Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Hansen, P. Berlich, J. Camenisch, Sebastian Clauss, A. Pfitzmann, M. Waidner (2004)
Privacy-enhancing identity managementInf. Secur. Tech. Rep., 9
T. Pedersen, Christian Jensen
Spreadsheets and Relations
(2008)
Analysis Underpinning The HKSARG Interoperability Framework Recommendations (Version: 7.0)', Office of the Government Chief Information Officer of Hong Kong
(2009)
http://www.ibm.com/developerworks/library/specification/ws-fed
John Taylor, M. Lips, J. Organ (2007)
Information-Intensive Government and the Layering and Sorting of CitizenshipPublic Money & Management, 27
R. Baldoni, S. Fuligni, Massimo Mecella, F. Tortorelli (2008)
The Italian e-Government Enterprise Architecture: A Comprehensive Introduction with Focus on the SLA Issue
(2008)
Federated idendity management service model in Italy (in italian)”, Servizio Pubblico di Connettività e Cooperazione
(2007)
The 2007 e-readiness rankings Raising the bar', The Economist
(2005)
Federated Identity Management in Business-to-Business Outsourcing
M. Lips, Chiky Pang (2008)
Identity Management in Information Age Government: Exploring Concepts, Definitions, Approaches and Solutions
Massimo Mecella, C. Batini (2001)
Enabling Italian E-Government through a Cooperative ArchitectureComputer, 34
(2005)
e-Government Interoperability Framework Version 6.1', UK Cabinet Office
C. Reddick (2009)
Management support and information security: an empirical study of Texas state agencies in the USAElectron. Gov. an Int. J., 6
(2008)
ICAR-INF3: inter-regional identity federation in Italy
A. Baldwin, M. Mont, Y. Beres, S. Shiu (2010)
Assurance for federated identity managementJ. Comput. Secur., 18
(2008)
Federation of the Danish Public Sector' www.projectliberty.org
(2020)
Shibboleth:Shibboleth
D. Recordon, D. Reed (2006)
OpenID 2.0: a platform for user-centric identity management
(2007)
Understanding WS-Federation' msdn.microsoft.com/en-us/library/bb498017
Security Assertion Markup Language (2002), www.oasis-open.org/security/docs
B. Pfitzmann, M. Waidner (2003)
Federated Identity-Management Protocols -Where User Authentication Protocols May Go-
Wolfgang Hommel, Helmut Reiser (2005)
Federated Identity Management: Shortcomings of existing standards
Petter Gottschalk, Hans Solli-Sæther (2008)
Stages of e-government interoperabilityElectron. Gov. an Int. J., 5
C. Tabin (2007)
Liberty Alliance Project
Thomas Erl (2005)
Service-Oriented Architecture: Concepts, Technology, and Design
(2007)
A Review of the Danish Public Sector Federation' Burton Group Catalyst Conference
R. McKenzie, M. Crompton, C. Wallis (2008)
Use Cases for Identity Management in E-GovernmentIEEE Security & Privacy, 6
Federated Identity Management (FIdM) systems are at the heart of any online service in a public, private or hybrid autonomous cooperating system. This paper reviews and compares several existing approaches for building FIdM systems in the specific sector of e-government by showing Identity Management (IdM) schemes employed by several countries representatives of different realities by size, geographical location and Public Administration (PA) traditions. The paper analyses then the case of Italy by introducing the ongoing effort for defining and developing a nationwide e-government Enterprise Architecture to guarantee a flexible approach for integrated application services, respecting local and central administrations’ autonomy. The paper finally focuses on the FIdM aspects employed within the Italian Enterprise Architecture.
Electronic Government, an International Journal – Inderscience Publishers
Published: Jan 1, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.