Design of an E-Administration Platform and Its Cryptography-Based Security Model

نویسندگان

چکیده

E-administration is performing administrative works via computer and its associated technologies such as the Internet. It efforts that center on exchange of information providing services to people business sector at high speed low cost through computers networks with assurance maintaining security. based positive investment in technology communication practices. This paper presents design e-administration platform adopts concept cryptography for identity management. The architectural framework comprises subcomponents service forms identification, process redesign, architecture, amalgamation, deployment. model securing was designed combination authentication criteria presented Rijndael-Advanced Encryption Standard (AES), Lattice-based (LBC), Secure Hash Algorithm (SHA512). required a record be encrypted prior commitment database double encryption method. AES algorithm-based encryption’s output will form input LBC algorithm obtain final output.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

15 صفحه اول

Multi-instance Security and Its Application to Password-Based Cryptography

This paper develops a theory of multi-instance (mi) security and applies it to provide the firstproof-based support for the classical practice of salting in password-based cryptography. Mi-securitycomes into play in settings (like password-based cryptography) where it is computationally feasible tocompromise a single instance, and provides a second line of defense, aiming to ensure ...

متن کامل

design of an analog fuzzy logic controller chip

fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...

15 صفحه اول

Design and Validation of an Instructional Design Model for Reflection-Based Learning Environments 

Design and Validation of an Instructional Design Model for Reflection-Based Learning Environments   E. Azimi, Ph.D.* J. Haatami, Ph.D.** H. FarDaanesh, Ph.D.*** O. Noroozi, Ph.D.****   Reflection on teaching is a known method of learning to teach. Reflection is a form of thinking wherein improvement is sought through self-observation. Recent approaches to teaching practicums have gravi...

متن کامل

simulation and design of electronic processing circuit for restaurants e-procurement system

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of computer and communications

سال: 2023

ISSN: ['2327-5219', '2327-5227']

DOI: https://doi.org/10.4236/jcc.2023.114008