Font Size: a A A

Design And Implementation Of E-government Identity Authentication System

Posted on:2011-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:J J HuangFull Text:PDF
GTID:2208360308475819Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the extent of China's modernization of the continuous development of the party and government organs at all levels of government and begin to rely on more and more office networks. However, with the scale of the network office, the security of e-government, Security issues are also increasingly prominent attention beginning. E-government involves government, business and personal confidential information, in addition to hacker attacks, virus infections, such as security threats from the network, but also from the system vulnerable to fake users log in, the unlawful alteration, such as data security threats. Therefore how to ensure that information in the access, processing and transmission of the various aspect of the confidentiality, integrity and non-repudiation to prevent leakage and falsification of information, e-government construction has undoubtedly become the key to success. Especially the one of identity authentication on the application has become the basic support services. Because the traditional means of a single certification has not meet the new demand, the need to build a more reliable authentication of the General Services system.In this thesis, in-depth analysis of the current mainstream of authentication technology based on e-government focus on authentication and authorization of the focus of the study and its security needs, the use of UML modeling methods, a certification for e-government service model. Past a single certification is different from the model in this article not only provides a wide range of authentication mechanisms, and implementation of the single-point log and integrated user management and certificate management mechanism, and the initial implementation.
Keywords/Search Tags:E-government System, Identity Authentication, PKI
PDF Full Text Request
Related items