{"title":"Developing an implementation model and Architecture Standard Digital ID","authors":"C. Carreto, Manuel A. Diaz, B. Carvajal","doi":"10.1109/ROPEC.2016.7830641","DOIUrl":null,"url":null,"abstract":"In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly meeting the most important security requirements for the unambiguous identification of its owner and bring in the aspect of securing the services and who is required evaluations validate. An analysis of the technologies involved are also presented, the problems which may face who want to implement this model, recommendations and possible alternatives to the development of a system for identification and authentication.","PeriodicalId":166098,"journal":{"name":"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","volume":"827 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROPEC.2016.7830641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly meeting the most important security requirements for the unambiguous identification of its owner and bring in the aspect of securing the services and who is required evaluations validate. An analysis of the technologies involved are also presented, the problems which may face who want to implement this model, recommendations and possible alternatives to the development of a system for identification and authentication.