Inicio  /  Information  /  Vol: 12 Par: 8 (2021)  /  Artículo
ARTÍCULO
TITULO

A Digital Signature Model Using XAdES Standard as a Rest Service

Renato Carauta Ribeiro    
Murilo Góes de Almeida and Edna Dias Canedo    

Resumen

The digital signature of documents and degrees is a topic widely discussed in the Federal Public Administration. Several laws and ordinances were created to standardize the issuance, validation and legal validity of digitally signed documents in national territory, such as the ordinances created by the Ministry of Education (MEC) to regulate the issuance of degrees in digital format. These ordinances created guidelines and standards that must be adopted by Federal Universities for the signing of in digital format. The main objective of this work is to study these ordinances, the main technologies and digital signature standards used in the literature to create a digital signature system model for University of Brasília-UnB, which complies with the MEC and ICP-Brazil standards. Moreover, the model must be developed with the main standards and technologies in the market, cohesive to the current UnB architecture, easy to maintain and update to new standards that may emerge, and also be a fully open source project. An architectural model and a prototype in Java language were developed using XAdES4j library as a microservice intermediated by the bus used in UnB. The prototype developed was compared with the current digital signature system named C3Web. The comparative tests and results between the two solutions showed that the current system used in UnB does not perform the signature in accordance with the standard proposed by the MEC, in addition to being a private system using proprietary technologies for the execution of digital signatures. The tests performed with the proposed model demonstrated that it performs the digital signature in accordance with the XAdES-T standard, regulations of the MEC and ICP-Brazil. In addition, the solution presented a performance comparable to the current system used by UnB with a little more effective security than the current system used. The current model developed in this work can be a basis for the creation of future subscription systems for Brazilian Universities.

Palabras claves

 Artículos similares

       
 
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry    
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si... ver más
Revista: Applied Sciences

 
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information

 
Nikolay Atanov, Vladimir Baranov, Leo Borrel, Caterina Bloise, Julian Budagov, Sergio Ceravolo, Franco Cervelli, Francesco Colao, Marco Cordelli, Giovanni Corradi, Yuri Davydov, Stefano Di Falco, Eleonora Diociaiuti, Simone Donati, Bertrand Echenard, Carlo Ferrari, Antonio Gioiosa, Simona Giovannella, Valerio Giusti, Vladimir Glagolev, Francesco Grancagnolo, Dariush Hampai, Fabio Happacher, David Hitlin, Matteo Martini, Sophie Middleton, Stefano Miscetti, Luca Morescalchi, Daniele Paesani, Daniele Pasciuto, Elena Pedreschi, Frank Porter, Fabrizio Raffaelli, Alessandro Saputi, Ivano Sarra, Franco Spinella, Alessandra Taffara, Anna Maria Zanetti and Ren Yuan ZhuaddShow full author listremoveHide full author list    
The Mu2e experiment at Fermilab will search for the standard model-forbidden, charged lepton flavour-violating conversion of a negative muon into an electron in the field of an aluminium nucleus. The distinctive signal signature is represented by a mono-... ver más
Revista: Instruments

 
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev and Evgeny Kostuchenko    
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user?s face is converted to parameters that later are used in a recognition process. On the o... ver más
Revista: Information

 
Sergey Agafyin,Stanislav Smyshlyaev     Pág. 84 - 89
The task of enabling usage of cryptographic software (especially, for working with digital signature) with general-purpose mobile devices (e.g., smartphones with iOS or Android operation systems) is inevitably discussed during all conference discussions ... ver más