![](/images/graphics-bg.png)
Amal authentication architectural model "3AM" : for secure information exchange
مقدم أطروحة جامعية
مشرف أطروحة جامعية
al-Umari, Husayn Yusuf
Qaddurah, Imad
أعضاء اللجنة
al-Jabir, Ahmad Awdah
al-Uqayli, Salih
al-Sarhan, Sami
الجامعة
الأكاديمية العربية للعلوم المالية و المصرفية
الكلية
كلية نظم و تكنولوجيا المعلومات
دولة الجامعة
الأردن
الدرجة العلمية
دكتوراه
تاريخ الدرجة العلمية
2004
الملخص الإنجليزي
The key enabler to E-Government implementation is trust, and trust is built gradually between the communicating parties.
Trust was defined by different disciplines; the basis of employing trust in the cyberspace is the information technology security.
Existing trust model can benefit from additional security services to enable a more secure message exchange.
Currently, messages are not controlled; once sent it is impossible to revoke.
Therefore, this may cause un-secure working environment.
In addition, a communication exchange uses the same encryption technique for the duration of the session.
This gives higher probability for security vulnerabilities.
This work came to provide the suitable solution to E-Government implementations by enabling enhanced trust; via designing a new paradigm in authentication protocols, called Ama Authentication Architectural Model or 3AM.
The 3AM represents a new paradigm in the information security for many reasons, mainly, the 3AM allows message control mechanism after the message being sent, the 3AM authenticates messages as if it is a resource, the 3AM preserves message security and confidentiality by having message exchange directly between the sender and receiver without a third party, and the 3AM represents a new implementation of open crypto, the model is flexible, modular, could be used in many applications like E-Government, E-commerce, E-business mobile telephone systems, and other e-initiatives.
In addition, the 3AM overcomes cultural barriers of the E-government practices and provides mean of secure information exchange for all types of messages (i.e.
multi-media) in the working environment.
3AM modularity allows it be a plug and play model since it works with any existing security service.
Therefore, 3AM truly enhances the trust model by allowing the above benefits to any type of information exchange in cyberspace.
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
الموضوعات
عدد الصفحات
184
قائمة المحتويات
Table of contents.
Abstract.
Chapter one : E-government as a catalyst in the information age.
Chapter two : Information technology security.
Chapter three : Authentication and identification.
Chapter four : E-government trust infrastructure.
Chapter five : Amal authentication architectural model (3AM).
Chapter six : Discussions and conclusions.
References.
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Umari, Ahmad Husayn. Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences. (2004).
https://search.emarefa.net/detail/BIM-304725
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725
لغة النص
الإنجليزية
نوع البيانات
رسائل جامعية
رقم السجل
BIM-304725
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
![](/images/ebook-kashef.png)
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر
![](/images/kashef-image.png)