Index | |
Chapter 1 Introduction……………………………………………………………… | 3 |
Chapter 2 Benefits……………………………………………………………………… | 5 |
2.1 Problem with Paper Passport……………………………………………. | 5 |
2.2 Benefits of ePassport…………………………………………………………. | 5 |
Chapter 3 Mechanism……………………………………………………………….. | 6 |
3.1 Characteristics of ePassport System………………………………… | 7 |
Chapter 4 Issues………………………………………………………………………… | 8 |
4.1 Performance issues……………………………………………………………. | 8 |
4.2 Security issues………………………………………………………………….. | 8 |
4.3 Privacy Issues…………………………………………………………………… | 9 |
4.4 Cultural issues………………………………………………………………….. | 9 |
Chapter 5 Applying System Theory……………………………………….. | 10 |
5.1 ePassport under Churchman’s model……………………………… | 10 |
5.1.1 Objective…………………………………………………………………. | 10 |
5.1.2 Environment…………………………………………………………… | 10 |
5.1.3 Resource………………………………………………………………………… | 11 |
5.1.4 Component……………………………………………………………………. | 11 |
5.1.5 Management…………………………………………………………………. | 11 |
5.2 The Systemic Holistic Model…………………………………………….. | 11 |
5.2.2 Content subject areas……………………………………………………. | 12 |
5.2.2 Levels of abstraction……………………………………………………. | 12 |
5.2.2 Context orientation………………………………………………………. | 12 |
5.3 Cost and benefits of e-passport………………………………………… | 13 |
5.4 Boulding’s classification……………………………………………………… | 14 |
5.5 Shannon Weaver Model…………………………………………………. | 15 |
Chapter 6 Security……………………………………………………………………. | 16 |
6.1 Main attacks to ePassport…………………………………………….. | 16 |
6.2 Main Solutions for ePassport……………………………………………. | 17 |
6.3 Attacks and Solutions reciprocal diagram……………………… | 18 |
6.4 security scheme for ePassport in different countries…….. | 19 |
Chapter 7 Conclusion…………………………………………………………… | 20 |
Chapter 8 References…………………………………………………………… | 21 |
Abstract
In this era of Information Technology, we try to maintain information technically. The attempt which is made to maintain is not always efficient or effective. Information is always prone to some risk. Person’s identity, passwords, secrets are very tedious to maintain. Personal identity indicates a set of attributes which are related with a person e.g. Family name, Personal number, Birth Date etc… Now a day, one of the toughest tasks is to manage the identity of a human being because most of the time it needs person authentication, where the main purpose is to either verify or identify person’s identity claim. From the very beginning of the human history, we have seen many evidences where human tried to develop many techniques to serve the above purpose.
Click here to download (NB: You should register first)
[download id=”1″]