VEN 发表于 2025-3-27 00:50:10
Conference proceedings 2015 talk were carefully reviewed and selected from 30 submissions. The papers are organized in the following topical sections: semantic technologies in e-government; identity management in e-government; e-government cases; open innovation and G-cloud; intelligent systems in e-government; open government; e-government solutions and approaches.IST 发表于 2025-3-27 03:59:24
http://reply.papertrans.cn/31/3064/306319/306319_32.png注意到 发表于 2025-3-27 08:11:28
Using the Semantic Web for the Integration and Publication of Public Procurement Data a whole. This paper presents an experience that shows how the Semantic Web provides appropriate resources to develop data models that can be used both for the management of public contracts and for the publication of information about them. And within that, with a dual objective of improving efficiFester 发表于 2025-3-27 10:28:11
The Ontology-Based Approach of the Publications Office of the EU for Document Accessibility and Openroduced by the institutions of the European Union. The central component of its information system is the CELLAR repository, providing semantic indexing, advanced search and data retrieval for multilingual resources. This paper gives an overview of the semantic modeling approach for CELLAR, based on小歌剧 发表于 2025-3-27 14:53:24
Engineering Semantic Web Services for Government Business Processes Automation. Semantic Web Services (SWS) overcome this limitation by adding semantic descriptions to WS, enabling automatic discovery, selection, composition and execution of services for intelligent interoperable machine-to-machine interactions over the World Wide Web (WWW). These capabilities of SWS are usefBARK 发表于 2025-3-27 20:46:46
Enhancing Public Digital Identity System (SPID) to Prevent Information Leakageectronic identification and trust services in e-government and business applications. According to this federated identity management framework, digital identities are issued, upon application of the interested party, by digital identity providers. This way, users authenticate to service providers,阻碍 发表于 2025-3-28 01:51:17
Encryption-Based Second Authentication Factor Solutions for Qualified Server-Side Signature Creationr-based eID and e-signature solutions have recently gained popularity, as they provide enhanced usability while still complying with strict security requirements. To implement obligatory two-factor user-authentication schemes, current server-based eID and e-signature solutions typically rely on one-健谈 发表于 2025-3-28 05:11:32
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europes in Europe. Mobile technologies facilitate secure and usable implementations of these fundamental concepts. Various European countries already rely on such implementations and have deployed mobile eID and e-signature solutions on a large scale. These deployments are used by applications from both t打谷工具 发表于 2025-3-28 10:14:31
Biometric Identification in eHealthcare: Learning from the Cases of Russia and Italyr a variety of purposes: from physical access control, to authentication and access to information, recognition of people, etc. E-government is certainly a context where biometrics has a crucial role, because high level of assurance about the identity of citizens is required, whenever they interact勋章 发表于 2025-3-28 11:57:32
Towards a Model of Client-Driven Access to Public e-Servicesoints out barriers rooted in the traditional logic of access to public e-services in which clients are required to use the same e-authentication technique and way of electronic document exchange. We present a client-driven model that gives the freedom of choice to the client with respect to the e-au