11 research outputs found

    The Once-Only Principle

    Get PDF
    This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view

    Digital Governance and Privacy: The eDiplomas case study

    Get PDF
    Την τελευταία δεκαετία, ο τομέας της ιδιοκτησίας και του διαμοιρασμού δεδομένων ανάμεσα σε οντότητες με επίκεντρο την ιδιωτικότητα και την ασφάλεια, χαίρει ιδιαίτερης προσοχής. Η παρούσα πτυχιακή εξετάζει την ανταλλαγή δεδομένων ανάμεσα σε άτομα, κυβερνητικούς φορείς και εταιρείες, μέσα από το πρίσμα του eDiplomas, μιας πλατφόρμας υλοποιημένης από τα ελληνικά Πανεπιστήμια και το GUnet που επιτρέπει το διαμοιρασμό και τον έλεγχο αυθεντικότητας ψηφιακών τίτλων σπουδών με χρήση εξουσιοδοτήσεων OAuth2 και άλλων σύγχρονων τεχνολογιών. Στη συνέχεια, η πτυχιακή εξετάζει λύσεις τελευταίας τεχνολογίας στον τομέα ανταλλαγής και επιβεβαίωσης δεδομένων που δεν είναι σε παραγωγικό επίπεδο ακόμα, αλλά παρουσιάζουν ενδιαφέρον για το μέλλον.The subject of data ownership and sharing between entities in a privacy-respecting and secure manner has become of great interest over the last decade. The current thesis examines the exchange of an individual’s data with government entities and corporations through the lens of eDiplomas, a platform implemented by the Greek Universities and GUnet to facilitate sharing and validation of digital diplomas using OAuth2 authorization and other modern technologies. The thesis also explores state-of-the-art data exchange and verification solutions that are not production ready yet, but look promising for the near future

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    The Proceedings of the 23rd Annual International Conference on Digital Government Research (DGO2022) Intelligent Technologies, Governments and Citizens June 15-17, 2022

    Get PDF
    The 23rd Annual International Conference on Digital Government Research theme is “Intelligent Technologies, Governments and Citizens”. Data and computational algorithms make systems smarter, but should result in smarter government and citizens. Intelligence and smartness affect all kinds of public values - such as fairness, inclusion, equity, transparency, privacy, security, trust, etc., and is not well-understood. These technologies provide immense opportunities and should be used in the light of public values. Society and technology co-evolve and we are looking for new ways to balance between them. Specifically, the conference aims to advance research and practice in this field. The keynotes, presentations, posters and workshops show that the conference theme is very well-chosen and more actual than ever. The challenges posed by new technology have underscored the need to grasp the potential. Digital government brings into focus the realization of public values to improve our society at all levels of government. The conference again shows the importance of the digital government society, which brings together scholars in this field. Dg.o 2022 is fully online and enables to connect to scholars and practitioners around the globe and facilitate global conversations and exchanges via the use of digital technologies. This conference is primarily a live conference for full engagement, keynotes, presentations of research papers, workshops, panels and posters and provides engaging exchange throughout the entire duration of the conference

    Digital Innovation Hubs as policy instruments to boost digitalisation of SMEs: A Practical Handbook & Good Practices for regional/national policy makers and DIH Managers

    Get PDF
    Building upon the knowledge gained during the last two years on how Digital Innovation Hubs (DIHs) operate in different regional socioeconomic contexts, this practical handbook aims to provide national/regional policy makers and/or existing DIH managers useful and structured information on how to setup a new DIH or reinforce existing ones while benefiting from available funds with a special focus to the European Regional Development Fund (ERDF) 2021-2027. Given the urgent need of SMEs and public administrations to rapidly deploy advanced digital technologies to mitigate the negative consequences of the recent COVID19 crisis to their businesses, the role of DIHs is more important than ever. The Handbook introduces a step-by-step approach to provide support to policy makers that envisage strengthening DIHs in their regions/countries with a view to accelerate digital transformation of the economy and society. This approach allows to use the Handbook as a reference tool depending on the specific needs and level of implementation of DIHs. The practical character of the Handbook is enhanced with the inclusion of many examples that highlight good practices in the different steps of the proposed methodology.JRC.B.3-Territorial Developmen

    State of the art of electronic signatures

    Get PDF
    Die Sicherheit von elektronischer Kommunikation und von Transaktionen ist ein kritisches Thema heutzutage. Um Verträge online abzuschließen ist ein hoher Sicherheitsstandard notwendig und das Thema „Digitale Signatur" damit ein integrativer Bestandteil jeder digitalen Geschäftsdurchführung. In diesem Zusammenhang wurden 44 Länder untersucht, darunter alle 27 EU-Mitgliedsstaaten, 3 Bewerberländer und 14 weitere europäische Staaten und in einer strukturierten Zusammenschau in den Dimensionen rechtliche Rahmenbedingungen, technische Standards und Marktdurchdringung zusammengefasst. Um einen allgemeinen Eindruck über die aktuelle Situation in jedem Land zu gewinnen, wurde eine erste Internetrecherche gestartet, ein Fragenkatalog zusammengestellt und per e-Mail ausgesandt, sowie Kontakte mit verschiedenen Institutionen und Unternehmen aufgebaut. Die eingeholten Informationen wurden in der Studie zusammengefasst. Zum Zweck der Übersichtlichkeit wurde die Studie stark strukturiert und subjektive Interpretationen bewusst ausgelassen um die Fakten für sich sprechen zu lassen. Die Vollständigkeit der gesammelten Daten wird reflektiert in der Länderklassifikation. Um einen raschen Überblick zu erlangen wurde am Ende jeder Länderanalyse eine Tabelle erstellt, welche die Entwicklung des Landes in Bezug auf digitale Signaturstandards zusammenfasst, sowie eine Bewertung in Hinblick auf verfügbare Information und Entwicklungsstand enthält. Die aktuelle Studie demonstriert auf deutliche Art und Weise, dass es keine globale Implementierung von digitaler Signatur bis jetzt erreicht wurde, hauptsächlich durch eine technische Interoperabilität der Systeme, Prozesse und Konfigurationen, wobei die rechtlichen Rahmenbedingungen nicht das Hindernis sind. Es ist nicht schwer zu verstehen, dass eine grenzüberschreitende Adoption der digitalen Signatur nicht auf dies Art und Weise realisierbar ist.Today we live in an e-era, where the topic of Internet security and safety is inevitable. To realize a secure transaction and contract signing via Internet, it is necessary to give a great attention to the subject of digital signatures. In this context, 44 countries have been surveyed (27 EU member countries, 3 EU-member candidates, 14 other European countries) and a structured synopsis has been compiled in the dimensions legal framework, technical standards and market penetration. To obtain a general idea about the current state in the country, an Internet research was started. Furthermore, a list of questions was sent out via e-mail to different companies and agencies and a lot of contacts were established. The collected information was pulled together and compiled in the following study. For purpose of clarity, the study is structured in-depth and subjective interpretations are left out to let the facts speak for themselves. To gain a fast overview, tables sum up the countries development concerning electronic signature standards and rating them in regard of available information and development in different categories. The present study demonstrates quite clearly that no wide-area implementation of digital signatures has been achieved yet, mostly because of lacking technical interoperability of systems, processes and configurations, while the uniform legal framework is certainly not the barrier. It is not very hard to understand that the benefits of a broad adoption of digital signature in the European economic area cannot be realized this way
    corecore