5 research outputs found

    Trustworthy Cross-Border Interoperable Identity System for Developing Countries

    Full text link
    Foundational identity systems (FIDS) have been used to optimise service delivery and inclusive economic growth in developing countries. As developing nations increasingly seek to use FIDS for the identification and authentication of identity (ID) holders, trustworthy interoperability will help to develop a cross-border dimension of e-Government. Despite this potential, there has not been any significant research on the interoperability of FIDS in the African identity ecosystem. There are several challenges to this; on one hand, complex internal political dynamics have resulted in weak institutions, implying that FIDS could be exploited for political gains. On the other hand, the trust in the government by the citizens or ID holders is habitually low, in which case, data security and privacy protection concerns become paramount. In the same sense, some FIDS are technology-locked, thus interoperability is primarily ambiguous. There are also issues of cross-system compatibility, legislation, vendor-locked system design principles and unclear regulatory provisions for data sharing. Fundamentally, interoperability is an essential prerequisite for e-Government services and underpins optimal service delivery in education, social security, and financial services including gender and equality as already demonstrated by the European Union. Furthermore, cohesive data exchange through an interoperable identity system will create an ecosystem of efficient data governance and the integration of cross-border FIDS. Consequently, this research identifies the challenges, opportunities, and requirements for cross-border interoperability in an African context. Our findings show that interoperability in the African identity ecosystem is vital to strengthen the seamless authentication and verification of ID holders for inclusive economic growth and widen the dimensions of e-Government across the continent.Comment: 18 pages, 4 figures, In 2023 Trustworthy Digital Identity International Conference, Bengaluru, Indi

    The Once-Only Principle

    Get PDF
    This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view

    Analysis of ICT solutions integration for tracking purposes in container terminal management and operation

    Get PDF
    El tr谩fico mar铆timo de mercanc铆as est谩 experimentando un crecimiento acelerado principalmente debido a la globalizaci贸n de la econom铆a y la liberalizaci贸n del comercio internacional. El principal prop贸sito de este proyecto es: en primer lugar, analizar los efectos de introducir sistemas TIC (Tecnolog铆as de la Informaci贸n y Comunicaci贸n) de seguimiento en la operaci贸n de la terminal; y en segundo lugar, proponer un m茅todo para normalizar el funcionamiento de los procesos que tienen lugar en una terminal de contenedores, permitiendo una buena organizaci贸n operativa de futuras implementaciones de terminales automatizadas

    A File System for System Programming in Ubiquitous Computing

    Full text link

    eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity

    No full text
    Abstract. Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to take over this functionality and provide better, more fine grained, more automated and more secure supervision. This paper presents eSeal, a system with a computational device at its core that can be attached to a good, services in the network and a communication protocol. The system is able to control various kinds of integrity settings and to notify authenticated instances about consequent violations of integrity. The system works without infrastructure so that goods can be supervised that are only accessible in certain locations. The paper motivates the eSeal system and its design decisions, lists several types of integrity scenarios, presents the communication protocol and identifies practical conditions for design and implementation. An implementation in a business relevant scenario is presented as a proof of concept. 1
    corecore