Digital Identity into Practice: The Case of UniCam
Identity management is a set of technologies and processes supporting identity information. Its adoption in Public Administration, in particular in the domain of university, maintains organization autonomy giving at the same time students and staff support to access the services that are delivered. In this paper we present a project lead by University of Camerino with the Italian Banking Group UBI and the Namirial Certification Authority. The project consists in the issue of Enjoy my UniCam card allowing users to have, on a single physical card, several functionalities about facilitated banking account, university services and digital signature certificate. First results about the testing phase are presented as well as the next steps of the project.
Unable to display preview. Download preview PDF.
- 1.Hansen, M.: Me, Myself and I! Manage your IDs safely (2007)Google Scholar
- 2.Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks (2001)Google Scholar
- 3.Bour, I.: Electronic Identities in Europe - Overview of eID solutions connecting Citizens to Public Authorities. Technical report, Transaction Security (2013)Google Scholar
- 4.NIST: Security requirements for cryptographic modules. Technical report, National Institute of Standards and Technology (2001)Google Scholar
- 5.Eve Maler, D.R.: The Venn of Identity: Options and Issues in Federated Identity Management. Technical report, European Commission (2010)Google Scholar
- 6.Gaedke, M., Meinecke, J., Nussbaumer, M.: A modeling approach to federated identity and access management. In: WWW 2005 Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (2005)Google Scholar
- 7.Carota, S., Corradini, F., Falcioni, D., Maggiulli, M.L., Marcantoni, F., Piangerelli, R., Polzonetti, A., Re, B., Sergiacomi, A.: FedCohesion: Federated Identity Management in the Marche Region. In: Kő, A., Leitner, C., Leitold, H., Prosser, A. (eds.) EDEM 2012 and EGOVIS 2012. LNCS, vol. 7452, pp. 112–124. Springer, Heidelberg (2012)CrossRefGoogle Scholar
- 8.Morgan, R., Cantor, S., Carmody, S., Hoehn, W., Klingenstein, K.: Federated Security: The Shibboleth Approach. Technical report, EDUCAUSE Quarterly (2004)Google Scholar