30 research outputs found
Current Trends in Pan-European Identity Management Systems
The demand for electronic identity has grown as a result of governments? promotion of e-Government, in which the citizen-public administration relationship often has a strictly personal nature and requires digital identification systems that are univocal, secure, and global. The management of this identity by public administrations is an important challenge, accentuated when interoperability among public administrations of different countries become necessary. In this paper current trends in pan-euroean identity management systems are analysized and a outlook of the future European scenary is shown
State of the art of electronic signatures
Die Sicherheit von elektronischer Kommunikation und von Transaktionen ist ein kritisches Thema heutzutage. Um Verträge online abzuschließen ist ein hoher Sicherheitsstandard notwendig und das Thema „Digitale Signatur" damit ein integrativer Bestandteil jeder digitalen Geschäftsdurchführung.
In diesem Zusammenhang wurden 44 Länder untersucht, darunter alle 27 EU-Mitgliedsstaaten, 3 Bewerberländer und 14 weitere europäische Staaten und in einer strukturierten Zusammenschau in den Dimensionen rechtliche Rahmenbedingungen, technische Standards und Marktdurchdringung zusammengefasst.
Um einen allgemeinen Eindruck ĂĽber die aktuelle Situation in jedem Land zu gewinnen, wurde eine erste Internetrecherche gestartet, ein Fragenkatalog zusammengestellt und per e-Mail ausgesandt, sowie Kontakte mit verschiedenen Institutionen und Unternehmen aufgebaut.
Die eingeholten Informationen wurden in der Studie zusammengefasst. Zum Zweck der Ăśbersichtlichkeit wurde die Studie stark strukturiert und subjektive Interpretationen bewusst ausgelassen um die Fakten fĂĽr sich sprechen zu lassen.
Die Vollständigkeit der gesammelten Daten wird reflektiert in der Länderklassifikation.
Um einen raschen Überblick zu erlangen wurde am Ende jeder Länderanalyse eine Tabelle erstellt, welche die Entwicklung des Landes in Bezug auf digitale Signaturstandards zusammenfasst, sowie eine Bewertung in Hinblick auf verfügbare Information und Entwicklungsstand enthält.
Die aktuelle Studie demonstriert auf deutliche Art und Weise, dass es keine globale Implementierung von digitaler Signatur bis jetzt erreicht wurde, hauptsächlich durch eine technische Interoperabilität der Systeme, Prozesse und Konfigurationen, wobei die rechtlichen Rahmenbedingungen nicht das Hindernis sind. Es ist nicht schwer zu verstehen, dass eine grenzüberschreitende Adoption der digitalen Signatur nicht auf dies Art und Weise realisierbar ist.Today we live in an e-era, where the topic of Internet security and safety is inevitable. To realize a secure transaction and contract signing via Internet, it is necessary to give a great attention to the subject of digital signatures.
In this context, 44 countries have been surveyed (27 EU member countries, 3 EU-member candidates, 14 other European countries) and a structured synopsis has been compiled in the dimensions legal framework, technical standards and market penetration.
To obtain a general idea about the current state in the country, an Internet research was started. Furthermore, a list of questions was sent out via e-mail to different companies and agencies and a lot of contacts were established.
The collected information was pulled together and compiled in the following study.
For purpose of clarity, the study is structured in-depth and subjective interpretations are left out to let the facts speak for themselves.
To gain a fast overview, tables sum up the countries development concerning electronic signature standards and rating them in regard of available information and development in different categories.
The present study demonstrates quite clearly that no wide-area implementation of digital signatures has been achieved yet, mostly because of lacking technical interoperability of systems, processes and configurations, while the uniform legal framework is certainly not the barrier. It is not very hard to understand that the benefits of a broad adoption of digital signature in the European economic area cannot be realized this way
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
The State of the Electronic Identity Market: Technologies, Infrastructure, Services and Policies
Authenticating onto systems, connecting to mobile networks and providing identity data to access services is common ground for most EU citizens, however what is disruptive is that digital technologies fundamentally alter and upset the ways identity is managed, by people, companies and governments. Technological progress in cryptography, identity systems design, smart card design and mobile phone authentication have been developed as a convenient and reliable answer to the need for authentication. Yet, these advances ar enot sufficient to satisfy the needs across people's many spheres of activity: work, leisure, health, social activities nor have they been used to enable cross-border service implementation in the Single Digital Market, or to ensure trust in cross border eCommerce. The study findings assert that the potentially great added value of eID technologies in enabling the Digital Economy has not yet been fulfilled, and fresh efforts are needed to build identification and authentication systems that people can live with, trust and use. The study finds that usability, minimum disclosure and portability, essential features of future systems, are at the margin of the market and cross-country, cross-sector eID systems for business and public service are only in their infancy. This report joins up the dots, and provides significant exploratory evidence of the potential of eID for the Single Digital Market. A clear understanding of this market is crucial for policy action on identification and authentication, eSignature and interoperability.JRC.DDG.J.4-Information Societ
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
The Once-Only Principle
This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view
Identity Management in Information Age Government: Exploring Concepts, Definitions, Approaches and Solutions
Our research question is the following:
What could be a useful working definition of Identity Management in government at present?
a) What are conceptualisations, definitions and approaches of IDM in government according to academic literature?
b) Which e-authentication solutions have been developed in other jurisdictions
ESIIG2
331 p. , Il, Tablas, Gráficos.Libro ElectrónicoESIIG2 - The Second European Summit on Interoperability in the iGovernment, represents an unprecedented occasion to develop new synergies and create contacts with representatives of the European Commission, of the national and regional governments of Europe, of the research field, the Academia and experts of the ICT sector.
Mrs Viviane Reding, Member of the European Commission for Information Society and Media gave her official patronage to the Second European Summit of Interoperability in the iGovernment, ESIIG2.
Event with the patronage CISIS (Italian Interregional Centre of Information and Statistic Systems)
The European Commission initiative i2010, through the DG Information and Media Society offered its support to ESIIG2.ForewordXI
ESIIG 3
What is ESIIG2? 3
Commissioner Reding message 4
ESIIG 2 Co - hosted events5
The Programme 6
ESIIG2 Supporters8
The Regional Ministry for consumer protection and administrative simplification13
The Technical and Scientific Committee15
Structure of the Technical and Scientific Committee15
What does the Committee do?15
Important and innovative initiatives of ESIIG 219
Publication of the Call for Papers Results23
T-Seniority: E-inclusion and Interoperability25
Alejandro Echeverria
Security and Privacy Preserving Data in E-Government Integration31
Claudio Biancalana, Francesco Saverio Profiti
Proposal for Interoperability Between Public Universities39
Correcher E, Universidad Politécnica de Valencia, Spain
A Cross-Application Reference Model to Support Interoperability 53
Elena Baralis, Tania Cerquitelli, Silvana Raffa
Table of Contents
VII
Applying Soa to Mobile Secure eGovernment Services The Sweb Approach65
Silke Cuno, Yuri Glickman, Petra Hoepner, Linda Strick
An Identity Metasystem Approach to Improve Eid Interoperability and Assure
Privacy Compliance 74
Andrea Valboni
Towards Interoperable Infrastructures of Geospatial Data 86
Sergio Farruggia, Emanuele Roccatagliata
Modernization and Administrative Simplification Master Plan
for the Local Councils of the Region of Murcia 101
Leandro MarĂn Muñoz, Pedro Olivares Sánchez, Isabel Belmonte MartĂnez
Organizational Interoperability and Organizing for Interoperability in eGovernment109
Ralf Cimander, Herbert Kubicek
The National Interoperability Framework: a New Regulatory Tool to Guarantee
Interoperability Among Spanish Public Administrations 123
AgustĂ Cerrillo
The Realization of the Greek E-Gif 131
Andreas Papadakis, Kostas Rantos, Antonis Stasis
Build Government Interoperability Through Open Standard Technology 141
Goodwin Ting, Anne Rasanen, Marco Pappalardo
Towards an Intercultural Representation of Mediterranean Intangible Cultural
Heritage (Ich) An Xml Interoperability Framework for Regional Ich Databases 154
Jesse Marsh, Francesco Passantino
Castile and Leon, a Model of Interoperability 168
Isabel Alonso Sánchez, José Ignacio de Uribe Ladrón de Cegama,
Antonio Francisco Pérez Fernández, Jorge Ordás Alonso
The Catalan Interoperability Model182
Ignasi Albors
Identity and Residence Verification Data System189
Nimia RodrĂguez Escolar, Jose A Eusamio Mazagatos
From Extended Enterprise to Extended Government: Regione Lazio
Interoperability and Egovernment Point of View 199
Claudio Biancalana, Dante Chiroli, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi
Contribution by the Members of the Technical and Scientific Committee 215
Interoperability and Egovernment Through Adoption of Standards 215
Flavia Marzano
A Brief Compendium on Interoperability in Egovernment 224
Michele M Missikoff
Table of Contents
VIII
Spc – The Italian Interoperabilty Framework with Services241
Francesco Tortorelli, Roberto Baldoni
Exploitation of Digital Contents for the Public Administration 254
Giulio De Petra, Fabrizio Gianneschi, Giaime Ginesu
Deploying the full transformational power of egovernment
– collaboration and interoperability –270
Sylvia Archmann, Just Castillo Iglesias
ICAR Report: Interoperability and Cooperation between applications among
Italian Regions (English summary)278
CISIS - Central Staff of ICAR Project
List of the finalists of the iG20 Award 297
IG20 AWARDS: Eucaris, the European car and driving licence
information system297
INNOVATIVNESS: Interopcyl299
TRANSFERABILITY: Semic, Semantic Interoperability
Center Europe301
IMPACT: Employment/unemployment status management:
actual interoperability through the CO eService303
PRACTICAL RESULTS: Emilia Romagna Labour Information System 305
The ESIIG2 Summit results: the creation of ERNI and the Interoperability
Declaration of Rome 309
The Interoperability Declaration of Rome 311
Follow the new and interesting developments of Esiig2 31
Methodology for enterprise interoperability assessment
Dissertação para obtenção do Grau de Mestre em
Engenharia Electrotécnica e de ComputadoresWith the evolution of modern enterprises and the increasing market competitiveness, the creation of ecosystems with large amounts of data and knowledge generally needing to be exchanged electronically, is arising. However, this enterprise inter and intra-connectivity is suffering from interoperability issues. Not visible when it is effective, the lack of interoperability poses a series of challenging problems to the industrial community, which can reduce the envisaged efficiency and increase costs. Those problems are mostly caused by misinterpretations of data at the systems level, but problems at the organizational and human levels may pose equivalent difficulties. Existing research and technology provides several frameworks to assist the development of collaborative environments and enterprise networks with well-defined methods to facilitate interoperability. Nonetheless, the interoperability process is not guaranteed and is not easily sustainable, changing upon frequent market and requirement variations. For these reasons, there is a need for a testing methodology to assess the capability of enterprises to cooperate at a certain point in time. This dissertation proposes a methodology to assess that capability, with a corresponding framework to evaluate the interoperability process, applying eliminatory tests to assess the structure of the organizations, the conceptual models and their implementation. This work contributes to increase the chances enterprises have of interoperating effectively, and enables the adoption of extraordinary measures to improve their current interoperability situation