Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
e-identification: a literature review of its challenges, benefits and usage
Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
2019 (Engelska)Självständigt arbete på avancerad nivå (yrkesexamen), 80 poäng / 120 hpStudentuppsats (Examensarbete)
Abstract [en]

Context: Public key infrastructure is used in various systems and services that we use on adaily basis in order to provide security services such as integrity, confidentiality, andauthentication.

Objective: The goal of this study is to conceptualize the current challenges that PKI facesthrough its key management lifecycle based on publications between the years 2007 to 2018.The results should be beneficial for the researchers and practitioners in this field.

Method: The study is following a qualitative method. A systematic review has been used toconduct this study. The systematic review is a scientific method to identify, analyze,synthesize and evaluate the literature that is selected for the study.

Results: From 86 published studies selected in the last stage of literature screening andselection, a total number of 11 different concepts that represent the current challenges hasbeen identified. We found that the IOT domain was the most dominant field in the study (33%of total studies) while the key revocation phase received the most attention from the literatureby 23%. We also provided a descriptive result of the literature based on the date ofpublication, key phase, origins of the authors and the domain.

Conclusion: The study demonstrates a conceptual model to capture the current challenges in the PKI withrespect to different environments and domains. Further research is needed that focusesprimarily on the phases of the key management lifecycle within PKI in order to assess thechallenges in respect to the key phases.

Ort, förlag, år, upplaga, sidor
2019. , s. 56
Nationell ämneskategori
Annan elektroteknik och elektronik Teknik och teknologier
Identifikatorer
URN: urn:nbn:se:ltu:diva-74279OAI: oai:DiVA.org:ltu-74279DiVA, id: diva2:1321676
Ämne / kurs
Examensarbete, minst 30 hp
Utbildningsprogram
Informationssäkerhet, master
Presentation
2019-06-07, 19:27 (Engelska)
Handledare
Examinatorer
Tillgänglig från: 2019-06-11 Skapad: 2019-06-09 Senast uppdaterad: 2019-06-11Bibliografiskt granskad

Open Access i DiVA

fulltext(1968 kB)94 nedladdningar
Filinformation
Filnamn FULLTEXT02.pdfFilstorlek 1968 kBChecksumma SHA-512
57f85e03ccd1d7ae394f9223152bc6cf563db5661c7e827e474ad316f3d03fe57c9be3e037c311f2f44dffbea4dab391ebbe6111dd2a25ba9fecbabcd68c8efb
Typ fulltextMimetyp application/pdf

Av organisationen
Datavetenskap
Annan elektroteknik och elektronikTeknik och teknologier

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 94 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 126 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf