Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

National e-ID card schemes: : A European overview

Published: 01 May 2008 Publication History

Abstract

Across Europe electronic identity (e-ID) card schemes are emerging. The motivation for their deployment varies from country to country, and hence also their ability to interoperate. National schemes are defined by government agencies and application usage by non-government entities has been limited. Changes are occurring, however, both in terms of secondary use by the private sector as well as various activities to enable more interoperability across national e-ID card schemes.

References

[1]
Bruegger B. Open source identity management: eID cards' specfinally disclosed!, http://robertogaloppini.net/2008/05/16/open-source-identity-management-eid-cards-spec-finallydisclosed/, accessed 16 May 2008.
[2]
J. Camenisch, D. Sommer, R. Zimmermann, A general certification framework with application to privacy-enhancing certificate infrastructures, in: SEC 2006, Springer-Verlag, 2006.
[3]
R. Clarke, Human identification in information systems: management challenges and public policy issues, Information Technology & People 7 (December 1994) 6–37.
[4]
D.D. Cock, C. Wolf, B. Preneel, The Belgian electronic identity card (overview), in: Third Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Bonner Köllen Verlag, 2006.
[5]
D.D. Cock, Belgian eID card technicalities, Katholieke Universiteit Leuven, Heverlee, Belgium, 2006.
[6]
A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, Advances in cryptology – CRYPTO '86, Springer, Berlin/Heidelberg, 1988.
[7]
Hayat A, Posch R, Rössler T. Giving an interoperable solution for incorporating foreign eIDs in Austrian e-Government. In: IDABC-conference 2005: cross-border e-Government services for administrations, businesses and citizens Brussels, Belgium; 2005.
[8]
ISO/IEC 15408-2:2005, Information technology – security techniques – evaluation criteria for it security – part 2: security functional requirements, International Organization for Standardization, 2005.
[9]
M. Lloyd, The passport, Sutton Publishing, Sparkford, England, 2005.
[10]
E. Maler, D. Reed, The venn of identity – options and issues in federated identity management, IEEE security & privacy, vol. 6, March/April 2008, Number 2.
[11]
Pfitzman A, Hansen M. Anonymity, unlinkability, unobservability, pseudonymity, and identity management – a consolidated proposal for terminology, Draft v0.28; May 2007.
[12]
Paul Steiner, On the Internet, nobody knows you're a dog, The New Yorker (5 July 1993).
[13]
(2008): STORK homepage. http://www.eid-stork.eu/ [accessed on 26 July 2008].
[14]
Strategic action plan for the national identity scheme safeguarding your identity, UK Home Office Ref. No. 278283, December 2006.
[15]
The status of identity management in European eGovernment initiatives, DG Information Society and Media, European Commission, 6 June 2006.

Cited By

View all

Index Terms

  1. National e-ID card schemes: A European overview
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Information Security Tech. Report
          Information Security Tech. Report  Volume 13, Issue 2
          May 2008
          66 pages

          Publisher

          Elsevier Advanced Technology Publications

          United Kingdom

          Publication History

          Published: 01 May 2008

          Author Tags

          1. Electronic identity
          2. e-ID
          3. National identity cards
          4. Europe
          5. Identity management

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 30 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)The role of trust in the adoption of cooperative arrangement types in e-credentials marketsInformation Polity10.3233/IP-21150828:1(43-59)Online publication date: 1-Jan-2023
          • (2022)FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS AttacksProvable and Practical Security10.1007/978-3-031-20917-8_15(210-227)Online publication date: 11-Nov-2022
          • (2018)STORKInternational Journal of Information Security10.1007/s10207-017-0385-x17:5(569-585)Online publication date: 1-Oct-2018
          • (2017)Leveraging the adoption of electronic identities and electronic-signature solutions in EuropeProceedings of the Symposium on Applied Computing10.1145/3019612.3019885(69-71)Online publication date: 3-Apr-2017
          • (2016)The Austrian eID ecosystem in the public cloudJournal of Information Security and Applications10.1016/j.jisa.2015.11.00427:C(35-53)Online publication date: 1-Apr-2016
          • (2014)Secure single sign-on authentication using eIDs across public cloudsInternational Journal of Internet Technology and Secured Transactions10.5555/2757480.27574815:4(291-306)Online publication date: 1-Apr-2014
          • (2014)User-centric identity as a service-architecture for eIDs with selective attribute disclosureProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613093(153-164)Online publication date: 25-Jun-2014
          • (2013)Towards a Federated Identity as a Service ModelProceedings of the Second Joint International Conference on Technology-Enabled Innovation for Democracy, Government and Governance - Volume 806110.1007/978-3-642-40160-2_5(43-57)Online publication date: 26-Aug-2013
          • (2011)A field study of user behavior and perceptions in smartcard authenticationProceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV10.5555/2042283.2042285(1-17)Online publication date: 5-Sep-2011
          • (2010)Towards interoperabilityProceedings of the First international conference on Electronic government and the information systems perspective10.5555/1887619.1887636(120-133)Online publication date: 31-Aug-2010
          • Show More Cited By

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media