STORK: a real, heterogeneous, large-scale eID management system View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2017-07-05

AUTHORS

Carlos Ribeiro, Herbert Leitold, Simon Esposito, David Mitzam

ABSTRACT

Verifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic identification (eID) schemes, general, cross-border solutions are rare. Cross-border eID difficulties have several origins: (i) incompatible national eID models; (ii) different legislations with incompatible objectives; (iii) lack of common language and semantics; (iv) different common procedures, specially in what concerns mandates and delegation; (v) different implementations of the same eID models. These have been addressed by STORK, a project that developed a federated cross-border eID system that was piloted in about twenty European Union Member States in service sectors as sensitive as eBanking and eHealth. STORK designed and implemented a large-scale interoperability framework, allowing different systems of different models to coexist, using a common language with a common semantics and satisfying national privacy legislations. The experience gained from this large-scale pilot fed into EU policy-making, in particular, the recently enacted eIDAS Regulation requiring mutual recognition of eID by 2018 has been directly influenced by STORK and its lessons learned. More... »

PAGES

569-585

References to SciGraph publications

  • 2015-05-10. ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life in PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION
  • 2007-09-19. Delegation in role-based access control in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2010-03-09. Electronic identity management in Estonia between market and state governance in IDENTITY IN THE INFORMATION SOCIETY
  • 2011. Revocation for Delegatable Anonymous Credentials in PUBLIC KEY CRYPTOGRAPHY – PKC 2011
  • 2009. Randomizable Proofs and Delegatable Anonymous Credentials in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2009. An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials in PUBLIC KEY CRYPTOGRAPHY – PKC 2009
  • 2010-03-06. Electronic identity in Finland: ID cards vs. bank IDs in IDENTITY IN THE INFORMATION SOCIETY
  • 2013. The INDI Ecosystem of privacy-aware, user-centric Identity in ISSE 2013 SECURING ELECTRONIC BUSINESS PROCESSES
  • 1992. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing in ADVANCES IN CRYPTOLOGY — CRYPTO ’91
  • 2012. A Systematic Approach to Legal Identity Management – Best Practice Austria in ISSE 2011 SECURING ELECTRONIC BUSINESS PROCESSES
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10207-017-0385-x

    DOI

    http://dx.doi.org/10.1007/s10207-017-0385-x

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1090361768


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal", 
              "id": "http://www.grid.ac/institutes/grid.9983.b", 
              "name": [
                "Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ribeiro", 
            "givenName": "Carlos", 
            "id": "sg:person.01267467222.43", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01267467222.43"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "A-SIT, Secure Information Technology Center, Austria Inffeldgasse 16a, 8010, Graz, Austria", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "A-SIT, Secure Information Technology Center, Austria Inffeldgasse 16a, 8010, Graz, Austria"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Leitold", 
            "givenName": "Herbert", 
            "id": "sg:person.012516432633.90", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal", 
              "id": "http://www.grid.ac/institutes/grid.9983.b", 
              "name": [
                "Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Esposito", 
            "givenName": "Simon", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Infocamera, Padova, Italy", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "Infocamera, Padova, Italy"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Mitzam", 
            "givenName": "David", 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-658-03371-2_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043447310", 
              "https://doi.org/10.1007/978-3-658-03371-2_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-18621-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008021725", 
              "https://doi.org/10.1007/978-3-319-18621-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12394-010-0044-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015427507", 
              "https://doi.org/10.1007/s12394-010-0044-0"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10207-007-0044-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016132240", 
              "https://doi.org/10.1007/s10207-007-0044-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00468-1_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001067621", 
              "https://doi.org/10.1007/978-3-642-00468-1_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12394-010-0049-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017023701", 
              "https://doi.org/10.1007/s12394-010-0049-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46766-1_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021532235", 
              "https://doi.org/10.1007/3-540-46766-1_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03356-8_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046209751", 
              "https://doi.org/10.1007/978-3-642-03356-8_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19379-8_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052737544", 
              "https://doi.org/10.1007/978-3-642-19379-8_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-8348-8652-1_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1089500195", 
              "https://doi.org/10.1007/978-3-8348-8652-1_20"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2017-07-05", 
        "datePublishedReg": "2017-07-05", 
        "description": "Verifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic identification (eID) schemes, general, cross-border solutions are rare. Cross-border eID difficulties have several origins: (i) incompatible national eID models; (ii) different legislations with incompatible objectives; (iii) lack of common language and semantics; (iv) different common procedures, specially in what concerns mandates and delegation; (v) different implementations of the same eID models. These have been addressed by STORK, a project that developed a federated cross-border eID system that was piloted in about twenty European Union Member States in service sectors as sensitive as eBanking and eHealth. STORK designed and implemented a large-scale interoperability framework, allowing different systems of different models to coexist, using a common language with a common semantics and satisfying national privacy legislations. The experience gained from this large-scale pilot fed into EU policy-making, in particular, the recently enacted eIDAS Regulation requiring mutual recognition of eID by 2018 has been directly influenced by STORK and its lessons learned.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10207-017-0385-x", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136826", 
            "issn": [
              "1615-5262", 
              "1615-5270"
            ], 
            "name": "International Journal of Information Security", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "5", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "17"
          }
        ], 
        "keywords": [
          "national privacy legislation", 
          "electronic identification (eID) schemes", 
          "eID models", 
          "large-scale pilot", 
          "interoperability framework", 
          "common semantics", 
          "online services", 
          "cross-border solutions", 
          "privacy legislation", 
          "eID system", 
          "management system", 
          "different implementations", 
          "identification scheme", 
          "common language", 
          "semantics", 
          "language", 
          "eBanking", 
          "different systems", 
          "Internet", 
          "different legislation", 
          "system", 
          "eHealth", 
          "valuable information", 
          "implementation", 
          "scheme", 
          "services", 
          "incompatible objectives", 
          "framework", 
          "recognition", 
          "delegation", 
          "information", 
          "model", 
          "different models", 
          "project", 
          "service sector", 
          "solution", 
          "pilot", 
          "EID", 
          "difficulties", 
          "lessons", 
          "objective", 
          "prerequisite", 
          "experience", 
          "state", 
          "lack", 
          "procedure", 
          "sector", 
          "storks", 
          "common procedure", 
          "European Union member states", 
          "Union member states", 
          "member states", 
          "mandate", 
          "legislation", 
          "mutual recognition", 
          "EU", 
          "regulation", 
          "origin", 
          "sectorial electronic identification (eID) schemes", 
          "Cross-border eID difficulties", 
          "eID difficulties", 
          "incompatible national eID models", 
          "national eID models", 
          "different common procedures", 
          "concerns mandates", 
          "same eID models", 
          "federated cross-border eID system", 
          "cross-border eID system", 
          "large-scale interoperability framework", 
          "large-scale eID management system", 
          "eID management system"
        ], 
        "name": "STORK: a real, heterogeneous, large-scale eID management system", 
        "pagination": "569-585", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1090361768"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10207-017-0385-x"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10207-017-0385-x", 
          "https://app.dimensions.ai/details/publication/pub.1090361768"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:43", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_730.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10207-017-0385-x"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10207-017-0385-x'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10207-017-0385-x'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10207-017-0385-x'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10207-017-0385-x'


     

    This table displays all metadata directly associated to this object as RDF triples.

    193 TRIPLES      22 PREDICATES      106 URIs      88 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10207-017-0385-x schema:about anzsrc-for:08
    2 anzsrc-for:0806
    3 schema:author N67409e2b6bdd444c8430f17c510cc928
    4 schema:citation sg:pub.10.1007/3-540-46766-1_9
    5 sg:pub.10.1007/978-3-319-18621-4_1
    6 sg:pub.10.1007/978-3-642-00468-1_27
    7 sg:pub.10.1007/978-3-642-03356-8_7
    8 sg:pub.10.1007/978-3-642-19379-8_26
    9 sg:pub.10.1007/978-3-658-03371-2_5
    10 sg:pub.10.1007/978-3-8348-8652-1_20
    11 sg:pub.10.1007/s10207-007-0044-8
    12 sg:pub.10.1007/s12394-010-0044-0
    13 sg:pub.10.1007/s12394-010-0049-8
    14 schema:datePublished 2017-07-05
    15 schema:datePublishedReg 2017-07-05
    16 schema:description Verifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic identification (eID) schemes, general, cross-border solutions are rare. Cross-border eID difficulties have several origins: (i) incompatible national eID models; (ii) different legislations with incompatible objectives; (iii) lack of common language and semantics; (iv) different common procedures, specially in what concerns mandates and delegation; (v) different implementations of the same eID models. These have been addressed by STORK, a project that developed a federated cross-border eID system that was piloted in about twenty European Union Member States in service sectors as sensitive as eBanking and eHealth. STORK designed and implemented a large-scale interoperability framework, allowing different systems of different models to coexist, using a common language with a common semantics and satisfying national privacy legislations. The experience gained from this large-scale pilot fed into EU policy-making, in particular, the recently enacted eIDAS Regulation requiring mutual recognition of eID by 2018 has been directly influenced by STORK and its lessons learned.
    17 schema:genre article
    18 schema:inLanguage en
    19 schema:isAccessibleForFree false
    20 schema:isPartOf N7c57ed8497d4464e9b93e53120bb9d96
    21 Nc9e58cfdec894f298a5b1577956ccda9
    22 sg:journal.1136826
    23 schema:keywords Cross-border eID difficulties
    24 EID
    25 EU
    26 European Union member states
    27 Internet
    28 Union member states
    29 common language
    30 common procedure
    31 common semantics
    32 concerns mandates
    33 cross-border eID system
    34 cross-border solutions
    35 delegation
    36 different common procedures
    37 different implementations
    38 different legislation
    39 different models
    40 different systems
    41 difficulties
    42 eBanking
    43 eHealth
    44 eID difficulties
    45 eID management system
    46 eID models
    47 eID system
    48 electronic identification (eID) schemes
    49 experience
    50 federated cross-border eID system
    51 framework
    52 identification scheme
    53 implementation
    54 incompatible national eID models
    55 incompatible objectives
    56 information
    57 interoperability framework
    58 lack
    59 language
    60 large-scale eID management system
    61 large-scale interoperability framework
    62 large-scale pilot
    63 legislation
    64 lessons
    65 management system
    66 mandate
    67 member states
    68 model
    69 mutual recognition
    70 national eID models
    71 national privacy legislation
    72 objective
    73 online services
    74 origin
    75 pilot
    76 prerequisite
    77 privacy legislation
    78 procedure
    79 project
    80 recognition
    81 regulation
    82 same eID models
    83 scheme
    84 sector
    85 sectorial electronic identification (eID) schemes
    86 semantics
    87 service sector
    88 services
    89 solution
    90 state
    91 storks
    92 system
    93 valuable information
    94 schema:name STORK: a real, heterogeneous, large-scale eID management system
    95 schema:pagination 569-585
    96 schema:productId N7ee2082d08e841a6bca1f76803ed9c63
    97 Nc4ce2e0b2ef244f99c32c41b79a2b708
    98 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090361768
    99 https://doi.org/10.1007/s10207-017-0385-x
    100 schema:sdDatePublished 2022-01-01T18:43
    101 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    102 schema:sdPublisher N44e4adf988724c5a8efa9f577dcf53fc
    103 schema:url https://doi.org/10.1007/s10207-017-0385-x
    104 sgo:license sg:explorer/license/
    105 sgo:sdDataset articles
    106 rdf:type schema:ScholarlyArticle
    107 N1a47cb394a56423cb7b54fe9d3b358b1 rdf:first sg:person.012516432633.90
    108 rdf:rest Nf61f67fe971c4986af89d37a63ef541d
    109 N23d681fc8cae4b889da5fce1616c5015 schema:affiliation grid-institutes:grid.9983.b
    110 schema:familyName Esposito
    111 schema:givenName Simon
    112 rdf:type schema:Person
    113 N44e4adf988724c5a8efa9f577dcf53fc schema:name Springer Nature - SN SciGraph project
    114 rdf:type schema:Organization
    115 N67409e2b6bdd444c8430f17c510cc928 rdf:first sg:person.01267467222.43
    116 rdf:rest N1a47cb394a56423cb7b54fe9d3b358b1
    117 N6cb811168bc546e094fa72ed301f465e schema:affiliation grid-institutes:None
    118 schema:familyName Mitzam
    119 schema:givenName David
    120 rdf:type schema:Person
    121 N7c57ed8497d4464e9b93e53120bb9d96 schema:issueNumber 5
    122 rdf:type schema:PublicationIssue
    123 N7ee2082d08e841a6bca1f76803ed9c63 schema:name dimensions_id
    124 schema:value pub.1090361768
    125 rdf:type schema:PropertyValue
    126 Nc4ce2e0b2ef244f99c32c41b79a2b708 schema:name doi
    127 schema:value 10.1007/s10207-017-0385-x
    128 rdf:type schema:PropertyValue
    129 Nc9e58cfdec894f298a5b1577956ccda9 schema:volumeNumber 17
    130 rdf:type schema:PublicationVolume
    131 Nf61f67fe971c4986af89d37a63ef541d rdf:first N23d681fc8cae4b889da5fce1616c5015
    132 rdf:rest Nff168d7e7ccb40f4a9360c5884a3bcdb
    133 Nff168d7e7ccb40f4a9360c5884a3bcdb rdf:first N6cb811168bc546e094fa72ed301f465e
    134 rdf:rest rdf:nil
    135 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    136 schema:name Information and Computing Sciences
    137 rdf:type schema:DefinedTerm
    138 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    139 schema:name Information Systems
    140 rdf:type schema:DefinedTerm
    141 sg:journal.1136826 schema:issn 1615-5262
    142 1615-5270
    143 schema:name International Journal of Information Security
    144 schema:publisher Springer Nature
    145 rdf:type schema:Periodical
    146 sg:person.012516432633.90 schema:affiliation grid-institutes:None
    147 schema:familyName Leitold
    148 schema:givenName Herbert
    149 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
    150 rdf:type schema:Person
    151 sg:person.01267467222.43 schema:affiliation grid-institutes:grid.9983.b
    152 schema:familyName Ribeiro
    153 schema:givenName Carlos
    154 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01267467222.43
    155 rdf:type schema:Person
    156 sg:pub.10.1007/3-540-46766-1_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021532235
    157 https://doi.org/10.1007/3-540-46766-1_9
    158 rdf:type schema:CreativeWork
    159 sg:pub.10.1007/978-3-319-18621-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008021725
    160 https://doi.org/10.1007/978-3-319-18621-4_1
    161 rdf:type schema:CreativeWork
    162 sg:pub.10.1007/978-3-642-00468-1_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001067621
    163 https://doi.org/10.1007/978-3-642-00468-1_27
    164 rdf:type schema:CreativeWork
    165 sg:pub.10.1007/978-3-642-03356-8_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046209751
    166 https://doi.org/10.1007/978-3-642-03356-8_7
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/978-3-642-19379-8_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052737544
    169 https://doi.org/10.1007/978-3-642-19379-8_26
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/978-3-658-03371-2_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043447310
    172 https://doi.org/10.1007/978-3-658-03371-2_5
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1007/978-3-8348-8652-1_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1089500195
    175 https://doi.org/10.1007/978-3-8348-8652-1_20
    176 rdf:type schema:CreativeWork
    177 sg:pub.10.1007/s10207-007-0044-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016132240
    178 https://doi.org/10.1007/s10207-007-0044-8
    179 rdf:type schema:CreativeWork
    180 sg:pub.10.1007/s12394-010-0044-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015427507
    181 https://doi.org/10.1007/s12394-010-0044-0
    182 rdf:type schema:CreativeWork
    183 sg:pub.10.1007/s12394-010-0049-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017023701
    184 https://doi.org/10.1007/s12394-010-0049-8
    185 rdf:type schema:CreativeWork
    186 grid-institutes:None schema:alternateName A-SIT, Secure Information Technology Center, Austria Inffeldgasse 16a, 8010, Graz, Austria
    187 Infocamera, Padova, Italy
    188 schema:name A-SIT, Secure Information Technology Center, Austria Inffeldgasse 16a, 8010, Graz, Austria
    189 Infocamera, Padova, Italy
    190 rdf:type schema:Organization
    191 grid-institutes:grid.9983.b schema:alternateName Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal
    192 schema:name Instituto Superior Tcnico, Universidade de Lisboa, Av. Rovisco Pais, 1, 1049-001, Lisboa, Portugal
    193 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...