{"id":"https://openalex.org/W1954802999","doi":"https://doi.org/10.1007/978-3-8348-9283-6_43","title":"Infrastructures and Middleware for the Application of eID Cards in eGovernment","display_name":"Infrastructures and Middleware for the Application of eID Cards in eGovernment","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1954802999","doi":"https://doi.org/10.1007/978-3-8348-9283-6_43","mag":"1954802999"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_43","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009797054","display_name":"Thomas Walloschke","orcid":null},"institutions":[{"id":"https://openalex.org/I1325886976","display_name":"Siemens (Germany)","ror":"https://ror.org/059mq0909","country_code":"DE","type":"company","lineage":["https://openalex.org/I1325886976"]},{"id":"https://openalex.org/I4210162263","display_name":"Fujitsu (Germany)","ror":"https://ror.org/04max0939","country_code":"DE","type":"company","lineage":["https://openalex.org/I2252096349","https://openalex.org/I4210162263"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Thomas Walloschke","raw_affiliation_strings":["Fujitsu Siemens Computers GmbH, Germany"],"affiliations":[{"raw_affiliation_string":"Fujitsu Siemens Computers GmbH, Germany","institution_ids":["https://openalex.org/I4210162263","https://openalex.org/I1325886976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009797054"],"corresponding_institution_ids":["https://openalex.org/I1325886976","https://openalex.org/I4210162263"],"apc_list":null,"apc_paid":null,"fwci":1.7743,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88096579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"406","last_page":"417"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.03280000016093254,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.03280000016093254,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13364","display_name":"Digitalization, Law, and Regulation","score":0.03020000085234642,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.02889999933540821,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.8550862669944763},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6149184703826904},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.6027205586433411},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5421867966651917},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5386682748794556},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4980025291442871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47721153497695923},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.47695839405059814},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3109252154827118},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20042160153388977},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09624379873275757},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06823498010635376}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.8550862669944763},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6149184703826904},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.6027205586433411},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5421867966651917},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5386682748794556},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4980025291442871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47721153497695923},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.47695839405059814},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3109252154827118},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20042160153388977},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09624379873275757},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06823498010635376},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_43","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_43","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5299999713897705,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1518679297","https://openalex.org/W1839457581"],"related_works":["https://openalex.org/W2093262417","https://openalex.org/W2123131699","https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W1981860401","https://openalex.org/W1864755515","https://openalex.org/W2955825640"],"abstract_inverted_index":{"Cross":[0],"border":[1],"eID":[2,72],"interoperability":[3,89],"is":[4,40],"one":[5],"of":[6,24,60,91],"the":[7,12,16,29,48,67],"main":[8],"goals":[9],"to":[10,21,77],"meet":[11],"pan-European":[13],"challenge.":[14],"At":[15],"same":[17],"time":[18],"appropriate":[19],"conformance":[20],"any":[22],"requirements":[23,55],"flexibility,":[25],"legal":[26],"certainty":[27],"as":[28,87],"case":[30],"may":[31],"be":[32,36,78,98],"guaranteed":[33],"future":[34],"will":[35],"stipulated.The":[37],"German":[38],"approach":[39],"based":[41],"on":[42,80],"an":[43],"eGovernment":[44],"Middleware":[45],"concept":[46,75],"\u2014":[47,50],"eCard-API-Framework":[49],"which":[51],"complies":[52],"with":[53,56],"these":[54],"a":[57,70,81],"maximum":[58],"level":[59],"compliance,":[61],"technical":[62],"security":[63],"and":[64],"usability.":[65],"On":[66],"other":[68],"hand":[69],"European":[71,82,92],"card":[73],"driven":[74],"has":[76],"built":[79],"wide":[83],"certificate":[84],"service":[85],"infrastructure":[86],"well.All":[88],"aspects":[90],"Citizen":[93],"Card":[94],"(ECC)":[95],"applications":[96],"should":[97],"satisfactoribly":[99],"including":[100],"national":[101],"secrecy":[102],"obligations.":[103]},"counts_by_year":[],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
