{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:45Z","timestamp":1754157225609,"version":"3.41.2"},"reference-count":24,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[1999,10,1]],"date-time":"1999-10-01T00:00:00Z","timestamp":938736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,10,1]]},"abstract":"<jats:p>The Digital Signature Project (ELU\u2010project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an infrastructure for applying smart card\u2010based digital signatures in banking and electronic commerce applications. One important requirement is to conform to all relevant international standards to ensure interoperability in case of a later connection to an international certification infrastructure. One part of the infrastructure is a public directory in the form of an LDAP\u2010server from which the X.509v3 certificates of the public signature keys can be retrieved. To provide for integrity, strong data authenticity and non\u2010repudiation of all directory information it was important to apply some security features that have not been standardized for LDAP yet. In this way the user can be sure that he is talking to the trusted directory when retrieving certificates and certificate\u2010related information. In this paper we give an overview of the project and some insights into some of the interesting parts of the system specification and design.<\/jats:p>","DOI":"10.1108\/10662249910286725","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"262-271","source":"Crossref","is-referenced-by-count":3,"title":["Digital signature management"],"prefix":"10.1108","volume":"9","author":[{"given":"Vesna","family":"Hassler","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Biely","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012420390275800_B1","unstructured":"BDC EDV\u2010Consulting GmbH (1998), \u201cELU\u2010project documentation\u201d."},{"key":"key2022012420390275800_B2","unstructured":"Commission of the European Communities (1998), \u201cProposal for a European Parliament and Council Directive on a common framework for electronic signatures\u201d, COM(1998) 297 final, URL:http:\/\/europa.eu.int\/comm\/dg15\/en\/media\/infso\/com297en.pdf"},{"key":"key2022012420390275800_B3","doi-asserted-by":"crossref","unstructured":"Dierks, T. and Allen, C. (1999), \u201cThe TLS Protocol Version 1.0\u201d, RFC2246.","DOI":"10.17487\/rfc2246"},{"key":"key2022012420390275800_B4","unstructured":"Dreifus, H. and Monk, J.T. (1998), Smart Cards. A Guide to Building and Managing Smart Card Applications, John Wiley & Sons, Inc., New York, NY."},{"key":"key2022012420390275800_B5","doi-asserted-by":"crossref","unstructured":"Dusse, S. et al. (1998), \u201cS\/MIME Version 2 Message Specification\u201d, RFC2311.","DOI":"10.17487\/rfc2311"},{"key":"key2022012420390275800_B6","unstructured":"Federal Government of Germany (1997), \u201cInformation and Communication Services Act, Article 3: Digital Signature Act (SigG)\u201d and \u201cDigital Signature Directive (SigV)\u201d."},{"key":"key2022012420390275800_B7","doi-asserted-by":"crossref","unstructured":"Greenblatt, B. and Richard, P. (1999), \u201cAn LDAP control and schema for holding operation signatures\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010sigops\u201004.txt>","DOI":"10.17487\/rfc2649"},{"key":"key2022012420390275800_B8","unstructured":"Hodges, J., Morgan, R.L. and Wahl, M. (1998), \u201cLightweight Directory Access Protocol (v3): Extension for Transport Layer Security\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010ldapv3\u2010tls\u201004.txt>"},{"key":"key2022012420390275800_B9","unstructured":"ISO (1995a), \u201cInformation technology \u2013 Open Systems Interconnection \u2013 The Directory: Authentication framework\u201d, ISO\/IEC 9594\u20108 (also ITU\u2010T X.509)."},{"key":"key2022012420390275800_B10","unstructured":"ISO (1995b), \u201cInformation technology \u2013 Open Systems Interconnection \u2013 The Directory: Amendment 1 to ISO\/IEC 9594\u20108:1995: Certificate extensions\u201d."},{"key":"key2022012420390275800_B11","unstructured":"ISO (1995c), \u201cInformation technology \u2013 Open Systems Interconnection \u2013 The Directory: Abstract service definition\u201d, ISO\/IEC 9594\u20103 (also ITU\u2010T X.511)."},{"key":"key2022012420390275800_B12","unstructured":"ITU\u2010T (1997), \u201cInformation Technology \u2013 Open Systems Interconnection \u2013 The Directory: Authentication Framework\u201d, ITU\u2010T Recommendation X.509."},{"key":"key2022012420390275800_B13","unstructured":"Kille, S.E. (1999), \u2018X.509 Authentication SASL Mechanism\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010x509\u2010sasl\u201001.txt>, 1 July."},{"key":"key2022012420390275800_B14","doi-asserted-by":"crossref","unstructured":"Klensin, J., Catoe, R. and Krumviede, P. (1997), \u201cIMAP\/POP AUTHorize Extension for Simple Challenge\/Response\u201d, RFC 2195.","DOI":"10.17487\/rfc2195"},{"key":"key2022012420390275800_B15","doi-asserted-by":"crossref","unstructured":"Myers, J. (1997), \u201cSimple Authentication and Security Layer (SASL)\u201d, RFC 2222.","DOI":"10.17487\/rfc2222"},{"key":"key2022012420390275800_B16","unstructured":"Philips (1999), \u201cHomepage of Philips Semiconductors\u201d, URL:<http:\/\/www\u2010us2.semiconductors.philips.com>"},{"key":"key2022012420390275800_B17","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A. and  Adleman, L. (1978), \u201cA method for obtaining digital signatures and public key cryptosystems\u201d, Communications of the ACM, Vol. 21, pp. 120\u20106","DOI":"10.1145\/359340.359342"},{"key":"key2022012420390275800_B18","doi-asserted-by":"crossref","unstructured":"Stokes, E., Byrne, D. and Blakley, B. (1999), \u201cAccess control model for LDAP\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010acl\u2010model\u201002.txt>","DOI":"10.17487\/rfc2820"},{"key":"key2022012420390275800_B19","unstructured":"Stokes, E., Byrne, D., Blakley, B. and Behera, P. (1998), \u201cAccess Control Requirements for LDAP\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010acl\u2010reqts\u201001.txt>"},{"key":"key2022012420390275800_B20","unstructured":"STUZZA (1999), \u201cHomepage of the Studiengesellschaft f\u00fcr Zusammenarbeit im Zahlungsverkehr\u201d, URL:<http:\/\/www.stuzza.at\/>, Vienna, Austria."},{"key":"key2022012420390275800_B21","unstructured":"VeriSign (1999), \u201cCPS Section 2: VeriSign Certification Infrastructure\u201d, URL:<http:\/\/www.verisign.com\/repository\/CPS1.2\/CPSCH2.HTM>"},{"key":"key2022012420390275800_B22","doi-asserted-by":"crossref","unstructured":"Wahl, M., Howes, T. and Kille, S. (1997a), \u201cLightweight Directory Access Protocol (v3)\u201d, RFC 2251.","DOI":"10.17487\/rfc2251"},{"key":"key2022012420390275800_B23","unstructured":"Wahl, M., Alvestrand, H., Hodges, J. and Morgan, R.L. (1998), \u201cAuthentication Methods for LDAP\u201d, INTERNET\u2010DRAFT <draft\u2010ietf\u2010ldapext\u2010authmeth\u201003.txt>"},{"key":"key2022012420390275800_B24","doi-asserted-by":"crossref","unstructured":"Wahl, M., Coulbeck, A., Howes, T. and Kille, S. (1997b), \u201cLightweight Directory Access Protocol (v3): Attribute Syntax Definitions\u201d, RFC 2252.","DOI":"10.17487\/rfc2252"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662249910286725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910286725\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910286725\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:41:01Z","timestamp":1753400461000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/4\/262-271\/186091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,10,1]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1999,10,1]]}},"alternative-id":["10.1108\/10662249910286725"],"URL":"https:\/\/doi.org\/10.1108\/10662249910286725","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1999,10,1]]}}}