Font Size: a A A

E-government Authentication Technology Theory And Practice

Posted on:2006-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:S J GuoFull Text:PDF
GTID:2206360152488115Subject:Business management
Abstract/Summary:PDF Full Text Request
Along with the development of Information Technology, especially in network field, the way of information transference, communication and organization of social management have varied deeply from thousands of years ago. Still, social life and the government operation have been affected dramatically. In information-based procedure of country economy and society government informationization locates in the core because of its chief position and special roles. Government depends heavily on information. In order to face to the challenge of information society, many countries and districts expand infrastructure of information actively, meanwhile dedicate to government informationization. They benefit a lot from innovation of government section and establishing e-government.E-government supports the whole society with management and service of high quality, transparent policy and full orientation under internet techniques. The nature of e-government demands both secrecy and publicity, therefore, security is a key point. Except the safety of hardware, how to secure the secrecy, integrality, reality and irresistibility of information transportation appears to be the chief problem. PKI is a basic platform for safe internet corresponding. It obeys the standard public key encryption technique. PKI's main part is the third part CA, which represents authority, reliability and equity. Users can employ digital certificate issued by CA center to solve problems. This certificate can ensure the reality of both parties' status in activities. ,This dissertation covers the fundamental theories of PKI system and the role of CA center and digital certificate applied in e-government authentication. The first chapter introduces e-government's basic knowledge; the second part discusses the security requirement of e-government on customer's point of view; the third part focuses on the chief technique in PKI system like encrypt and decrypt arithmetic, digital signature etc. Then try to describe how to apply these means; in the fourth part, addressing the basic context of CA center and digital certificate. Figuring outthe important role of CA center during e-government authentication; the fifth part offers a sample-examination and approval on internet to explain how to wield PKI system in a real e-government activity.
Keywords/Search Tags:E-government, CA center, Security authentication, Digital certificate
PDF Full Text Request
Related items