DG.O 2022: The 23rd Annual International Conference on Digital Government Research 2022
DOI: 10.1145/3543434.3543652
|View full text |Cite
|
Sign up to set email alerts
|

Re-Shaping the EU Digital Identity Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Regarding our categories, most publications state blockchain (18) and smart contract (14) or derivations. Further categories include wallets (3), distributed ledger technologies (2), consensus (1), and consensus algorithms, such as proof-of-work or proof-of-authority (2). Regarding the use case, we notice cryptocurrencies (7), Bitcoin (5), Ethereum (6), and Monero (1).…”
Section: Overview Of the Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding our categories, most publications state blockchain (18) and smart contract (14) or derivations. Further categories include wallets (3), distributed ledger technologies (2), consensus (1), and consensus algorithms, such as proof-of-work or proof-of-authority (2). Regarding the use case, we notice cryptocurrencies (7), Bitcoin (5), Ethereum (6), and Monero (1).…”
Section: Overview Of the Literature Surveymentioning
confidence: 99%
“…eIDAS as of 2014 [1] focuses on the interoperability of identities within the member states of the European Union (EU) for the use case of eGovernment. However, with the new regulation [2], further use cases should be made possible, such as universities, health, finance, online services, and mobility. One major change is the introduction of a wallet [3], described in detail in the architecture and reference framework [4].…”
Section: Introductionmentioning
confidence: 99%
“…(ii) Self-sovereign identities: Self-sovereign identities are an approach to digital identities that gives individuals control over the information they use to prove who they are to services on the Internet. Te research direction obtains momentum with the new version of the electronic IDentifcation, Authentication, and trust Services (eIDAS) regulation [131,132]. As self-sovereign identity is diferent from traditional identity management [133], at least from the entity and layer perspectives, it is best described in its own taxonomy.…”
Section: Improved Versionmentioning
confidence: 99%