Zobrazeno 1 - 10
of 133
pro vyhledávání: '"Thomas Zefferer"'
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 8, Pp 81-96 (2016)
Achieving interoperability, i.e. creating identity federations between different Electronic identities (eID) systems, has gained relevance throughout the past years. A serious problem of identity federations is the missing harmonization between vario
Externí odkaz:
https://doaj.org/article/4938c68bc4b34d0fb299bed6db7857c5
Publikováno v:
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)
Identity management is crucial for any electronic service that needs to authenticate its users. Different identity-management models have been introduced and rolled out on a large scale during the past decades. Key distinguishing criteria of these mo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::78c4c9cf2c55c242558b0d4a8bdd0e4d
Autor:
Andreea Ancuta Corici, Blaz Podgorelec, Thomas Zefferer, Detlef Hühnlein, Jordi Cucurull, Hans Graux, Stefan Dedovic, Bogdan Romanov, Carsten Schmidt, Robert Krimmer
Publikováno v:
dg.o 2022: DG.O 2022: The 23rd Annual International Conference on Digital Government Research
DG.O 2022: The 23rd Annual International Conference on Digital Government Research
DG.O 2022: The 23rd Annual International Conference on Digital Government Research
In times where personal contacts must be reduced and in-person meetings and appointments have become difficult, electronic services are continuously gaining relevance. This especially applies to the public-sector domain, where e-government services h
Publikováno v:
Future Generation Computer Systems. 92:1-16
Personalized electronic services, e.g. from the e-government domain, need to reliably identify and authenticate users. During user-authentication processes, the electronic identity of the respective user is determined and required additional attribut
Publikováno v:
International Journal for Information Security Research. 8:774-784
Autor:
Alexander Marsalek, Thomas Zefferer
Publikováno v:
TrustCom/BigDataSE
A key property of current blockchain solutions is the immutability of data stored in the blockchain. While this is a desired feature e.g. for crypto currencies, it can be a show stopper for other use cases that still require ex-post correction or rem
Publikováno v:
IEEE ICBC
Companies are eager to invest in the emerging blockchain technology, but often fail to integrate this technology into real-world business applications that go beyond cryptocurrencies or pure demonstrators. The reason often lies in specific requiremen
Publikováno v:
Handbuch E-Government ISBN: 9783658215965
Handbuch E-Government ISBN: 9783658214012
Handbuch E-Government ISBN: 9783658214012
Die sichere und zuverlassige Identifikation auf Authentifizierung von Burgerinnen und Burgern ist eine der wichtigsten Saulen transaktionaler E-Government-Services. Die zunehmende Popularitat mobiler Endnutzergerate wie Smartphones und Tablets stellt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1fa80b99862e6b7cd88ebc3b84575808
https://doi.org/10.1007/978-3-658-21596-5_36-1
https://doi.org/10.1007/978-3-658-21596-5_36-1
Autor:
Thomas Zefferer
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783030353292
WEBIST (Revised Selected Papers)
WEBIST (Revised Selected Papers)
The evaluation of project results is a crucial part of most research projects in the information-technology domain. In particular, this applies to projects that develop solutions for the public sector and test them by means of pilot applications. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b4335a633c0c3b7f151ca1998351d459
https://doi.org/10.1007/978-3-030-35330-8_7
https://doi.org/10.1007/978-3-030-35330-8_7
Publikováno v:
Electronic Government, an International Journal. 16:1
Cloud computing promises various advantages compared to classical provisioning models and is therefore highly interesting for e-government services. For security and data protection reasons, adoption of cloud computing in public sectors has focused o