A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords a...
Gespeichert in:
Veröffentlicht in: | Compusoft: an international journal of advanced computer technology 2019-11, Vol.8 (11), p.3477-3484 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3484 |
---|---|
container_issue | 11 |
container_start_page | 3477 |
container_title | Compusoft: an international journal of advanced computer technology |
container_volume | 8 |
creator | Moukhliss, Ghizlane Malasse, Olaf Hilali, RedaFilali Belhadaoui, Hicham |
description | Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks. |
doi_str_mv | 10.6084/ijact.v8i11.1038 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2327283464</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2327283464</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f5c2345356f685cd878b02df834be46f49dc919d96d1057315b1fe80d42603f23</originalsourceid><addsrcrecordid>eNotj81rgzAchsNgsNL1vmNgZ7tfPo3HTG0bZnVoZPRUqjFQGWtX7f7-OrbT856elwehJwJLCYq_HPtDOy5_1JGQJQGm7tCMMgoBhBE8oMUw9ABAGBUMyAwVGidmbazOsEnS3Bq7w1Ua1-Xv2BZJmuEPYze42urS4liXCdZ5gt_r18zE-C3dYZOvSl3Zso5tXaaP6N4fPodu8c85sqvUxpsgK9Ym1llwjtQYeNFSxgUT0kslWqdC1QB1XjHedFx6Hrk2IpGLpCMgQkZEQ3ynwHEqgXnK5uj5T3u-nL6v3TDu-9P18jU97qfYkE4iydkNFGZH8Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2327283464</pqid></control><display><type>article</type><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</creator><creatorcontrib>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</creatorcontrib><description>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</description><identifier>EISSN: 2320-0790</identifier><identifier>DOI: 10.6084/ijact.v8i11.1038</identifier><language>eng</language><publisher>Mumbai: COMPUSOFT, An International Journal of Advanced Computer Technology</publisher><subject>Access control ; Access to information ; Authentication ; Automobile safety ; Confidentiality ; Cryptography ; Data integrity ; Fraud ; Identity theft ; Information systems ; International conferences ; Network security ; Public Key Infrastructure ; Security ; Smart cards ; Theft</subject><ispartof>Compusoft: an international journal of advanced computer technology, 2019-11, Vol.8 (11), p.3477-3484</ispartof><rights>Copyright COMPUSOFT, An International Journal of Advanced Computer Technology Nov 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Moukhliss, Ghizlane</creatorcontrib><creatorcontrib>Malasse, Olaf</creatorcontrib><creatorcontrib>Hilali, RedaFilali</creatorcontrib><creatorcontrib>Belhadaoui, Hicham</creatorcontrib><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><title>Compusoft: an international journal of advanced computer technology</title><description>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</description><subject>Access control</subject><subject>Access to information</subject><subject>Authentication</subject><subject>Automobile safety</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Data integrity</subject><subject>Fraud</subject><subject>Identity theft</subject><subject>Information systems</subject><subject>International conferences</subject><subject>Network security</subject><subject>Public Key Infrastructure</subject><subject>Security</subject><subject>Smart cards</subject><subject>Theft</subject><issn>2320-0790</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotj81rgzAchsNgsNL1vmNgZ7tfPo3HTG0bZnVoZPRUqjFQGWtX7f7-OrbT856elwehJwJLCYq_HPtDOy5_1JGQJQGm7tCMMgoBhBE8oMUw9ABAGBUMyAwVGidmbazOsEnS3Bq7w1Ua1-Xv2BZJmuEPYze42urS4liXCdZ5gt_r18zE-C3dYZOvSl3Zso5tXaaP6N4fPodu8c85sqvUxpsgK9Ym1llwjtQYeNFSxgUT0kslWqdC1QB1XjHedFx6Hrk2IpGLpCMgQkZEQ3ynwHEqgXnK5uj5T3u-nL6v3TDu-9P18jU97qfYkE4iydkNFGZH8Q</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Moukhliss, Ghizlane</creator><creator>Malasse, Olaf</creator><creator>Hilali, RedaFilali</creator><creator>Belhadaoui, Hicham</creator><general>COMPUSOFT, An International Journal of Advanced Computer Technology</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20191101</creationdate><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><author>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f5c2345356f685cd878b02df834be46f49dc919d96d1057315b1fe80d42603f23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Access to information</topic><topic>Authentication</topic><topic>Automobile safety</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Data integrity</topic><topic>Fraud</topic><topic>Identity theft</topic><topic>Information systems</topic><topic>International conferences</topic><topic>Network security</topic><topic>Public Key Infrastructure</topic><topic>Security</topic><topic>Smart cards</topic><topic>Theft</topic><toplevel>online_resources</toplevel><creatorcontrib>Moukhliss, Ghizlane</creatorcontrib><creatorcontrib>Malasse, Olaf</creatorcontrib><creatorcontrib>Hilali, RedaFilali</creatorcontrib><creatorcontrib>Belhadaoui, Hicham</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Compusoft: an international journal of advanced computer technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Moukhliss, Ghizlane</au><au>Malasse, Olaf</au><au>Hilali, RedaFilali</au><au>Belhadaoui, Hicham</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</atitle><jtitle>Compusoft: an international journal of advanced computer technology</jtitle><date>2019-11-01</date><risdate>2019</risdate><volume>8</volume><issue>11</issue><spage>3477</spage><epage>3484</epage><pages>3477-3484</pages><eissn>2320-0790</eissn><abstract>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</abstract><cop>Mumbai</cop><pub>COMPUSOFT, An International Journal of Advanced Computer Technology</pub><doi>10.6084/ijact.v8i11.1038</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2320-0790 |
ispartof | Compusoft: an international journal of advanced computer technology, 2019-11, Vol.8 (11), p.3477-3484 |
issn | 2320-0790 |
language | eng |
recordid | cdi_proquest_journals_2327283464 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Access control Access to information Authentication Automobile safety Confidentiality Cryptography Data integrity Fraud Identity theft Information systems International conferences Network security Public Key Infrastructure Security Smart cards Theft |
title | A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T16%3A28%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20DIGITAL%20IDENTITY%20SECURITY%20MODEL%20WITH%20SMART%20CARD%20AND%20PUBLIC%20KEY%20INFRASTRUCTURE&rft.jtitle=Compusoft:%20an%20international%20journal%20of%20advanced%20computer%20technology&rft.au=Moukhliss,%20Ghizlane&rft.date=2019-11-01&rft.volume=8&rft.issue=11&rft.spage=3477&rft.epage=3484&rft.pages=3477-3484&rft.eissn=2320-0790&rft_id=info:doi/10.6084/ijact.v8i11.1038&rft_dat=%3Cproquest%3E2327283464%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2327283464&rft_id=info:pmid/&rfr_iscdi=true |