Volume- 3
Issue- 1
Year- 2016
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr Isa Ali Ibrahim , Yusuf Abubakar
Identity management systems have existed for 8 years now in Nigeria, being a useful component of national development in all economic systems. The implementation of identity management system with respect to multilateral security is the change that is obtainable within the last 8 years. Despite several debates on the implementation of Identity Management System in Nigeria. IDMS stands to play an important role on economic growth, social capital and political development in a country. It is argued that IDMS represents a new “General Multi-Purpose Smart Card” with the potential view to link a secure database with biometric verifications for an individual identity. It is also generating a sustained increase in economic growth through processes of technological development and innovation. Government sees the application and use of Identity Management System as generating higher national productivity, job creation, competitiveness and national development.
[1] Brands, S. (2000). Rethinking Public key Infrastructure and Digital Certificates-building in Privacy, Thesis, Second Edition, MIT Press, Cambridge, MA.
[2] Chaum, D. (1985). Security without Identification, Transaction System to make big brother obsulette, Communication of the ACM 2 7 (10) Pp 1030 – 1044.
[3] Claub, S. (2001). Collection of Information on Identity Management.
[4] Claud, S. (2002). “Technologies for Anonymity and Identity Management.
[5] Pfitzmann, A. (2001). Multilateral Security: Enabling Technologies and Their Evaluation, in:R.Whilhelm. Pp 50-62.
[6] Camenish, J. and A. Lysyanskaya (2000), Efficient NonTransferrable Anonymous Multi- Shoe Credential System with Optional Anonymity Revocation, IBM Research.
[7] Chaum, D. (1986). Showing Credentials without Identification, Signatures Transferred between Unconditionally Unlinkable pseudonyms, in F pichler (Ed). Pp. 241 – 244.
[8] Chaum, D. (1985). Security without Identification, Transaction System to make big brother obsulette, Communication of the ACM 2 7 (10) Pp 1030 – 1044.
[9] Cooper, E. (1995). Simplest approach to determining the population of the study. London: UC and Q printing press. Pp. 23.
[10] Damker, H and U. prodesch (1999) Personal Reachability and Security Management Pp. 95-111.
[12] Directive of the European Parliament and of the Council (1995): On the protection of Individuals with regard to the processing of Personal Data and on the free movement of such data. Official Journal 281, Pp. 0031-0050.
[13] Grimm, R. and N. Honhorf (2000) E-Commercial Meets privacy, in: H Baumher. Pp. 133 – 140.
[14] Harris, L. and Associates, Inc., (1991) IBB Multi-national Consumer privacy Survey, New York, http//www.ibm.com/services/files/ privacy. Survey Oct+991.pdf.
[15] Jenrdicke, U. and D Gerd tom Markotten (2000) usability Meets Security-the Identity manager as your Personal Security Assistant for the Internet, in Proceeding of the 16th Annual Computer Security Applications Conference, New Orleans, U.S.A.
[16] Kohntopp, M. (2001). Collection of Information on Identity Management and link list (Partly in German and partly in English, http://www.Koehntopp.de/marit/pub/idmanage/.
[17] Kohntopp, M. (2001). Collection of Information on Identity Management and link list (Partly in German and partly in English, http://www.Koehntopp.de/marit/pub/idmanage/.
[18] Pew Internet and America life Project, (2008). Trust and privacy online: Why Americansjust Want to rewrite the rules, http://pewinternet.org/report/toc.asp? Report =19.
[19] Pfitzmann, A. (2001). Multilateral Security: Enabling Technologies and Their Evaluation, in:R.Whilhelm (Ed.). Pp 50- 62.
[20] Pfitzmann, A. (2001). Multilateral Security: Enabling Technologies and Their Evaluation, in:R.Whilhelm. Pp 50-62.
Asst Professor, Faculty of Computer Science and Information Systems Islamic University of Madinah, 42351, Kingdom of Saudi Arabia drisaaliibr@iu.edu.sa
No. of Downloads: 11 | No. of Views: 848
Abhishek Patil, Diya Raut, Roshani Prasad, Charudatta Shimpi.
April 2024 - Vol 11, Issue 2
B.V.Satish Babu, Dr. K.Suresh Babu, Durga Prasad Kare.
October 2023 - Vol 10, Issue 5
Kushal Kumar, Khushboo Tripathi, Rashmi Gupta.
June 2023 - Vol 10, Issue 3