IFIP on-Line Library in Computer Science
DOI: 10.1007/11397427_1
|View full text |Cite
|
Sign up to set email alerts
|

The Italian Electronic Identity Card: Overall Architecture and It Infrastructure

Abstract: In this paper we descrihe the overall process of deployment of the Italian Electronic Identity Card: the way it is issued, services it i s used for. organizations involved in the process, and the Information Technology 0 infrastructure enabling the effective management of the whole process while ensuring the mandatory sccurity functions. Organizational complexity lies in the distribution of responsibilities for the management of Personal Data Registries (on which identity of people is based) which is an instit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…We also want to point out that our solution for security services provision is currently in use within large Italian e-government projects [6,4].…”
Section: The Security Backbonementioning
confidence: 99%
“…We also want to point out that our solution for security services provision is currently in use within large Italian e-government projects [6,4].…”
Section: The Security Backbonementioning
confidence: 99%
“…Distributing business processes among multiple organizations have been found to improve business performance [2] and provide better cost predictability, as well as higher flexibility and scalability upon demand [3]. Also in the public administration cross-organizational business processes are very common for example to administer digital government services [4], [5], [6], [7], [8] and to exchange complex data [9]. However, the increasingly widespread distribution of business processes also creates new challenges such as [10] cloud auditing, management of service heterogeneity, coordination of involved parties, management of client-vendor relationships, localizing and migrating data, and coping with a significant lack of security awareness [11], [12].…”
Section: Introductionmentioning
confidence: 99%