Ensuring the Security of a National Identity Registry Research Paper by Nicky

Ensuring the Security of a National Identity Registry
Proposal of plan to ensure the security of a National Identity Registry.
# 128007 | 4,016 words | 14 sources | APA | 2010 | US


$19.95 Buy and instantly download this paper now

Description:

This paper proposes a plan for ensuring the security of a National Identity Registry, and explains that the development, introduction and continual maintenance of a national identity registry system require a systematic and thorough approach to defining security policies, programs and strategies. After exploring Service-Oriented Architecture (SOA), Virtual Private Networks (VPN), and secure socket layer (SSL)-based connections, the paper concludes by acknowledging the need for an overarching security strategy that unifies all these components and defines how, from a process standpoint, the ministry managing this initiative can quickly modify it to meet the changing needs of the nation relying on this system, while at the same time keeping it secure. The paper contains five illustrative data tables.

Outline:
Introduction
Part I - Security Analysis and Recommendation
Access Security for the National Identity Registry Access Security: Comparing SSL and IPSec
Summary
Part Two - Private Organization Access to the National Identity Registry
Conclusion

From the Paper:

"The development, introduction and continual maintenance of a national identity registry system require a systematic and thorough approach to defining security policies, programs and strategies. Implicit in the design of the National Identity Registry are authentication technologies for ensuring records can be securely and accurately updated over the Internet at any point in time, from any location. Authentication technologies and models (Saltzman, 2006) defined as being policy-based, trust-based, reputation-based or general in their structure are all analyzed as part of the essential research necessary for defining security recommendations for the National Identity Registry."

Sample of Sources Used:

  • Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach. 2005. Managing the Performance Impact of Web Security. Electronic Commerce Research: World Wide Web Electronic Commerce, Security and Privacy 5, no. 1 (January 1): 99-116. (accessed October 21, 2008).
  • Alan D. Smith 2008. Exploring national identification programs among web-enabled professionals. Industrial Management + Data Systems 108, no. 4 (May 1): 455-477. (accessed October 20, 2008).
  • David C Parkes, Michael O Rabin, Stuart M Shieber, Christopher Thorpe. 2008. Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications: Special Section: New Research from the 2006 International 7, no. 3 (October 1): 294-312. (accessed October 20, 2008).
  • Ji Ma, Mehmet A Orgun. 2008. Formalising theories of trust for authentication protocols. Information Systems Frontiers 10, no. 1 (March 1): 19-32. (accessed October 23, 2008).
  • Joseph J Riotto, 2008. Understanding the Sarbanes-Oxley Act--A valued added approach for public interest. Critical Perspectives on Accounting: Part Special Issue - SARBANES-OXLEY 19, no. 7 (November 1): 952-962. (accessed October 21, 2008).

Cite this Research Paper:

APA Format

Ensuring the Security of a National Identity Registry (2010, June 23) Retrieved January 27, 2022, from https://www.academon.com/research-paper/ensuring-the-security-of-a-national-identity-registry-128007/

MLA Format

"Ensuring the Security of a National Identity Registry" 23 June 2010. Web. 27 January. 2022. <https://www.academon.com/research-paper/ensuring-the-security-of-a-national-identity-registry-128007/>

Comments