Identity Assurance in the UK: technical implementation and legal implications under eIDAS
暂无分享,去创建一个
Sophie Stalla-Bourdillon | Kieron O'Hara | Niko Tsakalakis | K. O’Hara | Sophie Stalla-Bourdillon | Niko Tsakalakis
[1] Audun Jøsang,et al. Assurance Requirements for Mutual User and Service Provider Authentication , 2014, DPM/SETOP/QASA.
[2] Phillip J. Windley. Digital identity , 2005 .
[3] Walter Hötzendorfer,et al. Privacy by Design in Federated Identity Management , 2015, 2015 IEEE Security and Privacy Workshops.
[4] Tarvi Martens,et al. Electronic identity management in Estonia between market and state governance , 2010 .
[5] A. Barak,et al. Purposive Interpretation in Law , 2005 .
[6] Audun Jøsang,et al. Trust Requirements in Identity Management , 2005, ACSW.
[7] Jos Dumortier,et al. Critical Observations on the Proposed Regulation for Electronic Identification and Trust Services for Electronic Transactions in the Internal Market , 2012 .
[8] J. Black. Forms and Paradoxes of Principles Based Regulation , 2008 .
[9] Dan Jerker B. Svantesson. A 'layered approach' to the extraterritorality of data privacy laws , 2013 .
[10] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[11] Sophie Stalla-Bourdillon,et al. Digital identity and French personality rights - A way forward in recognising and protecting an individual's rights in his/her digital identity , 2015, Comput. Law Secur. Rev..
[12] Paul Beynon-Davies,et al. The UK national identity card , 2011, ICIS.
[13] Eve Maler,et al. The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.
[14] Georg Aichholzer,et al. National Electronic Identity Management: The Challenge of a citizen-centric Approach beyond Technical Design , 2011 .
[15] C. Kuner. The internet and the global reach of EU law , 2017 .
[16] Y. Honcharova,et al. STORK - Promising project of european transnational electronic identification , 2014, 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology.
[17] Marit Hansen,et al. Marrying Transparency Tools with User-Controlled Identity Management , 2007, FIDIS.