Amal authentication architectural model "3AM" : for secure information exchange

مقدم أطروحة جامعية

Umari, Ahmad Husayn

مشرف أطروحة جامعية

al-Umari, Husayn Yusuf
Qaddurah, Imad

أعضاء اللجنة

al-Jabir, Ahmad Awdah
al-Uqayli, Salih
al-Sarhan, Sami

الجامعة

الأكاديمية العربية للعلوم المالية و المصرفية

الكلية

كلية نظم و تكنولوجيا المعلومات

دولة الجامعة

الأردن

الدرجة العلمية

دكتوراه

تاريخ الدرجة العلمية

2004

الملخص الإنجليزي

The key enabler to E-Government implementation is trust, and trust is built gradually between the communicating parties.

Trust was defined by different disciplines; the basis of employing trust in the cyberspace is the information technology security.

Existing trust model can benefit from additional security services to enable a more secure message exchange.

Currently, messages are not controlled; once sent it is impossible to revoke.

Therefore, this may cause un-secure working environment.

In addition, a communication exchange uses the same encryption technique for the duration of the session.

This gives higher probability for security vulnerabilities.

This work came to provide the suitable solution to E-Government implementations by enabling enhanced trust; via designing a new paradigm in authentication protocols, called Ama Authentication Architectural Model or 3AM.

The 3AM represents a new paradigm in the information security for many reasons, mainly, the 3AM allows message control mechanism after the message being sent, the 3AM authenticates messages as if it is a resource, the 3AM preserves message security and confidentiality by having message exchange directly between the sender and receiver without a third party, and the 3AM represents a new implementation of open crypto, the model is flexible, modular, could be used in many applications like E-Government, E-commerce, E-business mobile telephone systems, and other e-initiatives.

In addition, the 3AM overcomes cultural barriers of the E-government practices and provides mean of secure information exchange for all types of messages (i.e.

multi-media) in the working environment.

3AM modularity allows it be a plug and play model since it works with any existing security service.

Therefore, 3AM truly enhances the trust model by allowing the above benefits to any type of information exchange in cyberspace.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

184

قائمة المحتويات

Table of contents.

Abstract.

Chapter one : E-government as a catalyst in the information age.

Chapter two : Information technology security.

Chapter three : Authentication and identification.

Chapter four : E-government trust infrastructure.

Chapter five : Amal authentication architectural model (3AM).

Chapter six : Discussions and conclusions.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Umari, Ahmad Husayn. Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences. (2004).
https://search.emarefa.net/detail/BIM-304725

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-304725