Skip to main content

An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone

  • Conference paper
  • 1495 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3591))

Abstract

In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens. Our proposal considers an interoperability architecture based on a federation of national infrastructures and follows a cooperation based approach which is fully compatible with and respectful of organizational and technical independence of existing national systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CEN/ISSS Workshop on e-Authentication (2004), http://www.cenorm.be/

  2. Ahn, G.-J.: Specification and Classification of Role-based Authorization Policies. In: Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Linz, Austria, June 09 - 11 (2003)

    Google Scholar 

  3. Arcieri, F., et al.: SIM: a Working Example of an E-government Service Infrastructure for Mountain Communities. In: Workshop Electronic Government (DEXA-eGov 2001), associated to the 2001 Conference on Databases and Expert System Applications (DEXA 2001), Munich, Germany, pp. 407–411. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  4. Arcieri, F., Ciclosi, M., Fioravanti, F., Nardelli, E., Talamo, M.: The Italian Electronic Identity Card: a short introduction. In: The National Conference on Digital Government Research (dg.o2004), Seattle, Washington, USA, May 24-26 (2004)

    Google Scholar 

  5. Arcieri, F., et al.: Inter-organizational E-Services Accounting Management. In: 3rd IFIP conference on e-Commerce, e-Business, and e-Government (I3E 2003), Sao Paolo, Brasil. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  6. Arcieri, F., Fioravanti, F., Nardelli, E., Talamo, M.: Reliable Peer-to-Peer Access for Italian Citizens to Digital Government Services on the Internet. In: Traunmüller, R. (ed.) EGOV 2004. LNCS, vol. 3183, pp. 250–255. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. United States Federal PKI Operational Authority. Federal Public Key Infrastructure (FPKI) Architecture Technical Overview (2005)

    Google Scholar 

  8. United States Federal PKI Policy Authority. X.509 Certificate Policy for the Federal Bridge Certification Authority (2002)

    Google Scholar 

  9. Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.): EuroPKI 2004. LNCS, vol. 3093. Springer, Heidelberg (2004)

    Google Scholar 

  10. Katsikas, S.K., López, J., Pernul, G. (eds.): TrustBus 2004. LNCS, vol. 3184. Springer, Heidelberg (2004)

    Google Scholar 

  11. OASIS. eXtensible Access Control Markup Language (XACML), http://www.oasis-open.org/committees/xacml/

  12. OASIS. Security Assertion Markup Language (SAML), http://www.oasis-open.org/

  13. United States General Accounting Office. Planned e-Authentication Gateway Faces Formidable Development Challenges, Report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives (2003)

    Google Scholar 

  14. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arcieri, F. et al. (2005). An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone. In: Wimmer, M.A., Traunmüller, R., Grönlund, Å., Andersen, K.V. (eds) Electronic Government. EGOV 2005. Lecture Notes in Computer Science, vol 3591. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11545156_28

Download citation

  • DOI: https://doi.org/10.1007/11545156_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28466-6

  • Online ISBN: 978-3-540-31737-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics