IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Austrian Identity Ecosystem: An E-Government Experience

The Austrian Identity Ecosystem: An E-Government Experience
View Sample PDF
Author(s): Klaus Stranacher (Graz University of Technology, Austria), Arne Tauber (Graz University of Technology, Austria), Thomas Zefferer (Graz University of Technology, Austria)and Bernd Zwattendorfer (Graz University of Technology, Austria)
Copyright: 2014
Pages: 22
Source title: Architectures and Protocols for Secure Information Technology Infrastructures
Source Author(s)/Editor(s): Antonio Ruiz-Martinez (University of Murcia, Spain), Rafael Marin-Lopez (University of Murcia, Spain)and Fernando Pereniguez-Garcia (University of Murcia, Spain)
DOI: 10.4018/978-1-4666-4514-1.ch011

Purchase

View The Austrian Identity Ecosystem: An E-Government Experience on the publisher's website for pricing and purchasing information.

Abstract

Architectures and protocols for secure information technology are crucial to satisfy security requirements of current e-government solutions. Identity plays a central role in most e-government solutions, as users typically need to be reliably identified and authenticated. User identification and authentication approaches usually rely on complex cryptographic methods and sophisticated technical solutions. Additionally, these solutions need to be backed by appropriate organizational and legal frameworks that assure the legal validity of provided identification and authentication approaches. In this chapter, the authors introduce the Austrian identity ecosystem that represents one of the main pillars of the Austrian e-government infrastructure. They discuss underlying concepts and main building blocks of this comprehensive ecosystem and show how architectures and protocols for secure information technology are employed to assure the security of user identification and authentication processes. By discussing concrete use cases, the authors illustrate the applicability of the Austrian identity ecosystem for both Austrian and foreign citizens.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom