10.5120/16222-5672
|View full text |Cite
|
Sign up to set email alerts
|

Security Model in E-government with Biometric based on PKI

Abstract: With the growth of Information Technology and the Internet, governments apply the same principles and technologies that are supporting E-business revolution, to achieve similar transformation. Security becomes necessary to protect the citizens and government information.In this paper a model has been proposed to obtain security services in the E-government based on Public Key Infrastructure (PKI). To achieve more security levels, Biometrics and Hardware token are used.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The authors in [36] introduce a security model for the e-Government in United Arab Emirates (UAE) that is based on Public Key Infrastructure (PKI) (certificate and digital signature), biometrics (finger print), and hardware security tools (Tokens). Another security model for e-Government was introduced by [37] which is also based on PKI in addition to SSL channel.…”
Section: A Related Work On Security Of E-governmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [36] introduce a security model for the e-Government in United Arab Emirates (UAE) that is based on Public Key Infrastructure (PKI) (certificate and digital signature), biometrics (finger print), and hardware security tools (Tokens). Another security model for e-Government was introduced by [37] which is also based on PKI in addition to SSL channel.…”
Section: A Related Work On Security Of E-governmentsmentioning
confidence: 99%
“…It can be a user requesting a service from a Web server or a Web server requesting a service from another Web server [27]. Web services have many advantages, including multiple heterogeneous platform compatibility [28], languageindependency [36], increased information availability and ease of access [29], and maintaining up-to-date data. However, Web services do not have any predefined security model, and therefore require the additional implementation of techniques to protect exchanged information [28], as well as the deployment of a framework that enforces a strong security architecture [30].…”
Section: Introductionmentioning
confidence: 99%