New Search

If you are not happy with the results below please do another search

11 search results for:

1

A “data bridge” for business relationships

Business processes between two and more companies, so-called business-to-business (B2B) relationships, are mostly handled electronically today. Portals are used for many of these B2B business processes. The service provider (supplier) offers its services and products on the portal. In order to use the services offered in a B2B context, the partner companies often have to […]

2

What solutions exist for the transfer of identity information

Business processes between two and more companies, so-called Business-To-Business (B2B) relationships, are mostly handled electronically today. But if you look closely, you will still find many manual steps that often generate high indirect costs. The cause is usually a lack of information about employees of one company, which is needed to efficiently manage the business […]

3

6 reasons against a central state identity provider

The Federal Department of Justice and Police (FDJP) presents three different technical scenarios in its “E-ID target picture” . One of them is an “E-ID solution by means of a central state identity provider”. We show from a technical point of view why a central “E-ID” login cannot advance digitisation in Switzerland. The survey of […]

4

Self-Sovereign-Identity – from vision to today

A few years have passed since Christopher Allen’s vision of Self-Sovereign Identities. What has remained of the original vision of “SSI” and in which direction is the current development going? E-ID specialist Prof. Dr. Annett Laube starts our series on the E-ID in parallel with the public consultation. In 2017, Christopher Allen published his vision […]

6

Public Security Test of the Covid Certificate: BFH assists with security

The first Covid certificates have been issued in the cantons since 7 June 2021. At the end of June, the system is to be introduced throughout Switzerland and will have a very high level of security. The IAM research group of the Institute for Data Applications and Security (IDAS) of the Bern University of Applied […]