Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security Architecture of the Austrian Citizen Card Concept
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Hi-index | 0.00 |
The frequent developments in the field of Information and Communication Technologies impel the governments around the world to provide online services to facilitate the citizens. The gentle move of the governments from traditional approaches of providing services towards online interaction with the citizens bring along additional challenges. Some of these challenges like uniquely identifying citizens and authenticating them before providing online services needs to be addressed. As private credentials of citizens are exchanged between different organizations for rendering different services the integrity of the platforms on these organizations also needs to be verified. This ensures that the user's credentials will not be compromised. Trusted Computing Group has defined an open set of specifications for the establishment of trustworthiness among different participants through a hardware root-of-trust. In this paper we present an identity management architecture for e-government processes in Pakistan, which uses the concept of electronic identity based on Public Key Infrastructure as a substitute to the password based authentication system. We present the concept of electronic signatures which is an alternative to the handwritten signatures. We also include measuring the integrity of different platforms involved in e-government processes as a design goal. The integrity measurement provides a mechanism for establishment of trust on these platforms.