Search results

70 items matching your search terms.
Filter the results.
Item type
















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Privacy Features of European eID Card Specifications
A national eID card is a gateway to personal information. Any unwanted disclosure of personal information constitutes a violation of the citizen’s privacy rights. Apart from considerations of fundamental rights, this is also a serious obstacle to the adoption of eID card schemes and to their cross-border interoperability. The aim of this paper is to allow easy comparison between privacy features offered by European eID card specifications and thereby to facilitate identification of best practice.
Located in Publications
proceedings
Located in Events / Workshop on Security Aspects of TSPs 2013
Report/Study Recommendations for QTSPs based on Standards - Technical guidelines on trust services
Following the publication of the eIDAS Regulation, a set of secondary and co-regulatory acts had to be published in order to provide technical guidance on how to implement the specific requirements of the eIDAS Regulation (in the TSP part of eIDAS, the European Commission decided to publish only the mandatory ones). ENISA aimed to develop a concise set of technical guidelines implementing the eIDAS Regulation in the non-mandatory articles, for voluntary use of all stakeholders, including Trust Service Providers, Supervisory Bodies and Conformity Assessment Bodies. The objective of this document is to provide guidelines for fulfilling requirements originating from the following articles of the eIDAS Regulation:
Located in Publications
Form Folder Registration form
This form allows you to register for this ENISA event.
Located in Events
File Security aspects of the new trust services defined in the draft Regulation
Alejandro Elices (Atos Research)
Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings
Report/Study Security framework for Trust Service Providers - Technical guidelines on trust services
Article 19, which is the main focus of this document, of the eIDAS Regulation, states that Trust Service Providers have to demonstrate due diligence, in relation to the identification of risks and adoption of appropriate security practices, and notify competent bodies of any breach of security or loss of integrity that has a significant impact on the trust service provided or on the personal data maintained therein.
Located in Publications
Report/Study PS document Security guidelines on the appropriate use of qualified electronic time stamps
This document addresses qualified electronic time stamps and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.
Located in Publications
Report/Study Security guidelines on the appropriate use of qualified electronic seals
This document addresses qualified electronic seals and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery and website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.
Located in Publications
Report/Study ECMAScript program Security guidelines on the appropriate use of qualified website authentication certificates
This document addresses qualified certificates for website authentication and is one out of a series of five documents which aim to assist parties wishing to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.
Located in Publications
Report/Study ECMAScript program Security guidelines on the appropriate use of qualified electronic signatures
This document addresses qualified electronic signatures and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related (qualified) trust services.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information