DocumentCode :
3575249
Title :
Implementation issues and challenges with PKI infrastructure and its integration with in-house developed IT applications
Author :
Jain, Alok ; Khare, Gitika ; Rajan, Alpana ; Manjhi, Nirmala ; Pathy, Diptikant ; Rawat, Anil
Author_Institution :
Dept. of Atomic Energy, Raja Ramanna Centre for Adv. Technol., Indore, India
fYear :
2014
Firstpage :
1
Lastpage :
5
Abstract :
Rapid deployment of e-governance applications emphasis on need for security and authentication. Many emerging technologies are being developed to fulfil security requirements. The major concern in e-governance transactions is the need for replacement of hand-written signature with an `online´ signature. Further, since web enabled applications are prone to various types of security breaches, the discussion on robust and authenticated e-governance transactions is incomplete without consideration of `security´ as a prominent aspect of `online signatures´. An e-signature may be considered as a type of electronic authentication which can be achieved by means of different types of technologies. Today there are wide range of technologies, products and solutions for securing the electronic infrastructure of any organization. The levels of security implemented should be commensurate with the level of complexity of the organizational data and applications in use. To operate critical web enabled applications, organizations need high-level, certificate-based security provided by a Public Key Infrastructure (PKI). PKI protects applications that demand the highest level of security, web services based business process automation, digital form signing and electronic commerce. PKI is a consistently evolving security process in government and ecommerce. It is the most appropriate security mechanism for securing data, identifying users, and establishing a chain of trust to secure electronic infrastructure. PKI integrates digital identities and signatures to present an end-to-end trust model. This paper discusses the issues and challenges associated with setting up in-house certifying authority and integrating PKI functionality into in-house developed IT applications in our organization.
Keywords :
Web services; digital signatures; public key cryptography; PKI infrastructure; Web services based business process automation; digital form signing; e-governance applications; e-signature; electronic authentication; electronic commerce; hand-written signature; in-house developed IT applications; online signatures´; public key infrastructure; security breaches; security requirements; web enabled applications; Authorization; Browsers; Cryptography; Databases; Organizations; Reliability; Servers; Digital Signature Certificate; Digital Signing; Oracle Certifying Authority; PKI; Workflow;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
IT in Business, Industry and Government (CSIBIG), 2014 Conference on
Print_ISBN :
978-1-4799-3063-0
Type :
conf
DOI :
10.1109/CSIBIG.2014.7056939
Filename :
7056939
Link To Document :
بازگشت