Non-Repudiation Framework for E-Government Applications

被引:0
|
作者
Peiris, Hasala [1 ]
Soysa, Lakshan [1 ]
Palliyaguru, Rohana [1 ]
机构
[1] Sri Lanka CERT, 2-119A,BMICH, Bauddhaloka Mawatha 07, Colombo, Sri Lanka
关键词
non-repudiation; digital signatures; e-government; PKI;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation is an important information security service in many E-Government applications. Sri Lanka has also gradually started to provide citizen services over the Internet under the eSri Lanka Initiative. This paper presents a non-repudiation model for E-Government applications in Sri Lanka using a Public Key Infrastructure (PKI), possible problems of this model and solutions for those problems. The non-repudiation solution formulated by Sri Lanka CERT for Sri Lanka Customs is also discussed as a case study.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [1] Solution for Non-Repudiation in GSM WAP Applications
    Toma, Cristian
    Popa, Marius
    Boja, Catalin
    SEPADS 08: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 212 - 219
  • [2] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [3] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [4] TrustBuilder: A non-repudiation scheme for IoT cloud applications
    Chen, Fei
    Wang, Jiahao
    Li, Jianqiang
    Xu, Yang
    Zhang, Cheng
    Xiang, Tao
    Computers and Security, 2022, 116
  • [5] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [6] A Security Framework with Strong Non-repudiation and Privacy in VANETs
    Choi, Jaeduck
    Jung, Souhwan
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 835 - 839
  • [7] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [8] TrustBuilder: A non-repudiation scheme for IoT cloud applications
    Chen, Fei
    Wang, Jiahao
    Li, Jianqiang
    Xu, Yang
    Zhang, Cheng
    Xiang, Tao
    COMPUTERS & SECURITY, 2022, 116
  • [9] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [10] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73