RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      mNPKI for Mobile Government in Developing Countries

      한글로보기

      https://www.riss.kr/link?id=A106373373

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public ke...

      Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

      더보기

      참고문헌 (Reference)

      1 조중기, "정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구" 한국융합학회 7 (7): 237-247, 2016

      2 김현성, "개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로" 한국디지털정책학회 14 (14): 45-51, 2016

      3 W. Lam, "ZBarriers to e-government integration" 18 (18): 511-530, 2005

      4 C. Marufu, "Utilisation of mobile health by medical doctors in a Zimbabwean health care facility" 22 : 228-234, 2017

      5 A. Jansen, "The nature of public e-services and their quality dimensions" 33 : 647-657, 2016

      6 Z. Li, "The E-government Information Model Based on GPR" 33 (33): 291-304, 2016

      7 European Parliament, "Security of eGovernment System Final Report, Science and Technology Options Assessment" 2013

      8 S. Hong, "Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey" 4 (4): 1-6, 2014

      9 NIST, "Recommendation for Key Management Part 3:Application-Specific Key Management Guidance"

      10 C. E. V. Madhavan, "Recent Trends in Applied Cryptology" 20 (20): 119-128, 2003

      1 조중기, "정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구" 한국융합학회 7 (7): 237-247, 2016

      2 김현성, "개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로" 한국디지털정책학회 14 (14): 45-51, 2016

      3 W. Lam, "ZBarriers to e-government integration" 18 (18): 511-530, 2005

      4 C. Marufu, "Utilisation of mobile health by medical doctors in a Zimbabwean health care facility" 22 : 228-234, 2017

      5 A. Jansen, "The nature of public e-services and their quality dimensions" 33 : 647-657, 2016

      6 Z. Li, "The E-government Information Model Based on GPR" 33 (33): 291-304, 2016

      7 European Parliament, "Security of eGovernment System Final Report, Science and Technology Options Assessment" 2013

      8 S. Hong, "Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey" 4 (4): 1-6, 2014

      9 NIST, "Recommendation for Key Management Part 3:Application-Specific Key Management Guidance"

      10 C. E. V. Madhavan, "Recent Trends in Applied Cryptology" 20 (20): 119-128, 2003

      11 J. Kim, "Public trust in a mobile device and service policy in South Korea : The Mobile Device Distribution Improvement Act" 34 : 540-547, 2017

      12 H. Jin, "Proactive certificate validation for VANETs" IEEE 1-4, 2016

      13 H. Kim, "Privacy Preserving Security Framework for Cognitive Radio Networks" 30 (30): 142-148, 2013

      14 B. Payne, "PKI at Scale using Short-lived Certificates" 2016

      15 OMB, "OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act"

      16 Informata, "Mobilizing public services in Africa:The m-government challenges" 1-12, 2001

      17 D. Kang, "Mobile services with handset bundling and governmental policies for competitive market" 34 : 323-337, 2017

      18 I. Marin, "Improved M-Government based on Mobile WiMAX" 37-42, 2017

      19 "IETF RFC 3280(2002) Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"

      20 J. Rowley, "How Short-Lived Certificates Improve Certificate Trust"

      21 United Nations, "Global E-Government Readiness Report 2005" 2005

      22 NIST, "Federal Agency Use of Public Key Technology for Digital Signatures and Authentication"

      23 National Institute of Standards and Technology, "Federal Agency Use of Public Key Technology for Digital Signatures and Authentication"

      24 M. Z. I. Lallmahomed, "Factors influencing the adoption of e-Government services in Maturittius" 34 (34): 57-72, 2017

      25 Solution Profile-U.S. Federal Bridge Certification Authority (FBCA), "European Federated Validation Service Study" 2009

      26 B. Klievink, "Digital Strategies in Action-a Comparative Analysis of National Data Infrastructure Development" ACM 129-138, 2017

      27 Y. Lee, "Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce" 30 : 893-903, 2007

      28 "DFN-PKI Certificate Policy – Security levels: Global, Classic and Basic"

      29 S. H. Lee, "Cloud computing Issues and Security measure" 5 (5): 31-35, 2015

      30 J. Poushter, "Cell Phones in Africa:Communication Lifeline-Texting Most Common Activity, but Mobile Money Popular in Several Countries" Pew Research Center 2015

      31 W. Shanks, "Building and managing a PKI solution for small and medium size business" The SANS Institute 2013

      32 I. K. Rohman, "Against the Shadow:the Role of e-Government" ACM 319-328, 2017

      33 S. F. Verkijika, "A usability assessment of e-government websites in Sub-Saharan Africa" 39 : 20-29, 2018

      34 A. Das, "A longitudinal study of e-government maturity" 53 : 415-426, 2017

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2025 평가예정 신규평가 신청대상 (신규평가)
      2022-06-01 평가 등재학술지 취소
      2020-01-01 평가 등재학술지 유지 (재인증) KCI등재
      2017-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2014-01-21 학술지명변경 한글명 : 디지털정책연구 -> 디지털융복합연구
      외국어명 : Journal of Digital Policy & Management -> Journal of Digital Convergence
      KCI등재
      2013-01-01 평가 등재 1차 FAIL (등재유지) KCI등재
      2010-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2009-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2007-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      2005-03-25 학회명변경 한글명 : (사)한국디지털정책학회 -> 한국디지털정책학회
      영문명 : 미등록 -> The Society of Digital Policy & Management
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 1.59 1.59 1.46
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      1.35 1.34 1.61 0.64
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼