Choosing Authentication Techniques in E-procurement System in Serbia

E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. Application of electronic approach in completing an e-Procurement process opens up a lot of issues regarding security. The transparent nature of the process at hand is requiring a sophisticated security system. Unauthorized access or different kinds of intrusion present a legitimate threat. On the other hand, the attempt to develop such a system in developing countries like Serbia may face many difficulties. Some of the difficulties may be caused by legal obstacles, technical weaknesses, or human resistance towards change. This paper presents a review of authentication techniques used in the European e-Government systems and according to that this paper is focused on the methods we used to overcome those difficulties, as well as on the provision of a strong security system that would guarantee the protection of sensitive data.

[1]  M. Caloyannides,et al.  US e-government authentication framework and programs , 2003 .

[2]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[3]  Yoshiaki Isobe,et al.  Development of personal authentication system using fingerprint with digital signature technologies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[4]  Charles W. Beardsley Is your computer insecure? , 1972, IEEE Spectrum.

[5]  Hua-Qing Zhou,et al.  PKI-Based E-Business Security System , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[6]  Arthur Tatnall Web Portals: The New Gateways to Internet Information and Services , 2004 .

[7]  H. Bing,et al.  Secure authentication system incorporating hand shapes verification and cryptography techniques , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[8]  Yoichi Seto Development of personal authentication systems using fingerprint with smart cards and digital signature technologies , 2002, 7th International Conference on Control, Automation, Robotics and Vision, 2002. ICARCV 2002..

[9]  Craig Larman,et al.  Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process , 2001 .

[10]  Lei Shen,et al.  A User Authentication Scheme Based on Fingerprint and USIM Card , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  Jiann-Der Lee,et al.  International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .

[12]  Lynette I. Millett,et al.  Authentication and Its Privacy Effects , 2003, IEEE Internet Comput..