Search results

69 items matching your search terms.
Filter the results.
Item type
















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study C header Security Issues in Cross-border Electronic Authentication
Improving the interoperability of electronic identification and authentication systems is a European task and a task for all Member States. Considerable efforts have been made in several projects to face the challenges of pan-European interoperability of electronic authentication and to assess the feasibility of differing approaches. ENISA analysed the current situation and assessed the security risks of electronic authentication in cross-border solutions. To visualize these risks, two different projects offering cross-border authentication have been exemplarily examined and evaluated, NETC@RDS and STORK.
Located in Publications
Report/Study D source code Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID)
Mobile devices, like smart phones and PDAs, will play an increasingly important role in the digital environment. However, the pervasive use of mobile devices also brings new security and privacy risks. Persons who make extensive use of mobile devices continuously leave traces of their identities and transactions, sometimes even by just carrying the devices around in their pockets. Throughout this paper we will look at different use-cases for electronic authentication using mobile devices. We will identify the security risks which need to be overcome, give an opinion about their relevance, and present mechanisms that help mitigate these risks.
Located in Publications
File Troff document Signatures électroniques sécurisées, cybergouvernement fiable et confiance : l’Agence ENISA de l’UE montre la voie pour renforcer la confiance des citoyens envers les services internet
L’Agence européenne de cybersécurité ENISA publie une série de nouvelles études qui analysent les pratiques existantes des prestataires de service de confiance (PSCO) et proposent des recommandations afin d’améliorer les relations de confiance et la bonne interopérabilité à l’échelle internationale entre les futures PSCO, qui bénéficieront de nouvelles régulations, et les services du cybergouvernement qui en font usage.
Located in News / ENISA News / PR's in FR
Report/Study Technical guideline for Incident Reporting
This document describes a framework for security incident reporting based on the requirements set by article 19 of the eIDAS regulation. It is being developed on a consensus basis between the experts of the working group formed by ENISA and it is reviewed by various relevant stakeholders from both the private and the public sector. The final report includes the consensual contributions and modifications of all stakeholders involved in its development and as such it is not a binding guideline.
Located in Publications
The importance of standards in electronic identification and trust services providers
ENISA publishes a new report on the importance of standards in the area of electronic identification and trust services providers.
Located in News / ENISA News
File The legal, standartization and certification frameworks of trust service security
Nick Pope (Thales / ETSI)
Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings
File Troff document The legal, standartization and certification frameworks of trust service security
Ben Wilson (DigiCert)
Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings
Trust Services Forum
Located in Topics / Trust Services
Trust Services Forum - CA Day 2018
ENISA has organised the fourth edition of the Trust Services Forum on the 23rd October 2018. On the 24th October, the Bundesdruckerei/D-TRUST, in cooperation with TÜViT has held the tenth CA-Day on the subject of "TSP Compliance Info Day on eIDAS, ETSI and CA/B-Forum Requirements“.
Located in Events
Trust Services Forum - CA Day 2018
Located in Events

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information