Schemes for Data and User Authentication in Distributed GIS

  • Sergey ShtankoEmail author
  • Andrey Pankin
Conference paper
Part of the Lecture Notes in Geoinformation and Cartography book series (LNGC)


The paper specifies approaches to the realization of data and user authentication functions in distributed GIS, allowing for avoiding the existing protocols’ disadvantages, and thus accounting for the requirements for the geographical information system (GIS) safety. The authors propose the method of user’s private key storing at the server for the cases when the private key storing cannot be realized at the user’s end. A method binding the user’s identification process to the geographical location is proposed.


Distributed GIS Electronic digital signature Authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zima VM, Moldovyan AA, Moldovyan NA (2003) The Global Network Technologies Safety (in Russian). BHV-Petersburg, St. Petersburg, RussiaGoogle Scholar
  2. 2.
    Stallings W (2001) Cryptography and Network Security: Principles and Practice (in Russian). Williams Publishing House, Moscow, RussiaGoogle Scholar
  3. 3.
    Ivanov MA (2001) Cryptographic Methods of Information Protection in Computer Systems and Networks (in Russian). KUDITS-OBRAS, Moscow, RussiaGoogle Scholar
  4. 4.
    Moldovyan NA, Moldovyan AA (2005) Introduction in Cryptosystems with Public Key (in Russian). BHV-Petersburg, St. Petersburg, RussiaGoogle Scholar
  5. 5.
    Rostovtsev AG, Makhovenko EB (2001) Introduction in Cryptography with Public Key (in Russian). Mir i Semya, St. Petersburg, RussiaGoogle Scholar
  6. 6.
    Schneier B (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Willey & Sons, New York, USAGoogle Scholar
  7. 7.
    BarkerE, BarkerW, BurrW, PolkW, SmidM (2006) NIST Special Publication 800-57, Recommendation for Key Management.
  8. 8.
    FrankelS, HoffmanP, OrebaughA, ParkR (2008) NIST Special Publication 800-113, Guide to SSL VPNs,
  9. 9.
    Hankerson D, Menezes A, Vanstone SA (2004) Guide to Elliptic Curve Cryptography. Springer-Verlag, Berlin Heidelberg New YorkGoogle Scholar
  10. 10.
    Anoop MS (2007) Elliptic Curve Cryptography - An Implementation Tutorial. Tata Elxsi, IndiaGoogle Scholar
  11. 11.
    The Case for Elliptic Curve Cryptography. National Security Agency.
  12. 12.
    JavaTM Cryptography Architecture. API Specification & Reference.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  1. 1.St. Petersburg Institute for Informatics and Automation of the RASPetersburgRussia

Personalised recommendations