Digital Signature Web Service using Smart Cards

Informatics ◽  
2010 ◽  
Author(s):  
H.K. Lu ◽  
K. Sachdeva
Author(s):  
Elisa Bertino ◽  
Barbara Carminati ◽  
Elena Ferrari

A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Web services are based on a set of XML standards, such as Web services description language (WSDL), simple object access protocol (SOAP) and universal description, discovery and integration (UDDI). A key role in the Web service architecture is played by UDDI registries, i.e., a structured repository of information that can be queried by clients to find the Web services that better fit their needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive. In this chapter, we focus on authenticity issues, by proposing a method based on Merkle hash trees, which does not require the party managing the UDDI to be trusted wrt authenticity. In the chapter, besides giving all the details of the proposed solution, we show its benefit wrt standard digital signature techniques.


Key management plays a crucial role in cryptography, as the basis for secure information exchange, data identification and integrity. There are software and hardware key management tools that support Crypto APIs and Cryptography Next Generation APIs(CNG API), Public Key Cryptography Standards (PKCS). These tools store cryptographic keys on hard disks, smart cards, tokens, and in other storage media. To use the cryptographic keys stored on these smart cards and tokens, you need to connect them to the appropriate hardware. The cryptographic keys stored on the hard drives of a computer or a laptop are used by the programs of these devices. If it becomes necessary to use a single key in different systems, then you will have to create copies of the key on all these devices. This complicates the process of key management, raises tasks of securely store keys, keys access control. This paper proposes a distributed system model for key management and a protocol of interaction of the distributed system modules. The proposed model provides the ability to store keys in a smartphone, and access to keys from other devices. The system described in the model consists of 3 modules. The module 1 has computer version and smartphone version, and serves to send a request for signing, signature verification, hashing. The module 2, a smartphone software, provides key pair generation, storing, encrypting and decrypting, archiving keys, export/import keys, keys access control, and destroying keys. The module 3, web service, provides communication of the first and second modules. In addition, the system, which was created based on the current model, provides the ability to use digital signatures in web applications. The Module 1 operates as a local web service that accepts requests from a web page running in a browser. A special script in a web page sends http requests that include cryptographic operations to the specified localhost port and accepts responses.


Author(s):  
Lidia Dobrescu ◽  
Silviu Stanciu ◽  
Armand Ropot

Imaging methods such as radiographies, computed tomographies or scintigraphies expose the patients to a cumulative effective dose of radiation that could often exceed the maximum allowed dose. A three months medical study in a Romanian hospital showed, despite the great concern of radiation exposure, the skyrocketing volume of imaging investigations with radiation risk that lack monitoring and tracking the cumulative radiation doses of the patients. In order to solve this problem, in this paper the authors propose an integrated system that ensures the radiation safety and security of the patients investigated by radiological imaging methods such as radiographies, computed tomographies or scintigraphies. The system uses state of the art technologies such as smart cards, digital signature and Public Key Infrastructure. The proposed system provides a couple of secure services like electronic patient record of radiological investigations, assistance in prescription of future radiological investigations based on the patient history, different reports and statistics and even the control access of persons to areas with risk of radiation exposure based on information stored on their smart cards.


2005 ◽  
Vol 8 (1) ◽  
pp. 16-18
Author(s):  
Howard F. Wilson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document