Abstract
This study presents the current situation (starting with January 2015) related to EU Regulation eIDAS. eIDAS represents the latest EU initiative to build a common framework for electronic identification and trust services. It was the intention of European Council to elaborate and impose a minimal legislation which should guarantee compatibility and interoperability of national identification and trust systems while still allowing the existence of local legal flavors. It is expected that eIDAS will offer safer interactions between various entities (such as private enterprises, public enterprises, citizens, administration) thus contributing to the growth of European market and the improvement of cross-border transactions. Exposure of the current state is combined with suggestions and discussions about improvements to the former eID resulting from the new regulation. A section on the implementation of interoperability framework in some member states gives a first insight into the work which will be required in the next few years for completing the implementation. This paper presents a thorough review of the main identification and trust techniques in eIDAS and the differences to previous or more local similar frameworks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
European Parliament: Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC, Official Journal of the European Union, OJ L 257, pp. 73–114, 28 August 2014
European Comission. https://ec.europa.eu/digital-single-market/en/news/feasibility-study-cross-border-use-eid-and-authentication-services-eidas-compliant-support-0
European Commission. https://ec.europa.eu/digital-single-market/en/trust-services-and-eid
European Council: Special meeting of the European Council (Art. 50), 25 November 2018. https://www.consilium.europa.eu/en/meetings/european-council/2018/11/25/
ComputerWeekly: EU sees eIDAS regulation come into full force, September 2018
KPMG Switzerland: Swiss companies must comply with eIDAS for digital access to EU markets. https://blog.kpmg.ch/swiss-companies-must-comply-eidas-digital-access-eu-markets/
Norwegian Communication Authority. https://eng.nkom.no/technical/trust-services/eidas/eidas-regulation
Thales: The Impact of the European eIDAS Regulation. www.thales-esecurity.com
European Comission. https://ec.europa.eu/digital-single-market/en/e-identification
Leitold, H., Zwattendorfer, B.: STORK: architecture, implementation and pilots. In: ISSE 2010 Securing Electronic Business Processes, pp 131–142 (2010)
Sideridis, Alexander B., Protopappas, L., Tsiafoulis, S., Pimenidis, E.: Smart cross-border e-Gov systems and applications. In: Katsikas, Sokratis K., Sideridis, Alexander B. (eds.) e-Democracy 2015. CCIS, vol. 570, pp. 151–165. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27164-4_11
Secure ID News. https://www.secureidnews.com/news-item/eidas-digital-id-finds-use-in-cross-border-european-banking/
European Comission. https://ec.europa.eu/digital-single-market/en/news/questions-answers-trust-services-under-eidas
Federal Office for Information Security: eIDAS Notification of the German eID. https://www.bsi.bund.de/EN/Topics/ElectrIDDocuments/German-eID/eIDAS-notification/eIDAS_notification_node.html
Zwattendorfer, B., Tauber, A.: Secure cloud authentication using eIDS. In: Proceedings of IEEE CCIS2012 (2012)
ENISA: Qualified Website Authentication Certificates, December 2015. https://www.enisa.europa.eu/
ENISA: Security guidelines on the appropriate use of qualified website authentication certificates, December 2016. https://www.enisa.europa.eu/
Pimenidis, E., Georgiadis, C.K.: Can e-Government applications contribute to performance improvement in public administration? Int. J. Oper. Res. Inf. Syst. 5(1), 48–57 (2014)
European Commission. https://ec.europa.eu/digital-single-market/en/news/questions-answers-trust-services-under-eidas
Acknowledgement
The work has been funded through the research project COOPID mySMIS-115656.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Mocanu, S., Chiriac, A.M., Popa, C., Dobrescu, R., Saru, D. (2019). Identification and Trust Techniques Compatible with eIDAS Regulation. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)