e-identification : a literature review of its challenges, benefits and usage

Detta är en Uppsats för yrkesexamina på avancerad nivå från Luleå tekniska universitet/Datavetenskap

Författare: Abdallah Muhaisen; [2019]

Nyckelord: ;

Sammanfattning: Context: Public key infrastructure is used in various systems and services that we use on adaily basis in order to provide security services such as integrity, confidentiality, andauthentication. Objective: The goal of this study is to conceptualize the current challenges that PKI facesthrough its key management lifecycle based on publications between the years 2007 to 2018.The results should be beneficial for the researchers and practitioners in this field. Method: The study is following a qualitative method. A systematic review has been used toconduct this study. The systematic review is a scientific method to identify, analyze,synthesize and evaluate the literature that is selected for the study. Results: From 86 published studies selected in the last stage of literature screening andselection, a total number of 11 different concepts that represent the current challenges hasbeen identified. We found that the IOT domain was the most dominant field in the study (33%of total studies) while the key revocation phase received the most attention from the literatureby 23%. We also provided a descriptive result of the literature based on the date ofpublication, key phase, origins of the authors and the domain. Conclusion: The study demonstrates a conceptual model to capture the current challenges in the PKI withrespect to different environments and domains. Further research is needed that focusesprimarily on the phases of the key management lifecycle within PKI in order to assess thechallenges in respect to the key phases.

  HÄR KAN DU HÄMTA UPPSATSEN I FULLTEXT. (följ länken till nästa sida)