Table of Contents
Advances in Software Engineering
Volume 2015 (2015), Article ID 568087, 11 pages
http://dx.doi.org/10.1155/2015/568087
Research Article

Breaking the Web Barriers of the e-Administration Using an Accessible Digital Certificate Based on a Cryptographic Token

1Departamento de Ingeniería Telemática y Electrónica, Universidad Politécnica de Madrid, Carretera de Valencia km 7, 28031 Madrid, Spain
2ASPAYM Madrid, Camino de Valderribas 115, 28038 Madrid, Spain

Received 19 May 2015; Accepted 27 July 2015

Academic Editor: Phillip A. Laplante

Copyright © 2015 Boni García et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. European Commission, i2010 eGovernment Action Plan: Accelerating eGovernment in Europe for the Benefit of All, European Commission, 2006.
  2. European Commission, The European eGovernment Action Plan 2011–2015. Harnessing ICT to Promote Smart, Sustainable and Innovative Government, European Commission, 2010.
  3. C. Rughiniş and R. Rughiniş, “Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union,” Computers & Security, vol. 43, pp. 111–125, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. D. W. Chadwick, A. Otenko, and E. Ball, “Role-based access control with X.509 attribute certificates,” IEEE Internet Computing, vol. 7, no. 2, pp. 62–69, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. European Commission, Eurostat e-Government Statistics: Online Interactions of European Businesses and Citizens with Public Administrations, European Commission, 2009.
  6. Spanish Statistical Office—INE, Survey on Disability, Independence, and Dependency Situations, Spanish Statistical Office—INE, 2008.
  7. C. Cachin and N. Chandran, “A secure cryptographic token interface,” in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF '09), pp. 141–153, IEEE, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Kortesniemi and M. Särelä, “Survey of certificate usage in distributed access control,” Computers & Security, vol. 44, pp. 16–32, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Nystr and M. Nyström, “PKCS #15—a cryptographic token information format standard,” in Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology (WOST '99), p. 5, USENIX Association, Berkeley, Calif, USA, 1999.
  10. Spanish Statistical Office—INE, Survey on the Equipment and Use of Information and Communication Technologies (ICT-H) in Households, Spanish Statistical Office—INE, 2013.
  11. P. Wohlmacher, “Digital certificates: a survey of revocation methods,” in Proceedings of the Workshops on Multimedia, pp. 111–114, ACM, Los Angeles, Calif, USA, October 2000. View at Publisher · View at Google Scholar
  12. N. Leavitt, “Internet security under attack: the undermining of digital certificates,” Computer, vol. 44, no. 12, Article ID 6096548, pp. 17–20, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Heichlinger and P. Gallego, “A new e-ID card and online authentication in Spain,” Identity in the Information Society, vol. 3, no. 1, pp. 43–64, 2010. View at Publisher · View at Google Scholar
  14. I. Ruiz-Agundez and P. G. Bringas, “Service authentication via electronic identification cards: voip service authentication through the DNIe,” in Proceedings of the Annual SRII Global Conference (SRII '12), pp. 602–607, IEEE Computer Society, San Jose, Calif, USA, 2012.
  15. D. R. Olsen, S. A. Wygant, and B. L. Brown, “Electronic survey administration: assessment in the twenty-first century,” Assessment Update, vol. 16, no. 3, pp. 1–15, 2004. View at Google Scholar
  16. P. Kotzé, K. Renaud, and J. V. Biljon, “Don't do this—pitfalls in using anti-patterns in teaching human-computer interaction principles,” Computers & Education, vol. 50, no. 3, pp. 979–1008, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. United Nations Public Administration Network (UNPAN), United Global Nation's Global e-Government Survey, United Nations Public Administration Network (UNPAN), 2012.
  18. European Commission, Eurostat Statistic Theme 10: Good Governance, European Commission, 2011.
  19. Spanish Official State Gazette—BOE, Law 11/2007 of Public Electronic Access to Public Services, Spanish Official State Gazette—BOE, 2007.
  20. Spanish Official State Gazette—BOE, Law 39/2006 of Promoting Personal Autonomy and Care for People in Situations of Dependency, Spanish Official State Gazette—BOE, 2006.
  21. J. Feghhi, J. Feghhi, and P. Williams, Digital Certificates, Addison-Wesley, 1999.
  22. A. Rwabutaza, M. Yang, and N. Bourbakis, “A comparative survey on cryptology-based methodologies,” International Journal of Information Security and Privacy, vol. 6, no. 3, pp. 1–37, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Marchesini, S. W. Smith, and M. Zhao, “The surprising insecurity of client-side SSL,” Computers & Security, vol. 24, no. 2, pp. 109–123, 2005. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Gallo, H. Kawakami, and R. Dahab, “Case study: on the security of key storage on PCs,” in Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '13), pp. 1645–1651, IEEE, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. InfoSecurity, “Windows Autorun trojan tops November malware chart,” 2009.
  26. J. Clark, S. Leblanc, and S. Knight, “Compromise through usb-based hardware trojan horse device,” Future Generation Computer Systems, vol. 27, no. 5, pp. 555–563, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. Microsoft, “Microsoft security intelligence report volume 11,” Tech. Rep., Microsoft, 2011. View at Google Scholar
  28. R. Siddaway, PowerShell and WMI, Manning Publications Co. Series, O'Reilly Media, 2012.
  29. K. Chan and I. Poernomo, “QoS-aware model driven architecture through the UML and CIM,” Information Systems Frontiers, vol. 9, no. 2-3, pp. 209–224, 2007. View at Publisher · View at Google Scholar · View at Scopus