Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Bernd Zwattendorfer"'
Publikováno v:
Electronic Government, an International Journal. 16:1
Cloud computing promises various advantages compared to classical provisioning models and is therefore highly interesting for e-government services. For security and data protection reasons, adoption of cloud computing in public sectors has focused o
Autor:
Daniel Slamanig, Bernd Zwattendorfer
Publikováno v:
Computers & Security. 52:178-193
Secure identification and authentication are essential processes in sensitive areas of application such as e-Government or e-Health. In Austria, the official eID is the so called the Austrian citizen card and a means of choice for secure citizen iden
Autor:
Bernd Zwattendorfer, Arne Tauber
Publikováno v:
International Journal of Distributed Systems and Technologies. 4:1-14
Cloud computing and its flexible business model of consuming IT resources such as computing power or data storage just on demand promises a lot of benefits and advantages. These advantages also the public sector and governments can benefit from. Henc
Autor:
Thomas Lenz, Bernd Zwattendorfer
Publikováno v:
Trustcom/BigDataSE/ISPA
Identification, authentication, and authorization are essential processes in various areas of applications, where access to sensitive data needs to be protected and regulated. To achieve this, usually identity-management systems are put into place, w
Publikováno v:
2016 11th International Conference on Availability, Reliability and Security (ARES)
ARES
ARES
Data sharing – and in particular sharing of identity information – plays a vital role in many online systems. While in closed and trusted systems security and privacy can be managed more easily, secure and privacy-preserving data sharing as well
Autor:
Bernd Zwattendorfer, Thomas Lenz
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783319309958
WEBIST (Revised Selected Papers)
WEBIST (Revised Selected Papers)
Identity-management systems play a key role in various areas of applications and e-Government processes where access to sensitive data needs to be protected. To protect this sensitive data, the identity-management system provides all necessary functi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e176263cc2d11c39112d4e351a1d8e9
https://doi.org/10.1007/978-3-319-30996-5_7
https://doi.org/10.1007/978-3-319-30996-5_7
Autor:
Daniel Slamanig, Bernd Zwattendorfer
Publikováno v:
Journal of Information Security and Applications
The Austrian eID system constitutes a main pillar within the Austrian e-Government strategy. The eID system ensures unique identification and secure authentication for citizens protecting access to applications where sensitive and personal data is in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e3cb81de90ac06fcd446f35574cdd6f1
Autor:
Bernd Zwattendorfer, Thomas Lenz
Publikováno v:
WEBIST
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783319270296
WEBIST (Revised Selected Papers)
WEBIST (Revised Selected Papers)
Secure identification and authentication are essential processes for protecting access to services or applications. These processes are also crucial in new areas of application such as the cloud computing domain. Over the past years, several cloud id
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::346733fac3fa42448e9b28f83cbeced9
https://doi.org/10.1007/978-3-319-27030-2_9
https://doi.org/10.1007/978-3-319-27030-2_9
Autor:
Bernd Zwattendorfer
Publikováno v:
WEBIST