{"title":"开发实现模型和体系结构标准数字标识","authors":"C. Carreto, Manuel A. Diaz, B. Carvajal","doi":"10.1109/ROPEC.2016.7830641","DOIUrl":null,"url":null,"abstract":"In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly meeting the most important security requirements for the unambiguous identification of its owner and bring in the aspect of securing the services and who is required evaluations validate. An analysis of the technologies involved are also presented, the problems which may face who want to implement this model, recommendations and possible alternatives to the development of a system for identification and authentication.","PeriodicalId":166098,"journal":{"name":"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","volume":"827 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Developing an implementation model and Architecture Standard Digital ID\",\"authors\":\"C. Carreto, Manuel A. Diaz, B. Carvajal\",\"doi\":\"10.1109/ROPEC.2016.7830641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly meeting the most important security requirements for the unambiguous identification of its owner and bring in the aspect of securing the services and who is required evaluations validate. An analysis of the technologies involved are also presented, the problems which may face who want to implement this model, recommendations and possible alternatives to the development of a system for identification and authentication.\",\"PeriodicalId\":166098,\"journal\":{\"name\":\"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)\",\"volume\":\"827 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ROPEC.2016.7830641\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROPEC.2016.7830641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Developing an implementation model and Architecture Standard Digital ID
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly meeting the most important security requirements for the unambiguous identification of its owner and bring in the aspect of securing the services and who is required evaluations validate. An analysis of the technologies involved are also presented, the problems which may face who want to implement this model, recommendations and possible alternatives to the development of a system for identification and authentication.