A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya

Volume: 5 Number: 1 March 1, 2016
  • Geoffrey Wekesa Chemwa

A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya

Abstract

Public Key Infrastructure PKI quality attributes like security, availability, integrity, interoperability etc. are latent in nature meaning they cannot be measured or observed directly. This presents a problem on how they can be optimized since as Drucker’s maxim goes, if you can’t measure it, you can’t manage it. We are cognizant of the fact that in most governments, the planners, implementers and assessors of PKI rely on quality management systems like ISO to qualitatively measure compliance to best practices through quarterly audits. Such strategies are paperwork intensive and try to ensure process adherence but lack the capacity to quantitatively measure non-functional quality properties. eGovernments and their cyber security strategies, face massive threats from a knowledge society that has easy access to hacking tools, and also well-funded hacker groups, some sponsored by foreign governments.In this work,we derive a conceptual framework from existing frameworks then model a quantitative decision support tool using path analysis techniques, specifically Partial Least Square Structural Equation Modeling.The data used to initialize the model is real data collected from an ongoing PKI implementation. We opine that if key decisions are optimized during planning, implementation and auditing, then the security of the a PKI solution will also be optimized. We also provide an eGovernment arrangement that relies on PKI security for identification, authentication and authorization. It is worthwhile to note that although PKI is a universal concept, its design and implementation in different contexts means that each context offers emergent challenges that require unique security solutions.

Keywords

References

  1. [1] Ernst & Young. Identity and Access Management: Beyond Compliance. Technical report. Ernst & Young, http://www.ey.com/Publication/vwLUAssets/EY_- _Evolving_identity_and_access_management/$FILE/E Y-Evolving-identity-and-access-management.pdf, 2013.
  2. [2] R. Wagner, “Identity and Access Management: Key Initiative Overview.” Gartner Inc., 2010.
  3. [3] T. Smedinghoff, “Building an Online Identity Legal Framework: The Proposed National Strategy,” The Bureau of National Affairs, USA, Report 800-372- 1033, 2010.
  4. [4] ISC, “PKI Assessment Guidelines.” Information Security Committee, American Bar Association, 2003.
  5. [5] C. M. Ringle, S. Wende, and J.-M. Becker, “SmartPLS 3,” A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2014. [Online]. Available: http://www.smartpls.com. [Accessed: 03- Jan-2015].
  6. [6] K. K.-K. Wong, “Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS,” Marketing Bulletin, vol. Technical Note, no. 1, 2013.
  7. [7] N. Merlo-Schett, M. Glinz, and A. Mukhija, “COCOMO,” presented at the Seminar on Software Cost Estimation, Zurich, Switzerland, 2002.
  8. [8] P. Johnson, R. Lagerstrom, M. Ekstedt, and M. Osterlind, IT Management with Enterprise Architecture. Stockholm, Sweden: Royal Institute of Technology, 2014.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Geoffrey Wekesa Chemwa This is me

Publication Date

March 1, 2016

Submission Date

-

Acceptance Date

-

Published in Issue

Year 2016 Volume: 5 Number: 1

APA
Chemwa, G. W. (2016). A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya. International Journal of Information Security Science, 5(1), 8-20. https://izlik.org/JA46HS96DH
AMA
1.Chemwa GW. A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya. IJISS. 2016;5(1):8-20. https://izlik.org/JA46HS96DH
Chicago
Chemwa, Geoffrey Wekesa. 2016. “A Model for Optimising Security in Public Key Infrastructure Solutions for EGovernment: A Case Study of Kenya”. International Journal of Information Security Science 5 (1): 8-20. https://izlik.org/JA46HS96DH.
EndNote
Chemwa GW (March 1, 2016) A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya. International Journal of Information Security Science 5 1 8–20.
IEEE
[1]G. W. Chemwa, “A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya”, IJISS, vol. 5, no. 1, pp. 8–20, Mar. 2016, [Online]. Available: https://izlik.org/JA46HS96DH
ISNAD
Chemwa, Geoffrey Wekesa. “A Model for Optimising Security in Public Key Infrastructure Solutions for EGovernment: A Case Study of Kenya”. International Journal of Information Security Science 5/1 (March 1, 2016): 8-20. https://izlik.org/JA46HS96DH.
JAMA
1.Chemwa GW. A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya. IJISS. 2016;5:8–20.
MLA
Chemwa, Geoffrey Wekesa. “A Model for Optimising Security in Public Key Infrastructure Solutions for EGovernment: A Case Study of Kenya”. International Journal of Information Security Science, vol. 5, no. 1, Mar. 2016, pp. 8-20, https://izlik.org/JA46HS96DH.
Vancouver
1.Geoffrey Wekesa Chemwa. A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya. IJISS [Internet]. 2016 Mar. 1;5(1):8-20. Available from: https://izlik.org/JA46HS96DH