Non-Repudiation Framework for E-Government Applications

被引:0
|
作者
Peiris, Hasala [1 ]
Soysa, Lakshan [1 ]
Palliyaguru, Rohana [1 ]
机构
[1] Sri Lanka CERT, 2-119A,BMICH, Bauddhaloka Mawatha 07, Colombo, Sri Lanka
关键词
non-repudiation; digital signatures; e-government; PKI;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation is an important information security service in many E-Government applications. Sri Lanka has also gradually started to provide citizen services over the Internet under the eSri Lanka Initiative. This paper presents a non-repudiation model for E-Government applications in Sri Lanka using a Public Key Infrastructure (PKI), possible problems of this model and solutions for those problems. The non-repudiation solution formulated by Sri Lanka CERT for Sri Lanka Customs is also discussed as a case study.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [21] A Signature Scheme with Non-Repudiation
    XIN Xiangjun~ 1
    2.Department of Information and Computing Science
    Wuhan University Journal of Natural Sciences, 2006, (05) : 1249 - 1252
  • [22] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [23] Non-repudiation and the metaphysics of presence
    Roe, Michael
    SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [24] A non-repudiation message transfer protocol for e-commerce
    Yang, S
    Su, SYW
    Lam, H
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 320 - 327
  • [25] Non-repudiation in Ad Hoc Networks
    Tandel, Purvi
    Valiveti, Sharada
    Agrawal, K. P.
    Kotecha, K.
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 405 - 415
  • [26] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
  • [27] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [28] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [29] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [30] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129