CFP last date
20 May 2024
Reseach Article

Security Model in E-government with Biometric based on PKI

by Jaafar Th Jaafar, Nermin Hamza, Bahaa Eldin M. Hassan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 6
Year of Publication: 2014
Authors: Jaafar Th Jaafar, Nermin Hamza, Bahaa Eldin M. Hassan
10.5120/16222-5672

Jaafar Th Jaafar, Nermin Hamza, Bahaa Eldin M. Hassan . Security Model in E-government with Biometric based on PKI. International Journal of Computer Applications. 93, 6 ( May 2014), 33-39. DOI=10.5120/16222-5672

@article{ 10.5120/16222-5672,
author = { Jaafar Th Jaafar, Nermin Hamza, Bahaa Eldin M. Hassan },
title = { Security Model in E-government with Biometric based on PKI },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 6 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number6/16222-5672/ },
doi = { 10.5120/16222-5672 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:19.775917+05:30
%A Jaafar Th Jaafar
%A Nermin Hamza
%A Bahaa Eldin M. Hassan
%T Security Model in E-government with Biometric based on PKI
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 6
%P 33-39
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growth of Information Technology and the Internet, governments apply the same principles and technologies that are supporting E-business revolution, to achieve similar transformation. Security becomes necessary to protect the citizens and government information. In this paper a model has been proposed to obtain security services in the E-government based on Public Key Infrastructure (PKI). To achieve more security levels, Biometrics and Hardware token are used.

References
  1. RICHARD HEEKS ,I Government, Centre for Development Informatics, Institute for Development Policy and Management, SED University of Manchester, Arthur Lewis Building, Manchester, M13 9PL, UK,2010.
  2. NATIONAL PKI: THE FOUNDATION OF TRUST IN GOVERNMENT , Symantec World Headquarters 350 Ellis St. (2011).
  3. D. Richard Kuhn, Vincent C. Hu, W. Timothy Polk, Shu-Jen Chang, "Introduction to Public Key Technology and the Federal PKI Infrastructure", National Institute of Standards and Technology, 26 February 2001.
  4. Matti Järvinen, PKI Requirements for IPsec, helsinki university of technology department of computer science and engineering,2003.
  5. RFC 2104 HMAC: Keyed-Hashing for MessageAuthentication. http://www. ietf. org/rfc/rfc2104. txt, visited Jun. 2014.
  6. Lee A. Guideline for implementing cryptography in the Federal Government, NIST SP 800-21. National Institute of Standards and Technology November, 1999.
  7. Anil Jain, 50 Years of Biometric Research : Almost solved, The unsolved, and the Unexplored, Michigan State University ,Jun 5,2013.
  8. Biometric-S-2013, [Online] Retrieved from:http://www. biometric-security-devices. com/facial-biometrics. html,Facial Biometrics An Excellent Time Attendance And Tracking Option, [Accessed: 2 NOV 2013].
  9. Jacob KOHNSTAMM, Done at Brussels, on 27 April 2012,Opinion 3/2012 on developments in biometric technologies, Website: http://ec. europa. eu/justice/data-protection/index_en. htm.
  10. Ali Shayan, BehnamAbdi, and MaliheQeisari,,identify the importance of information security requirements during each stage of the e-government maturity, 2008.
  11. Phi1D'Angio . PanosVassilliadas• Phaidon Kaklamanis, PKI - Crawling Out of the Grave &Into the Arms of Government,2010.
  12. ali m. al-khouri, pki in government identity management systems , Emirates Identity Authority, Abu Dhabi, United Arab Emirates. ali. alkhouri@emiratesid. ae,2011 DaeyoungHeo and Suntae Hwang, Proposed to Adapt Reliability of National PKI to Grid Security Infrastructure by Credential Translation and Delegation with OAuth, International Journal of Security and Its Applications, Vol. 6, No. 3, July, 2012.
  13. Ali M. Al-Khouri, eGovernment Strategies The Case of the United Arab Emirates (UAE), European Journal of ePractice • www. epracticejournal. eu,Nº 17 • September 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Security Token Biometric Cryptography