5 research outputs found
Trustworthy Cross-Border Interoperable Identity System for Developing Countries
Foundational identity systems (FIDS) have been used to optimise service
delivery and inclusive economic growth in developing countries. As developing
nations increasingly seek to use FIDS for the identification and authentication
of identity (ID) holders, trustworthy interoperability will help to develop a
cross-border dimension of e-Government. Despite this potential, there has not
been any significant research on the interoperability of FIDS in the African
identity ecosystem. There are several challenges to this; on one hand, complex
internal political dynamics have resulted in weak institutions, implying that
FIDS could be exploited for political gains. On the other hand, the trust in
the government by the citizens or ID holders is habitually low, in which case,
data security and privacy protection concerns become paramount. In the same
sense, some FIDS are technology-locked, thus interoperability is primarily
ambiguous. There are also issues of cross-system compatibility, legislation,
vendor-locked system design principles and unclear regulatory provisions for
data sharing. Fundamentally, interoperability is an essential prerequisite for
e-Government services and underpins optimal service delivery in education,
social security, and financial services including gender and equality as
already demonstrated by the European Union. Furthermore, cohesive data exchange
through an interoperable identity system will create an ecosystem of efficient
data governance and the integration of cross-border FIDS. Consequently, this
research identifies the challenges, opportunities, and requirements for
cross-border interoperability in an African context. Our findings show that
interoperability in the African identity ecosystem is vital to strengthen the
seamless authentication and verification of ID holders for inclusive economic
growth and widen the dimensions of e-Government across the continent.Comment: 18 pages, 4 figures, In 2023 Trustworthy Digital Identity
International Conference, Bengaluru, Indi
The Once-Only Principle
This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view
Analysis of ICT solutions integration for tracking purposes in container terminal management and operation
El tr谩fico mar铆timo de mercanc铆as est谩 experimentando un crecimiento acelerado principalmente debido a la globalizaci贸n de la econom铆a y la liberalizaci贸n del comercio internacional. El principal prop贸sito de este proyecto es: en primer lugar, analizar los efectos de introducir sistemas TIC (Tecnolog铆as de la Informaci贸n y Comunicaci贸n) de seguimiento en la operaci贸n de la terminal; y en segundo lugar, proponer un m茅todo para normalizar el funcionamiento de los procesos que tienen lugar en una terminal de contenedores, permitiendo una buena organizaci贸n operativa de futuras implementaciones de terminales automatizadas
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Abstract. Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to take over this functionality and provide better, more fine grained, more automated and more secure supervision. This paper presents eSeal, a system with a computational device at its core that can be attached to a good, services in the network and a communication protocol. The system is able to control various kinds of integrity settings and to notify authenticated instances about consequent violations of integrity. The system works without infrastructure so that goods can be supervised that are only accessible in certain locations. The paper motivates the eSeal system and its design decisions, lists several types of integrity scenarios, presents the communication protocol and identifies practical conditions for design and implementation. An implementation in a business relevant scenario is presented as a proof of concept. 1