Presentations

Empowering Business

The European eID Interoperability Concepts and Compliance Conference

Cross-border service provision supporting national eIDs

Biel, Switzerland - 27/03/2012 to 28/03/2012

The last year has seen some dramatic industry developments and innovations; however, there are many issues that have still not been resolved.

Now in its 7th year, this annual conference will address these and many other issues. Organised by EEMA, this conference acts as a neutral forum where industry, business and administrations can address specific areas of importance in the digital identity arena. It also facilitates the exchange of ideas amongst delegates who want to learn and build upon their knowledge in a relaxed, constructive environment. 

This year we will also be joined by TDL (Trust in Digital Life) who will be introducing the Strategic Research and Innovation Agenda (SRA) for Trustworthy ICT at the conference.  The SRA addresses central challenges of trust in digital life towards a vibrant future economy that protects privacy and other basic related human rights of citizens in society, in the timeframe horizon 2020 of the European Union. The SRA document will be handed over to the European Commission at the conference as a token of the commitment of TDL to the goals of Digital Agenda. TDL will also be demonstrating various eID interoperability solutions and technologies.

The conference will explore how the interoperability of European Identity is evolving in practise and the implications for governments, businesses and the citizen today.

TDL Workshops
For achieving Trust, reputation systems are an important tool when transactions require a trust-relationship between the involved parties and the parties need to estimate trustworthiness. Even today, market platforms such as ebay or the app markets for smart phones use such schemes as an essential part to establish trust with users. There are strong indicators that the Internet of Services or the Internet of Things will need to handle services of unknown origin including whether or not they can be trusted. This changing environment makes it essential to install trust and reputation systems that can deal with such services. For scalability reasons, the systems should be protected against manipulation so that no human supervision is required. Also, automatic decision making should be supported by such systems, for example in M2M-like applications.

In this workshop, we will discuss these and other requirements on future trust and reputation systems that the TDL community and beyond will need to deal with to enable trust in digital life.

Missing presentations will be added as they become available.

The Verizon business presentation will not be available to download.

Sponserd by

Supported by

Please login:

To be able to download following presentations or biographies you should login using the form below:

 

 

 

If you are an eema member and do not have your user ID and password please contact your member rep or
email Fiona Hawkins.



Opening Session
Presentation titleSpeaker, companypdfbio
Welcome Roger Dean, EEMA You should login to be able to download this file You should login to be able to download this file
Welcome Lukas Rohr, TI/BFH You should login to be able to download this file You should login to be able to download this file
Introduction Xavier Larduinat, Gemalto You should login to be able to download this file You should login to be able to download this file
Introduction Eric Smith, BFH
Welcome and a perspective of eIdentity challenges and their possible solutions (BHF) Daniel Markwalder, Swiss Federal Office of Information Technology You should login to be able to download this file You should login to be able to download this file
Trust in digital life vision and importance of trust and managing trust in ICT Aljosa Pasic, TDL Advisory Board You should login to be able to download this file You should login to be able to download this file
Digital Agenda and Horizon 2020 Gustav Kalbe, European Commission You should login to be able to download this file You should login to be able to download this file
Opening Session cont
Presentation titleSpeaker, companypdfbio
Kick starting application services Jon Shamah, NETS You should login to be able to download this file You should login to be able to download this file
Interoperability in Europe Detlef Houdeau, Infineon Technologies AG You should login to be able to download this file You should login to be able to download this file
Cross-border Identity Solutions
Presentation titleSpeaker, companypdfbio
Cross country, cross segment identity and federation challenges and solutions Harm Jan Jan Arendshorst, Verizon Business
STORK 2.0 - Banking pilot and service design Eric Smith & Jérôme Brugger, BFH You should login to be able to download this file You should login to be able to download this file
Online procedures for cross-border business start-up Marcin Kraska, Institute of Logistics and Warehousing You should login to be able to download this file You should login to be able to download this file
Building Trust in the Swiss Context
Presentation titleSpeaker, companypdfbio
Chair Andreas Spichiger, BFH
An introduction to Suisse ID Mark Zweiacker & Gerhard Hassenstein, BFH You should login to be able to download this file You should login to be able to download this file
Realising SuisseTrustIAM - organisational, institutional and legal challenges Hans Häni & Konrad Walser, BFH You should login to be able to download this file You should login to be able to download this file
SuisseTrustIAM - obligatory allocation of roles and identities in the eEconomy Ines Heer & Ronny Bernold, BFH You should login to be able to download this file You should login to be able to download this file
myIDP - the personal attribute hub Annett Laube-Rosenpflanzer, BFH You should login to be able to download this file You should login to be able to download this file
Trust in Digital LIfe Session
Presentation titleSpeaker, companypdfbio
End-toEnd Trust Roger Halbheer, Microsoft You should login to be able to download this file You should login to be able to download this file
Trust in Digital Life strategic research agenda introduction Amardeo Sarma, NEC Labs, Europe You should login to be able to download this file You should login to be able to download this file
Trust and security in eHealth Milan Petkovic, Philips Research
Practical Applications of National eID Cards
Presentation titleSpeaker, companypdfbio
Chairman Sven Gossel, Charismathics You should login to be able to download this file You should login to be able to download this file
The Irish public services card Neil McEvoy, Consult Hyperion You should login to be able to download this file You should login to be able to download this file
Basic and advanced interoperability cooperation and federation in Italy's public administration - in collaboration with John Forrester, Ancitel Christian Schunck, Nestor - Tor Vergata University You should login to be able to download this file You should login to be able to download this file
Secure interoperable intermediaries for identity management in the cloud - the German SkIDentity approach Jan Zibuschka, Fraunhofer IAO You should login to be able to download this file You should login to be able to download this file
eIdentity and Anonymity
Presentation titleSpeaker, companypdfbio
Chair Bernhard Anrig, BFH
Privacy and integrity in internet voting Rolf Haenni, BFH You should login to be able to download this file You should login to be able to download this file
WebID: decentralised authentication for a world wide web of trust Henry Story & Adrian Gschwend, BFH
Secure universal protocol for eAssessment Andrea Huszti, University Debrecen You should login to be able to download this file You should login to be able to download this file
Trust in Digital Life
Presentation titleSpeaker, companypdfbio
Building the ecosystem for secure transactions with contactless cards and NFC Hans de Jong, NXP Semiconductors
Collaborative security and privacy monitoring in ICT: a key technology to enable trust Sathya Rao, KYOS You should login to be able to download this file You should login to be able to download this file
Drinks and Networking Reception
Presentation titleSpeaker, companypdfbio
Welcome Erich Fehr, .
Federated Identity
Presentation titleSpeaker, companypdfbio
Chairman Arkadiy Kremer, RANS
Protecting federated applications Margarete Donovang-Kuhlisch, IBM Deutschland GmbH You should login to be able to download this file You should login to be able to download this file
Secure management of information across multiple stakeholders Aljosa Pasic, ATOS Reseach and Innovation You should login to be able to download this file You should login to be able to download this file
Federated identity and privacy in higher education environments Victoriano Giralt, University of Malaga You should login to be able to download this file You should login to be able to download this file
SSEDIC Project
Presentation titleSpeaker, companypdfbio
Chair Daniela Merella, Nestor
Results of the 2011 SSEDIC Expert Survey Hugo Kerschot, IS-practice You should login to be able to download this file You should login to be able to download this file
SSEDIC survey report Speaker tbc, . You should login to be able to download this file You should login to be able to download this file
Re-thinking the evaluation of eID Credentials Christian Schunck, Nestor - Tor Vergata University
Trust in Digital Life Pilot Projects introduction
Presentation titleSpeaker, companypdfbio
Trust in Digital Life Project Roadmap TDL Arthur Leijtens, Trust in Digital Life
Authentication architecture Ronny Bjones, Microsoft
Cloud security Xavier Larduinat, Gemalto
Trusted reputation systems Amardeo Sarma, NEC Labs, Europe
  Jens-Matthias Bohli, NEC Labs, Europe
The Emerging Importance of Distributed Attributes and the Security and Privacy Implications
Presentation titleSpeaker, companypdfbio
Inter-federation interoperability in the Semiramis Project Antonio Skarmeta, Universidad de Murcia You should login to be able to download this file You should login to be able to download this file
The last resort? Legislative challenges and opportunities for cross-border attribute exchange Andrew Cormack, JANET (UK) You should login to be able to download this file You should login to be able to download this file
Secure delegated user management in large organisation and across organisation boundaries using public key and attribute certificates Thomas Kopp, DIaLOGIKa You should login to be able to download this file You should login to be able to download this file
Personal data under personal control? Shaping the future of eID
Presentation titleSpeaker, companypdfbio
Chairman Lefteris Leontaridis, GINI-SA Project
Business Value . ., .
Technical Aspects Bernd Zwattendorfer, e-Government Innovation Center You should login to be able to download this file You should login to be able to download this file
Discussion - a chance to challenge the GINI vision and validate or refute key assumptions and conclusions . ., .
TDL IP project proposal for EC FP7 call 10 - Keynote speeches for inspiration
Presentation titleSpeaker, companypdfbio
Chair Daan Velthausz, Bicore
Security of the future internet, trust, privacy and advanced networks Michel Riguidel, Paris Telekom You should login to be able to download this file You should login to be able to download this file
11.45 Solutions for mobile security and privacy protection N Asokan, Nokia Research Centre You should login to be able to download this file You should login to be able to download this file
Future Perspective
Presentation titleSpeaker, companypdfbio
Chairman Roger Dean, EEMA
Identity, security and trust can bring win win win situation Ales Lipicnik, SecuCert
Security mix for a cross-border banking service Nuno Ponte, Multicert You should login to be able to download this file You should login to be able to download this file
Calculating the economic benefit of eID federation David Simonsen, WAYF.DK
Inimitable identity Tarvi Martens, AS Sertifitseerimiskeskus You should login to be able to download this file You should login to be able to download this file
TDL IP project cont
Presentation titleSpeaker, companypdfbio
Security Challenges for Future Systems Steve Purser, ENISA You should login to be able to download this file You should login to be able to download this file
14.15 Ideation discussion IP Project in groups . ., .


EEMA : established in 1987 to promote collaboration in the technical and business aspects of ICT