National authentication framework implementation study

Download
Author
Mok, Chuan-Hao.
Date
2009-12Advisor
Lundy, Bert
Fulp, J. D.
Metadata
Show full item recordAbstract
The move toward e-government has seen many institutions put special focus on the need for security, especially that of authentication. Single-factor password-based systems have been proven inadequate in safeguarding online financial and e-government service transactions. Industry adoption of Two-Factor Authentication (2FA) has also been piecemeal. To mitigate these deficiencies, the Singapore Government, in 2008, put forth a Call-for-Collaboration (CFC) seeking industry and academic participation in defining a National Authentication Framework (NAF), with the dual aim of providing for a national-level 2FA system and broadening the market for authentication services, and, in so doing, providing the user with a better authentication experience. This thesis will detail, discuss, and compare the various token types and identity frameworks (PKI, SAML, WS-F, OpenID, and Infocard) that make up an authentication system, and make recommendations on the best combination of technologies, protocols, and standards that, when implemented, would not only fulfill the requirements of the CFC, but also position it well for future enhancement.
Collections
Related items
Showing items related by title, author, creator and subject.
-
The classification of e-authentication protocols for targeted applicability
Chia, Wan Yin. (Monterey, California. Naval Postgraduate School, 2009-12);Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the ... -
Method And Apparatus for Millimeter-Wave Physical Layer Authentication
Lord, Scott Frederick; Roth, John David-Dickson; Tummala, Murali (The United States of America, as represented by the Secretary of the Navy, Washington, DC (US), 2023-04-04);Physical-layer authentication based on the channel response over a wireless medium are described. In a first authentication scheme, a count is kept of how many significant multipath taps remain empty or occupied from ... -
Framework for a Link Layer Packet Filtering (LLPF) security protocol
Darroca, Gregorio G. (Monterey, California. Naval Postgraduate School, 1998-09);Transport Layer (OSI Layer 3) switching and routing provides routing flexibility but not high throughput. Link layer (OSI Layer 2) switching provides high throughput but not the routing flexibility needed to manage topology ...