Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3019612.3019885acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Published: 03 April 2017 Publication History

Abstract

The concepts of electronic identity (eID) and electronic signature (e-Signature) are crucial enablers of e-government solutions in Europe. The present heterogeneity of national e-government infrastructures in Europe raises serious challenges. The country-specific nature of infrastructure components prevents an easy reuse of country-specific components in other countries. We propose a solution, that facilitates the deployment and integration or third-party components into existing national e-government infrastructures. We demonstrate the feasibility of our proposal by means of a concrete implementation. Evaluation results obtained are promising and show the proposed solution's potential to leverage the adoption of eID and e-Signature solutions in Europe.

References

[1]
T. Altameem, M. Zairi, and S. Alshawi. Critical Success Factors of E-Government: A Proposed Model for E-Government Implementation. 2006 Innovations in Information Technology, pages 1--5, 2006.
[2]
S. Arora. National e-ID card schemes: A European overview. Information Security Technical Report, 13(2):46--53, 2008.
[3]
e SENS Consortium. Electronic Simple European Networked Services, 2016.
[4]
EgovLabs. MOA-ID/SP/SS, 2016.
[5]
European Commission. Pillar I: Digital Single Market, 2014.
[6]
Z. Fang. E-Government in Digital Era : Concept, Practice, and Development. International Journal of The Computer, The Internet and Management, 10(2):1--22, 2002.
[7]
Federal Chancellery of the Republic of Austria. The Austrian Citizen Card: Security Layer Application Interface, 2016.
[8]
GSMA. Mobile Signature in Turkey A case study of Turkcell: MobilImza. Technical report, 2012.
[9]
ID.ee. ID Card, 2016.
[10]
H. Leitold, A. Hollosi, and R. Posch. Security Architecture of the Austrian Citizen Card Concept. In 18th Annual Computer Security Applications Conference, 2002. Proceedings., pages 391--400, 2002.
[11]
S. D. Müller and S. A. Skau. Success factors influencing implementation of e-government at different stages of maturity: a literature review. International Journal of Electronic Governance, 7:136--170, 2015.
[12]
OASIS. OASIS Digital Signature Services (DSS) TC, 2016.
[13]
OpenID. OpenID-Connect, 2016.
[14]
C. Orthacker, M. Centner, and C. Kittl. Qualified Mobile Server Signature. In Proceedings of the 25th TC 11 Int. Information Security Conference SEC 2010.
[15]
STORK 2.0 Consortium. Secure idenTity acrOss boRders linKed 2.0, 2016.
[16]
The European Parliament and the Council of the European Union. DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures, 1999.
[17]
The European Parliament and the Council of the European Union. REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC, 2014.
[18]
TüBitak. TC Identity Card, 2016.

Cited By

View all
  • (2023)Electronic Simple European Network Services (e-SENS) Social Media Analysis for Interoperability on TwitterHCI International 2023 Posters10.1007/978-3-031-36001-5_17(126-132)Online publication date: 9-Jul-2023
  • (2018)Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID FieldElectronic Government and the Information Systems Perspective10.1007/978-3-319-98349-3_5(60-70)Online publication date: 29-Jul-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '17: Proceedings of the Symposium on Applied Computing
April 2017
2004 pages
ISBN:9781450344869
DOI:10.1145/3019612
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. e-SENS
  2. e-government
  3. e-signature
  4. eID
  5. interoperability

Qualifiers

  • Research-article

Funding Sources

  • EU

Conference

SAC 2017
Sponsor:
SAC 2017: Symposium on Applied Computing
April 3 - 7, 2017
Marrakech, Morocco

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Electronic Simple European Network Services (e-SENS) Social Media Analysis for Interoperability on TwitterHCI International 2023 Posters10.1007/978-3-031-36001-5_17(126-132)Online publication date: 9-Jul-2023
  • (2018)Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID FieldElectronic Government and the Information Systems Perspective10.1007/978-3-319-98349-3_5(60-70)Online publication date: 29-Jul-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media