Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Klaus Stranacher"'
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783319270296
WEBIST (Revised Selected Papers)
WEBIST (Revised Selected Papers)
Secure identification and authentication are essential processes for protecting access to services or applications. These processes are also crucial in new areas of application such as the cloud computing domain. Over the past years, several cloud id
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::346733fac3fa42448e9b28f83cbeced9
https://doi.org/10.1007/978-3-319-27030-2_9
https://doi.org/10.1007/978-3-319-27030-2_9
Publikováno v:
SACMAT
Unique identification and secure authentication of users are essential processes in numerous security-critical areas such as e-Government, e-Banking, or e-Business. Therefore, many countries (particularly in Europe) have implemented national eID solu
Publikováno v:
Advanced Information Systems Engineering ISBN: 9783642387081
Communications and Multimedia Security
Communications and Multimedia Security
Reliable and secure user identification and authentication are key enablers for regulating access to protected online services. Since cloud computing gains more and more importance, identification and authentication in and across clouds play an incre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2acfe2f04e34706e14ac287d5cad9b84
https://doi.org/10.1007/978-3-662-44885-4_8
https://doi.org/10.1007/978-3-662-44885-4_8
Publikováno v:
Public Administration and Information Technology ISBN: 9781461499817
Usability and security are crucial requirements of efficient e-Government services and applications. Given security requirements are mostly met by integration of approved cryptographic methods such as two-factor authentication and qualified electroni
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ed7f35c91873a25a5535082b22ae5435
https://doi.org/10.1007/978-1-4614-9982-4_4
https://doi.org/10.1007/978-1-4614-9982-4_4
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783662442999
WEBIST (Selected Papers)
WEBIST (Selected Papers)
Electronic signature are an important concept and crucial tool for security-critical applications. Employing the full potential of electronic signatures requires the availability of appropriate signature-verification tools. Today, a plethora of diffe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fecd68ec4b7c5fcb1997417ae977b593
https://doi.org/10.1007/978-3-662-44300-2_11
https://doi.org/10.1007/978-3-662-44300-2_11
Architectures and protocols for secure information technology are crucial to satisfy security requirements of current e-government solutions. Identity plays a central role in most e-government solutions, as users typically need to be reliably identif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::422d11735deed6a033fc2dc0c66248e1
https://doi.org/10.4018/978-1-4666-4514-1.ch011
https://doi.org/10.4018/978-1-4666-4514-1.ch011
Publikováno v:
Lecture Notes in Computer Science
12th International Conference on Electronic Government (EGOV)
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Lecture Notes in Computer Science ISBN: 9783642403576
12th International Conference on Electronic Government (EGOV)
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Lecture Notes in Computer Science ISBN: 9783642403576
Part 4: Adoption and Service Evaluation; International audience; Electronic signatures play an important role in e-Business and e-Government applications. In particular, electronic signatures fulfilling certain security requirements are legally equiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd93c505c3f1f198ccdc00ca677f42d8
https://hal.inria.fr/hal-01490913/document
https://hal.inria.fr/hal-01490913/document
Publikováno v:
Technology-Enabled Innovation for Democracy, Government and Governance ISBN: 9783642401596
EGOVIS/EDEM
EGOVIS/EDEM
Cloud computing has many advantages which also governments and public authorities can benefit from. Therefore, a couple of European countries have already adopted cloud computing in the public sector or are planning to do so. In this paper, we evalua
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b3863c3b73ed96430a17953535f0405
https://doi.org/10.1007/978-3-642-40160-2_15
https://doi.org/10.1007/978-3-642-40160-2_15
Publikováno v:
Technology-Enabled Innovation for Democracy, Government and Governance ISBN: 9783642401596
EGOVIS/EDEM
EGOVIS/EDEM
Identity management plays a key role in e-Government. Giving the increasing number of cloud applications, also in the field of e-Government, identity management is also vital in the area of cloud computing. Several cloud identity models have already
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b4bb734476290fca54aa4f2a532e74b
https://doi.org/10.1007/978-3-642-40160-2_5
https://doi.org/10.1007/978-3-642-40160-2_5
Publikováno v:
Technology-Enabled Innovation for Democracy, Government and Governance ISBN: 9783642401596
EGOVIS/EDEM
EGOVIS/EDEM
Interoperability and cross-border services are on the top of the agenda of the Digital Agenda for Europe and the e-Government action plan. Here, electronic signatures and their verification play a major role. Especially electronic signatures relying
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::09b16108419f8ad097eb3675974e4d16
https://doi.org/10.1007/978-3-642-40160-2_4
https://doi.org/10.1007/978-3-642-40160-2_4