CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
e-identification: a literature review of its challenges, benefits and usage
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
2019 (English)Independent thesis Advanced level (professional degree), 80 credits / 120 HE creditsStudent thesis
Abstract [en]

Context: Public key infrastructure is used in various systems and services that we use on adaily basis in order to provide security services such as integrity, confidentiality, andauthentication.

Objective: The goal of this study is to conceptualize the current challenges that PKI facesthrough its key management lifecycle based on publications between the years 2007 to 2018.The results should be beneficial for the researchers and practitioners in this field.

Method: The study is following a qualitative method. A systematic review has been used toconduct this study. The systematic review is a scientific method to identify, analyze,synthesize and evaluate the literature that is selected for the study.

Results: From 86 published studies selected in the last stage of literature screening andselection, a total number of 11 different concepts that represent the current challenges hasbeen identified. We found that the IOT domain was the most dominant field in the study (33%of total studies) while the key revocation phase received the most attention from the literatureby 23%. We also provided a descriptive result of the literature based on the date ofpublication, key phase, origins of the authors and the domain.

Conclusion: The study demonstrates a conceptual model to capture the current challenges in the PKI withrespect to different environments and domains. Further research is needed that focusesprimarily on the phases of the key management lifecycle within PKI in order to assess thechallenges in respect to the key phases.

Place, publisher, year, edition, pages
2019. , p. 56
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Engineering and Technology
Identifiers
URN: urn:nbn:se:ltu:diva-74279OAI: oai:DiVA.org:ltu-74279DiVA, id: diva2:1321676
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level (120 credits)
Presentation
2019-06-07, 19:27 (English)
Supervisors
Examiners
Available from: 2019-06-11 Created: 2019-06-09 Last updated: 2019-06-11Bibliographically approved

Open Access in DiVA

fulltext(1968 kB)16 downloads
File information
File name FULLTEXT02.pdfFile size 1968 kBChecksum SHA-512
57f85e03ccd1d7ae394f9223152bc6cf563db5661c7e827e474ad316f3d03fe57c9be3e037c311f2f44dffbea4dab391ebbe6111dd2a25ba9fecbabcd68c8efb
Type fulltextMimetype application/pdf

By organisation
Computer Science
Other Electrical Engineering, Electronic Engineering, Information EngineeringEngineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 16 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 11 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf