A Systematic Approach to Legal Identity Management – Best Practice Austria View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Herbert Leitold , Arne Tauber

ABSTRACT

Electronic identity (eID) initiatives have in many cases started with state-issued credentials for secure authentication of natural persons. While citizen eID is a major leap, e-business and e-government processes are in many cases carried out by legal persons or professional representatives. Comprehensive mandate systems that seamlessly integrate with the national identity management (IDM) system are still rare. More... »

PAGES

224-234

Book

TITLE

ISSE 2011 Securing Electronic Business Processes

ISBN

978-3-8348-1911-6
978-3-8348-8652-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-8348-8652-1_20

DOI

http://dx.doi.org/10.1007/978-3-8348-8652-1_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1089500195


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/18", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Law and Legal Studies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Law", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Secure Information Technology Center, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Secure Information Technology Center, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Secure Information Technology Center, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Secure Information Technology Center, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tauber", 
        "givenName": "Arne", 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Electronic identity (eID) initiatives have in many cases started with state-issued credentials for secure authentication of natural persons. While citizen eID is a major leap, e-business and e-government processes are in many cases carried out by legal persons or professional representatives. Comprehensive mandate systems that seamlessly integrate with the national identity management (IDM) system are still rare.", 
    "editor": [
      {
        "familyName": "Pohlmann", 
        "givenName": "Norbert", 
        "type": "Person"
      }, 
      {
        "familyName": "Reimer", 
        "givenName": "Helmut", 
        "type": "Person"
      }, 
      {
        "familyName": "Schneider", 
        "givenName": "Wolfgang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-8348-8652-1_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-8348-1911-6", 
        "978-3-8348-8652-1"
      ], 
      "name": "ISSE 2011 Securing Electronic Business Processes", 
      "type": "Book"
    }, 
    "keywords": [
      "national identity management systems", 
      "identity management systems", 
      "secure authentication", 
      "legal persons", 
      "natural persons", 
      "mandate system", 
      "professional representatives", 
      "management system", 
      "government processes", 
      "major leap", 
      "persons", 
      "authentication", 
      "systematic approach", 
      "citizens", 
      "credentials", 
      "system", 
      "business", 
      "initiatives", 
      "Austria", 
      "cases", 
      "representatives", 
      "leap", 
      "process", 
      "approach", 
      "Electronic identity (eID) initiatives", 
      "identity (eID) initiatives", 
      "state-issued credentials", 
      "Comprehensive mandate systems", 
      "Legal Identity Management \u2013 Best Practice Austria", 
      "Identity Management \u2013 Best Practice Austria", 
      "Management \u2013 Best Practice Austria", 
      "Practice Austria"
    ], 
    "name": "A Systematic Approach to Legal Identity Management \u2013 Best Practice Austria", 
    "pagination": "224-234", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1089500195"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-8348-8652-1_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-8348-8652-1_20", 
      "https://app.dimensions.ai/details/publication/pub.1089500195"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:11", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_195.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-8348-8652-1_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-8348-8652-1_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-8348-8652-1_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-8348-8652-1_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-8348-8652-1_20'


 

This table displays all metadata directly associated to this object as RDF triples.

108 TRIPLES      23 PREDICATES      58 URIs      51 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-8348-8652-1_20 schema:about anzsrc-for:18
2 anzsrc-for:1801
3 schema:author N356956acbe18418a9e6878098acfa6bd
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Electronic identity (eID) initiatives have in many cases started with state-issued credentials for secure authentication of natural persons. While citizen eID is a major leap, e-business and e-government processes are in many cases carried out by legal persons or professional representatives. Comprehensive mandate systems that seamlessly integrate with the national identity management (IDM) system are still rare.
7 schema:editor N185ac8a92edd4c91a47f5189cc6e12f9
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nabd4dbbcb4b046bbbf1f79d409e1086f
12 schema:keywords Austria
13 Comprehensive mandate systems
14 Electronic identity (eID) initiatives
15 Identity Management – Best Practice Austria
16 Legal Identity Management – Best Practice Austria
17 Management – Best Practice Austria
18 Practice Austria
19 approach
20 authentication
21 business
22 cases
23 citizens
24 credentials
25 government processes
26 identity (eID) initiatives
27 identity management systems
28 initiatives
29 leap
30 legal persons
31 major leap
32 management system
33 mandate system
34 national identity management systems
35 natural persons
36 persons
37 process
38 professional representatives
39 representatives
40 secure authentication
41 state-issued credentials
42 system
43 systematic approach
44 schema:name A Systematic Approach to Legal Identity Management – Best Practice Austria
45 schema:pagination 224-234
46 schema:productId N0b9503f124a849cd8fc759bf1fbd8bd1
47 Nfc0330eb979d464ea02f718130e3b9c4
48 schema:publisher Nd18bdaa349a3463ba4730ececb42b64a
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1089500195
50 https://doi.org/10.1007/978-3-8348-8652-1_20
51 schema:sdDatePublished 2022-01-01T19:11
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N2d8472d0927e4291b847453f683619c5
54 schema:url https://doi.org/10.1007/978-3-8348-8652-1_20
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N0b9503f124a849cd8fc759bf1fbd8bd1 schema:name dimensions_id
59 schema:value pub.1089500195
60 rdf:type schema:PropertyValue
61 N185ac8a92edd4c91a47f5189cc6e12f9 rdf:first N535ddd079b9a420f88f0debbff75bb55
62 rdf:rest N5e174d233d3c4eb68462c18b673001af
63 N1f6ee31f5ced46dfb8f7c0cdf6141898 rdf:first Nc6056cc9088041f3b8ae4d2810e3f0f9
64 rdf:rest rdf:nil
65 N2d8472d0927e4291b847453f683619c5 schema:name Springer Nature - SN SciGraph project
66 rdf:type schema:Organization
67 N356956acbe18418a9e6878098acfa6bd rdf:first sg:person.012516432633.90
68 rdf:rest Nc5fbc670ff7a4d11bd320415787d18f7
69 N535ddd079b9a420f88f0debbff75bb55 schema:familyName Pohlmann
70 schema:givenName Norbert
71 rdf:type schema:Person
72 N5e174d233d3c4eb68462c18b673001af rdf:first Nb5b897d5c02e4bdaac6fd2c644ff452d
73 rdf:rest N1f6ee31f5ced46dfb8f7c0cdf6141898
74 Na2319370aaa04a2db6d5e9bf3fdf3e3a schema:affiliation grid-institutes:None
75 schema:familyName Tauber
76 schema:givenName Arne
77 rdf:type schema:Person
78 Nabd4dbbcb4b046bbbf1f79d409e1086f schema:isbn 978-3-8348-1911-6
79 978-3-8348-8652-1
80 schema:name ISSE 2011 Securing Electronic Business Processes
81 rdf:type schema:Book
82 Nb5b897d5c02e4bdaac6fd2c644ff452d schema:familyName Reimer
83 schema:givenName Helmut
84 rdf:type schema:Person
85 Nc5fbc670ff7a4d11bd320415787d18f7 rdf:first Na2319370aaa04a2db6d5e9bf3fdf3e3a
86 rdf:rest rdf:nil
87 Nc6056cc9088041f3b8ae4d2810e3f0f9 schema:familyName Schneider
88 schema:givenName Wolfgang
89 rdf:type schema:Person
90 Nd18bdaa349a3463ba4730ececb42b64a schema:name Springer Nature
91 rdf:type schema:Organisation
92 Nfc0330eb979d464ea02f718130e3b9c4 schema:name doi
93 schema:value 10.1007/978-3-8348-8652-1_20
94 rdf:type schema:PropertyValue
95 anzsrc-for:18 schema:inDefinedTermSet anzsrc-for:
96 schema:name Law and Legal Studies
97 rdf:type schema:DefinedTerm
98 anzsrc-for:1801 schema:inDefinedTermSet anzsrc-for:
99 schema:name Law
100 rdf:type schema:DefinedTerm
101 sg:person.012516432633.90 schema:affiliation grid-institutes:None
102 schema:familyName Leitold
103 schema:givenName Herbert
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
105 rdf:type schema:Person
106 grid-institutes:None schema:alternateName Secure Information Technology Center, Austria
107 schema:name Secure Information Technology Center, Austria
108 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...