Search results

72 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
File eIDAS legislative process
Andrea Servida (European Commission)
Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings
File Introduction and ENISA work
Sławomir Górniak (ENISA)
Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings
proceedings
Located in Events / Workshop on Security Aspects of TSPs 2013
Workshop - security aspects of Trust Service Providers
On September 24, 2013, ENISA is organising a workshop to present and discuss the interim results of its studies on Trust Service Providers (TSPs).
Located in News / ENISA News
Report/Study National eIDs in pan-European e-Government Services
Since the beginning of the 21st century, European Member States have been planning, developing and implementing new solutions to offer electronic services to citizens and businesses on a digital platform in order to improve administrative efficiency, accessibility and user-friendliness and, above all, reduce costs. Policy makers and experts agreed on the desirability of finding solutions that would allow all stakeholders to work together across (digital) borders, while respecting the autonomy of the Member States. One of the directions taken defined a model, which included levels of authentication. ENISA reviewed the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services
Located in Publications
Report/Study Managing multiple identities
Nowadays each person has the opportunity of living multiple lives in parallel, in the real as well as in the virtual world. A trend observed over the last years, first in the research community, but now also in commercial offerings is the increase of interactions between these two worlds, making real-world information accessible to services on the Internet. An area of particular interest is the management of multiple identities, where “identity” is being considered in a broad sense. Issues related with this area include anonymity, pseudonymity, unlinkability and unobservability. The increasingly digital nature of relationships between people is central to dealing with those issues. It is not a question simply of hardware or software, but more importantly of enabling people to enjoy and benefit from their online experiences, while dealing with potential issues. The problems might include a lack of knowledge or training, difficult personal circumstances or simply irritation at the diversity and unpredictability of online privacy and identity mechanisms. It is therefore vital that we should have strong, reliable mechanisms, which can be easily understood and relied upon across the course of a lifetime. This paper introduces the key concepts of electronic identity and presents available methods of managing multiple identities.
Located in Publications
Report/Study Mapping security services to authentication levels
This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.
Located in Publications
Report/Study Mobile Identity Management
This paper reports on information security risks and best-practice in the area of Mobile Identity Management (Mobile IDM). It also provides recommendations of systems, protocols and/or approaches to address these challenges.
Located in Publications
Report/Study C header Security Issues in Cross-border Electronic Authentication
Improving the interoperability of electronic identification and authentication systems is a European task and a task for all Member States. Considerable efforts have been made in several projects to face the challenges of pan-European interoperability of electronic authentication and to assess the feasibility of differing approaches. ENISA analysed the current situation and assessed the security risks of electronic authentication in cross-border solutions. To visualize these risks, two different projects offering cross-border authentication have been exemplarily examined and evaluated, NETC@RDS and STORK.
Located in Publications
Report/Study Privacy and Security Risks when Authenticating on the Internet with European eID Cards
Whenever we use internet services, the first steps we take are usually identification (we input our names) and authentication (we prove that it is us). How we actually identify and authenticate ourselves depends on the security level of the application. The means used can vary from a simple combination of username and password, through a secret PIN, to a PIN generated by some external device or a smart card using cryptography. Smart cards are being used increasingly for authentication purposes. Many European identity cards now contain a smart-card chip, equipped with functionalities for online authentication. They are usually called 'electronic identity cards' (eID cards). This report focuses on authentication using smart cards and compares this approach with other common means of authentication.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information