If you made any changes in Pure these will be visible here soon.

Research Output 2002 2019

2019

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File
2018

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

2017

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2017, Graz: Springer Verlag.

Research output: Book/ReportBookResearchpeer-review

Open Access

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

SUNFISH ID1v1 – Identity Management and Access Control

SUNFISH WG, Jan 2017

Research output: Other contributionResearch

Access control
Security of data
Application programming interfaces (API)
International cooperation
Reusability

SUNFISH ID1v2 – Identity Management and Access Control at Work

SUNFISH WG, Nov 2017

Research output: Other contributionResearch

Access control
Security of data
2016

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

GDPR & ePrivacy: APF 2017, Pre-Proceedings of the 5th ENISA Annual Privacy Forum

Austria, A-SIT. Z. F. S. I. (ed.), Schweighofer, E. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2016, Graz: Österreichische Computergesellschaft. 257 p.

Research output: Book/ReportBookResearchpeer-review

2015

Austrian Mobile Signing

Lipp, P. & Leitold, H., 25 Jun 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

STORK 2.0 - D4.10 Final version of Technical Design

WP4 Team, Oct 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D4.12 Final version of security recommendations

WP4 Team, Oct 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D4.13 Final Version of Common Building Blocks

WP4 Team, 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D5.3.5 eGov4Business Pilot Final Report

eGovernment4Business WG, Nov 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

SUNFISH D2.1 – State of the Art and Legal Aspects

Reiter, A., Leitold, H., Suzic, B., Reimair, F., Moffie, M., Cordina, D., Pullonen, P., Pettai, M., Kubo, B. & Venturi, D., 30 Dec 2015, (Submitted)

Research output: Other contributionResearch

SUNFISH D2.2 – Requirement Definition and Threat Model

Reiter, A., Suzic, B., Leitold, H., Cassar, J., Nicoletti, L., Rozenberg, B. & Jones, C., 31 Dec 2015, (Submitted)

Research output: Other contributionResearch

2014

Building blocks to facilitate electronic communication in various domains: eID and eSignature

Leitold, H. & Soykan, E. U., 7 Nov 2014.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Cloud4Europe – D3.1 Standards, normalization and certifications associated

C4EU WG, May 2014

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Cloud4Europe – D3.2 Public Sector Study

C4EU WG, Dec 2014

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0: Breaking New Grounds on eID and Mandates

Leitold, H., Lioy, A. & Ribeiro, C., 2014, Proceedings of ID World International Congress. ., p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK 2.0 - D5.3.2 eGov4Business Go Live Planning

eGovernment4Business WG, Feb 2014, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D5.3.3 eGov4Business Pilot Running Phase Planning

STORK 2 eGovernment4Business WG, Mar 2014, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Supporting Decision Making and Policy Through Large Scale Pilots

Leitold, H., 2014, Proceeedings of AHFE 2014. Graz: The Printing House Inc., p. 2669-2679

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2013

Middleware Architecture for Cross-Border Identification and Authentication

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2013, In : Journal of Information Assurance and Security . 8, 2, p. 107-118

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Semantic Pattern Transformation

Teufl, P., Leitold, H. & Posch, R., 2013, Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies. New York: Association of Computing Machinery, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

STORK 2.0 - Technical & Business Objectives and Specifications

eGovernment4Business WG, 2013, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Technology-Enabled Innovation for Democracy, Government and Governance

Austria, A-SIT. Z. F. S. I. (ed.), Kö, A. (ed.), Leitner, C. (ed.) & Prosser, A. (ed.), 2013, 1 ed. Graz: Springer. (LNCS)

Research output: Book/ReportBookResearchpeer-review

The INDI Ecosystem of privacy-aware, user-centric Identity

Leontaridis, L., Andersson, T., Leitold, H., Zwattendorfer, B., Yang, S. & Lindholm, P., 2013, ISSE 2013 - Securing Electronic Business Processes. ., p. 45-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2012

Advancing Democracy, Government and Governance

Kö, A. (ed.), Leitner, C. (ed.), Leitold, H. (ed.) & Prosser, A. (ed.), 2012, 1 ed. Graz: Springer. (LNCS)

Research output: Book/ReportBookResearchpeer-review

GINI-SA D3.2: A Regulatory Framework for INDI Operators

Van Alsenoy, B., Lievens, E., Janssen, K., Dumortier, J., Rannenberg, K., Yang, S., Andersson, T., Abbas, Q., Leitold, H. & Zwattendorfer, B., 2012, .

Research output: Book/ReportCommissioned reportResearch

GINI-SA D5.1: A longer-term research and implementation roadmap towards a fully user-centric INDI ecosystem

Zwattendorfer, B., Leitold, H., Yang, S., Andersson, T., Leontaridis, L. & Lindholm, P., 2012, .

Research output: Book/ReportCommissioned reportResearch

GINI-SA D5.2: White Paper on the establishment of an INDI Operator Market across the EU

Leitold, H., Zwattendorfer, B., Andersson, T., Leontaridis, L., Lindholm, P. & Yang, S., 2012, .

Research output: Book/ReportCommissioned reportResearch

GINI-SA D6.4: 2nd Interim Report on Stakeholder Engagement and Community of Practice

Andersson, T., Bittins, S., Krontiris, I., Leitold, H., Leontaridis, L., Lindholm, P., Rannenberg, K., Tauber, A., Tikkala, S., Van Alsenoy, B., Yang, S. & Zwattendorfer, B., 2012, .

Research output: Book/ReportCommissioned reportResearch

GINI-SA D6.5: 3rd Final Report on Stakeholder Engagement and Community of Practice

Andersson, T., Bittins, S., Krontiris, I., Leitold, H., Leontaridis, L., Lindholm, P., Rannenberg, K., Tauber, A., Tikkala, S., Van Alsenoy, B., Yang, S. & Zwattendorfer, B., 2012, .

Research output: Book/ReportCommissioned reportResearch

Middleware Architecture for Cross-Border eID

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2012, International Conference on Information Assurance and Security. Graz: ., p. 303-308

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK - Technical Approach and Privacy

Austria, A-SIT. Z. F. S. I. & Posch, R., 2012, Digital Enlightenment Yearbook 2012. 1 ed. Graz: IOS Press, p. 289-306

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File
2011

A Systematic Approach to Legal Identity Management - Best Practice Austria

Leitold, H. & Tauber, A., 2011, ISSE 2011 - Securing Electronic Business Processes. Graz: Wiesbaden, p. 224-234

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Challenges of eID Interoperability: The STORK Project

Leitold, H., 2011, Privacy and Identity Management for Life. Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R. & Zhang, G. (eds.). Graz: Springer, Vol. 352. p. 144-150 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

GINI-SA D1.1: A User-centric Framework of Identity Management Services

Andersson, T., Bittins, S., Caumanns, J., Gran, G., Guerses, S., Krontiris, I., Leitold, H., Leontaridis, L., Lindholm, P., Rannenberg, K., Tauber, A., Tikkala, S., Van Alsenoy, B., Weber, C. & Zwattendorfer, B., 2011, .

Research output: Book/ReportCommissioned reportResearch

GINI-SA D3.1: Legal Provisions for Deploying INDI Services

Van Alsenoy, B., Vandezande, N., Janssen, K., Kuczerawy, A., Kindt, E., Dumortier, J., Leitold, H., Zwattendorfer, B. & Krontiris, I., 2011, Graz: .

Research output: Book/ReportCommissioned reportResearch

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

STORK D6.2.5: SaferChat - Final Report

Axfjörð, A. F., Jónsson, G. K., Leitold, H. & Reynisdóttir, H. Ö., 2011, .

Research output: Book/ReportCommissioned reportResearch

STORK D6.7.3: ECAS-STORK - Detailed Planning

Leitold, H., 2011, .

Research output: Book/ReportCommissioned reportResearch

STORK D6.7.4: ECAS-STORK - Progress Report

Leitold, H., 2011, .

Research output: Book/ReportCommissioned reportResearch

STORK D7.11: Implementation Report on eHealth LSP

Leitold, H., Zefferer, T., Zwattendorfer, B., Pregartbauer, M., Scharinger, R., Campari, F. & Zuffada, R., 2011, Graz: .

Research output: Book/ReportCommissioned reportResearch

STORK e-Privacy and Security

Koulolias, V., Kountzeris, A., Crespo, A., Leitold, H., Zwattendorfer, B. & Stern, M., 2011, Proceedings of 5th International Conference on Network and System Security (NSS 2011). Graz: IEEE digital library, p. 234-238

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2010

Biometrics in eID: Challenges and Opportunities

Austria, A-SIT. Z. F. S. I. & Gilbert, J., 8 Sep 2010.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

eID Interoperability (chapter 12)

Leitold, H., Posch, R., Rannenberg, K. & Krontiris, I., 2010, Handbook of eID Security: Concepts, Practical Experiences, Technologies. 1 ed. Graz: Publicis Publishing, p. 167-186

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Reconstruction of electronic signatures from eDocument printouts

Leitold, H., Posch, R. & Rössler, T., 2010, In : Computers & Security. 29, 5, p. 523-532

Research output: Contribution to journalArticleResearchpeer-review

STORK: Architecture, Implementation and Pilots

Leitold, H. & Zwattendorfer, B., 2010, ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference. Graz: Vieweg+Teubner, p. 131-142

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Open Access
File

STORK D3.3: Study on eID Technologies

Zefferer, T., Ivkovic, M., Haid, J., Leitold, H., Keskel, U., Martens, T. & Knall, T., 2010, .

Research output: Book/ReportCommissioned reportResearch