Atjaunināt sīkdatņu piekrišanu

E-grāmata: Electronic Identity

  • Formāts: PDF+DRM
  • Sērija : SpringerBriefs in Cybersecurity
  • Izdošanas datums: 24-May-2014
  • Izdevniecība: Springer London Ltd
  • Valoda: eng
  • ISBN-13: 9781447164494
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : SpringerBriefs in Cybersecurity
  • Izdošanas datums: 24-May-2014
  • Izdevniecība: Springer London Ltd
  • Valoda: eng
  • ISBN-13: 9781447164494

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.

Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.

In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-centric eCertificate system aimed at supporting the eID system.

Electronic Identity is essential reading for researchers, lawyers, policy makers, technologists and anyone wishing to understand the challenges of a pan-European eID.

1 Legal Aspects
1(40)
Norberto Nuno Gomes de Andrade
1.1 Introduction
2(1)
1.2 Definitions and Terminology
3(5)
1.2.1 What Is Identity Anyway?
3(1)
1.2.2 eID 101
4(1)
1.2.3 Terminology
4(4)
1.3 Relevance of eID
8(2)
1.4 How Is eID Regulated?
10(5)
1.4.1 Context: From IDs to eIDs
10(2)
1.4.2 The E-Signature Directive in a Nutshell
12(3)
1.5 How Will eID Be Regulated? Next Steps
15(2)
1.5.1 EU Policy and Legislative Initiatives in the Field of eID
15(1)
1.5.2 Revising the Electronic Signatures Directive to Propose an Electronic Trust Services Regulation
15(2)
1.6 Toward a European eID Regulatory Framework
17(20)
1.6.1 Legal and Technical Barriers
18(7)
1.6.2 Legal Solutions
25(12)
1.7 Conclusion
37(4)
References
38(3)
2 "eCert" Improving the Security and Controllability of Digitally Signed Documents
41
Lisha Chen-Wilson
David Argles
Michele Schiano di Zenise
Gary Wills
2.1 Introduction
41(11)
2.1.1 Digital Signing and Its Limitations
42(3)
2.1.2 Existing Systems Related to eCertificates
45(4)
2.1.3 Domain Expert Advice
49(1)
2.1.4 The Challenges and Plan
49(3)
2.2 Development of the eCertificate System
52(25)
2.2.1 Common Usage Patterns
52(1)
2.2.2 Stakeholder Analysis
53(1)
2.2.3 Use Case
53(1)
2.2.4 Gap Analysis
54(2)
2.2.5 Service Profile
56(2)
2.2.6 Approaches for Meeting the Requirements
58(1)
2.2.7 System Structure Development
58(8)
2.2.8 Core Design
66(6)
2.2.9 The Implemented System
72(1)
2.2.10 System Demonstrator
72(2)
2.2.11 eCert System Testing
74(3)
2.2.12 Summary of Outcomes
77(1)
2.3 Evaluation Through ePortfolio Systems and the Delphi Method
77(5)
2.3.1 Evaluation Through Integrating eCert into ePortfolios
77(3)
2.3.2 Evaluation Through Delphi Methodology
80(2)
2.4 The Abstracted eCert Protocol and the Mobile eID Application
82(6)
2.4.1 The Mobile eID Project
82(3)
2.4.2 The Abstracted eCert Protocol
85(2)
2.4.3 Proof of Hypothesis
87(1)
2.5 Conclusion
88
References
89