A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE

Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Compusoft: an international journal of advanced computer technology 2019-11, Vol.8 (11), p.3477-3484
Hauptverfasser: Moukhliss, Ghizlane, Malasse, Olaf, Hilali, RedaFilali, Belhadaoui, Hicham
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3484
container_issue 11
container_start_page 3477
container_title Compusoft: an international journal of advanced computer technology
container_volume 8
creator Moukhliss, Ghizlane
Malasse, Olaf
Hilali, RedaFilali
Belhadaoui, Hicham
description Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.
doi_str_mv 10.6084/ijact.v8i11.1038
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2327283464</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2327283464</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f5c2345356f685cd878b02df834be46f49dc919d96d1057315b1fe80d42603f23</originalsourceid><addsrcrecordid>eNotj81rgzAchsNgsNL1vmNgZ7tfPo3HTG0bZnVoZPRUqjFQGWtX7f7-OrbT856elwehJwJLCYq_HPtDOy5_1JGQJQGm7tCMMgoBhBE8oMUw9ABAGBUMyAwVGidmbazOsEnS3Bq7w1Ua1-Xv2BZJmuEPYze42urS4liXCdZ5gt_r18zE-C3dYZOvSl3Zso5tXaaP6N4fPodu8c85sqvUxpsgK9Ym1llwjtQYeNFSxgUT0kslWqdC1QB1XjHedFx6Hrk2IpGLpCMgQkZEQ3ynwHEqgXnK5uj5T3u-nL6v3TDu-9P18jU97qfYkE4iydkNFGZH8Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2327283464</pqid></control><display><type>article</type><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</creator><creatorcontrib>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</creatorcontrib><description>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</description><identifier>EISSN: 2320-0790</identifier><identifier>DOI: 10.6084/ijact.v8i11.1038</identifier><language>eng</language><publisher>Mumbai: COMPUSOFT, An International Journal of Advanced Computer Technology</publisher><subject>Access control ; Access to information ; Authentication ; Automobile safety ; Confidentiality ; Cryptography ; Data integrity ; Fraud ; Identity theft ; Information systems ; International conferences ; Network security ; Public Key Infrastructure ; Security ; Smart cards ; Theft</subject><ispartof>Compusoft: an international journal of advanced computer technology, 2019-11, Vol.8 (11), p.3477-3484</ispartof><rights>Copyright COMPUSOFT, An International Journal of Advanced Computer Technology Nov 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Moukhliss, Ghizlane</creatorcontrib><creatorcontrib>Malasse, Olaf</creatorcontrib><creatorcontrib>Hilali, RedaFilali</creatorcontrib><creatorcontrib>Belhadaoui, Hicham</creatorcontrib><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><title>Compusoft: an international journal of advanced computer technology</title><description>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</description><subject>Access control</subject><subject>Access to information</subject><subject>Authentication</subject><subject>Automobile safety</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Data integrity</subject><subject>Fraud</subject><subject>Identity theft</subject><subject>Information systems</subject><subject>International conferences</subject><subject>Network security</subject><subject>Public Key Infrastructure</subject><subject>Security</subject><subject>Smart cards</subject><subject>Theft</subject><issn>2320-0790</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotj81rgzAchsNgsNL1vmNgZ7tfPo3HTG0bZnVoZPRUqjFQGWtX7f7-OrbT856elwehJwJLCYq_HPtDOy5_1JGQJQGm7tCMMgoBhBE8oMUw9ABAGBUMyAwVGidmbazOsEnS3Bq7w1Ua1-Xv2BZJmuEPYze42urS4liXCdZ5gt_r18zE-C3dYZOvSl3Zso5tXaaP6N4fPodu8c85sqvUxpsgK9Ym1llwjtQYeNFSxgUT0kslWqdC1QB1XjHedFx6Hrk2IpGLpCMgQkZEQ3ynwHEqgXnK5uj5T3u-nL6v3TDu-9P18jU97qfYkE4iydkNFGZH8Q</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Moukhliss, Ghizlane</creator><creator>Malasse, Olaf</creator><creator>Hilali, RedaFilali</creator><creator>Belhadaoui, Hicham</creator><general>COMPUSOFT, An International Journal of Advanced Computer Technology</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20191101</creationdate><title>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</title><author>Moukhliss, Ghizlane ; Malasse, Olaf ; Hilali, RedaFilali ; Belhadaoui, Hicham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f5c2345356f685cd878b02df834be46f49dc919d96d1057315b1fe80d42603f23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Access to information</topic><topic>Authentication</topic><topic>Automobile safety</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Data integrity</topic><topic>Fraud</topic><topic>Identity theft</topic><topic>Information systems</topic><topic>International conferences</topic><topic>Network security</topic><topic>Public Key Infrastructure</topic><topic>Security</topic><topic>Smart cards</topic><topic>Theft</topic><toplevel>online_resources</toplevel><creatorcontrib>Moukhliss, Ghizlane</creatorcontrib><creatorcontrib>Malasse, Olaf</creatorcontrib><creatorcontrib>Hilali, RedaFilali</creatorcontrib><creatorcontrib>Belhadaoui, Hicham</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Compusoft: an international journal of advanced computer technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Moukhliss, Ghizlane</au><au>Malasse, Olaf</au><au>Hilali, RedaFilali</au><au>Belhadaoui, Hicham</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE</atitle><jtitle>Compusoft: an international journal of advanced computer technology</jtitle><date>2019-11-01</date><risdate>2019</risdate><volume>8</volume><issue>11</issue><spage>3477</spage><epage>3484</epage><pages>3477-3484</pages><eissn>2320-0790</eissn><abstract>Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the mechanism of cryptography. However, passwords are no longer an effective way to ensure digital identity security for access to digital services within a university. Yet, the use of PKI smart cards is appropriate for strong authentication. In this article, we present the deployment of our security solution, its reinforcement as well as the implementation of some attack scenarios. Our main objective is to ensure access control, authentication and prevent identity theft attacks.</abstract><cop>Mumbai</cop><pub>COMPUSOFT, An International Journal of Advanced Computer Technology</pub><doi>10.6084/ijact.v8i11.1038</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier EISSN: 2320-0790
ispartof Compusoft: an international journal of advanced computer technology, 2019-11, Vol.8 (11), p.3477-3484
issn 2320-0790
language eng
recordid cdi_proquest_journals_2327283464
source EZB-FREE-00999 freely available EZB journals
subjects Access control
Access to information
Authentication
Automobile safety
Confidentiality
Cryptography
Data integrity
Fraud
Identity theft
Information systems
International conferences
Network security
Public Key Infrastructure
Security
Smart cards
Theft
title A DIGITAL IDENTITY SECURITY MODEL WITH SMART CARD AND PUBLIC KEY INFRASTRUCTURE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T16%3A28%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20DIGITAL%20IDENTITY%20SECURITY%20MODEL%20WITH%20SMART%20CARD%20AND%20PUBLIC%20KEY%20INFRASTRUCTURE&rft.jtitle=Compusoft:%20an%20international%20journal%20of%20advanced%20computer%20technology&rft.au=Moukhliss,%20Ghizlane&rft.date=2019-11-01&rft.volume=8&rft.issue=11&rft.spage=3477&rft.epage=3484&rft.pages=3477-3484&rft.eissn=2320-0790&rft_id=info:doi/10.6084/ijact.v8i11.1038&rft_dat=%3Cproquest%3E2327283464%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2327283464&rft_id=info:pmid/&rfr_iscdi=true