2018
DOI: 10.1007/978-3-319-98349-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…At a very formal level, we would say that a party is a legally trusted party, if it has been directly granted the status of an officially trusted party by respective legal regulations, or (indirectly) granted by a state authority in accordance with respective legal regulations. A standard example for such legally trusted parties are the certification authorities of national eID (electronic identification) solutions [30][31][32][33].…”
Section: Modes Of Business Communicationsmentioning
confidence: 99%
“…At a very formal level, we would say that a party is a legally trusted party, if it has been directly granted the status of an officially trusted party by respective legal regulations, or (indirectly) granted by a state authority in accordance with respective legal regulations. A standard example for such legally trusted parties are the certification authorities of national eID (electronic identification) solutions [30][31][32][33].…”
Section: Modes Of Business Communicationsmentioning
confidence: 99%
“…Security is another integral part of Estonia's digital identity system. The digital identity system incorporates stringent security measures, such as cryptographic encryption and two-factor authentication, to ensure the protection of user data and provide secure access to online services [30]. These features ensure that the digital transactions conducted are safe, secure, and reliable, which is crucial in maintaining public trust in the system.…”
Section: Estonia's E-residency and Digital Identity Programmentioning
confidence: 99%
“…There may be more vulnerabilities we have not considered. The key factors for coping with the ROCA of Estonia can be repeated: using alternative solutions, which may not be affected, public private partnerships, crisis management, and documentation and verification [160]. Another important aspect is security by design [161].…”
Section: Nonfunctional Factorsmentioning
confidence: 99%