Abstract
With the Digital Single Market and the supporting programs H2020, CEF, ISA2 and other instruments Europe is making a big effort to shape up its ICT. This is also supported by legislation where IT-security plays an excelling role. Not only is the eIDaS regulation as an example offering a seamless legal framework for all 28 member states also it is a unique chance for Europe to show its ICT-strength with its open and innovative approach to attract European industry as a provider and businesses as major enablers. IT-security and data protection need to enable digital sovereignty and at the same time are fields where Europe has developed renowned expertise in the past and could develop further strength in the future.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Budington B (2015) Symantec issues rogue EV certificate for Google.com. https://www.eff.org/deeplinks/2015/09/symantec-issues-rogue-ev-certificate-googlecom
Hafizji A (2013) Apple push notification services in iOS 6. http://www.raywenderlich.com/32960/apple-push-notification-services-in-ios-6-tutorial-part-1
IETF (1999) RFC 2535 domain name system security extensions. https://tools.ietf.org/html/rfc2535
Nojeim G (2014) Can a U.S. warrant compel a U.S. provider to disclose data it stores abroad. https://cdt.org/files/2014/07/Microsoft-Ireland-Memo-formatted.pdf
US Government (2001) Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA PATRIOT ACT) Act of 2001. http://www.gpo.gov/fdsys/pkg/BILLS-107hr3162enr/pdf/BILLS-107hr3162enr.pdff
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2017 The Author(s)
About this paper
Cite this paper
Posch, R. (2017). Digital Sovereignty and IT-Security for a Prosperous Society. In: Werthner, H., van Harmelen, F. (eds) Informatics in the Future. Springer, Cham. https://doi.org/10.1007/978-3-319-55735-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-55735-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55734-2
Online ISBN: 978-3-319-55735-9
eBook Packages: Computer ScienceComputer Science (R0)