Description |
1 online resource (98 pages) |
Series |
SpringerBriefs in Cybersecurity |
|
SpringerBriefs in cybersecurity.
|
Contents |
Foreword; Contents; 1 Legal Aspects; Abstract; 1.1 ... Introduction; 1.2 ... Definitions and Terminology; 1.2.1 What Is Identity Anyway?; 1.2.2 eID 101; 1.2.3 Terminology; 1.3 ... Relevance of eID; 1.4 ... How Is eID Regulated?; 1.4.1 Context: From IDs to eIDs; 1.4.2 The E-Signature Directive in a Nutshell; 1.5 ... How Will eID Be Regulated? Next Steps; 1.5.1 EU Policy and Legislative Initiatives in the Field of eID; 1.5.2 Revising the Electronic Signatures Directive to Propose an Electronic Trust Services Regulation; 1.6 ... Toward a European eID Regulatory Framework; 1.6.1 Legal and Technical Barriers |
|
1.6.1.1 The Diversity of Technical and Legal Approaches to eID, the Proliferation of Identity Management Systems and the Emergence of New Actors1.6.1.2 EU Legal Competences; 1.6.1.3 Control Over Personal Data; 1.6.1.4 Lack of Common Taxonomy; 1.6.2 Legal Solutions; 1.6.2.1 Principle of User-Centricity; 1.6.2.2 Principle of Multiple Identities; 1.6.2.3 Principle of Anonymity and Pseudonymity; 1.6.2.4 Principle of Unlinkability; 1.6.2.5 Principle of Negotiation; 1.6.2.6 Principle of Portability; 1.6.2.7 The Authentication Source Principle; 1.6.2.8 Principle of Technological Assistance |
|
1.7 ... ConclusionReferences; 2 ''eCert'' Improving the Security and Controllability of Digitally Signed Documents; Abstract; 2.1 ... Introduction; 2.1.1 Digital Signing and Its Limitations; 2.1.1.1 Public Key Certificate Status Validation; 2.1.1.2 eDocument Content Validation; 2.1.1.3 eDocument Status Validation; 2.1.2 Existing Systems Related to eCertificates; 2.1.2.1 Europe: The Europass; 2.1.2.2 China: The HEQC; 2.1.2.3 ROI: Digitary; 2.1.2.4 Research System: The eCert-GDP2008 Project; 2.1.2.5 System Comparison and Analysis; 2.1.3 Domain Expert Advice; 2.1.4 The Challenges and Plan |
|
2.2 ... Development of the eCertificate System2.2.1 Common Usage Patterns; 2.2.2 Stakeholder Analysis; 2.2.3 Use Case; 2.2.4 Gap Analysis; 2.2.4.1 Gaps in Related Technology; 2.2.4.2 Technical Requirements; 2.2.5 Service Profile; 2.2.6 Approaches for Meeting the Requirements; 2.2.7 System Structure Development; 2.2.7.1 Approach 1: Existing Transmission Process; 2.2.7.2 Approach 2: Institution-Based Transmission; 2.2.7.3 Approach 3: Central Service and Storage; 2.2.7.4 Approach 4: Central Service Only; 2.2.7.5 The Chosen Approach; 2.2.7.6 The eCert System Structure Design; 2.2.8 Core Design |
|
2.2.8.1 Systems and Relationships2.2.8.2 File Structure; 2.2.8.3 The eCert Signature; 2.2.8.4 System Authentication and Verification; 2.2.9 The Implemented System; 2.2.10 System Demonstrator; 2.2.10.1 The Back End: Code Library; 2.2.10.2 The Front End: Online Demonstrator; 2.2.11 eCert System Testing; 2.2.12 Summary of Outcomes; 2.3 ... Evaluation Through ePortfolio Systems and the Delphi Method; 2.3.1 Evaluation Through Integrating eCert into ePortfolios; 2.3.1.1 The Selected ePortfolio Systems; 2.3.1.2 Systems Integration Analysis; 2.3.1.3 The Challenge; 2.3.1.4 Development; 2.3.1.5 Results |
Summary |
With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential. Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy. In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent |
Notes |
2.3.2 Evaluation Through Delphi Methodology |
|
Print version record |
Subject |
Digital signatures -- Law and legislation -- European Union countries
|
|
Identification -- Law and legislation -- Germany
|
|
Computer security -- European Union countries
|
|
Computer security
|
|
Digital signatures -- Law and legislation
|
|
Identification -- Law and legislation
|
|
European Union countries
|
|
Germany
|
Form |
Electronic book
|
Author |
Chen-Wilson, Lisha
|
|
Argles, David
|
|
Wills, Gary
|
|
Zenise, Michele Schiano di
|
ISBN |
9781447164494 |
|
1447164490 |
|