e- Estonia - 10 years of experience
|
|
- Barnaby White
- 8 years ago
- Views:
Transcription
1 e- Estonia - 10 years of experience Lessons learned Jüri Voore, Estonian Cer;fica;on Centre
2 PROJECT MILESTONES o First ideas in 1997 o Law on personal iden;fica;on documents: Feb, 1999 o Digital Signature Act: March, 2000 o Government accepted plan for launching ID- card: May, 2000 o 2001 : Tender for ID card produc;on & personalisa;on service won by Swiss TRÜB AG o Sept 2001 : Cer;fica;on service contract tendered to AS Ser;fitseerimiskeskus o First card issued: Jan 28, 2002 o October 2006: th card issued
3 MILESTONES VOL 2 o 2004 ID card as e- ;cket in public transport o 2005 world first Internet vo;ng o 2007 first mobile ID issued o 2011 new DigiDoc so\ware o 2011 mobile ID as na;onal electronic ID document o 2011 mobile ID used in Internet vo;ng o March 2012: users for e- services
4 WHAT IS ESTONIAN eid card o o eid card is Police and Borderguard Board issued ID + travel document. Max. validity 5 years It is mandatory document for all EST residents star;ng of age 15 o Contains: ü Visual personal informa;on ü Personal data file ü Cer;ficate for authen;ca;on (along with e- mail address Forename.Surname@ees;.ee) ü Cer;ficate for digital signature
5 110 DB X-road 5 ~ ~ April users users 550 org. 200 DB 1,100,000
6 SINGLE SOURCE FOR USERS ESTONIAN ID CARD, PKI AND DIGITAL SIGNATURES Jüri Voore Estonian Certification Center
7 o Common plajorm in Estonia - DigiDoc Full- scale architecture for digital signatures and documents ü Document format ü Program libraries (C, Java, COM) ü End- user client DigiDoc Client ü End- user portal DigiDoc Portal ü Webservice Application Win32 Client COM-library DigiDoc architect DigiDoc portal WebService Application Application o o o Based on interna;onal technical standards XML- DSIG, contains subset of ETSI TS extensions XAdES Includes real- ;me validity confirma;on of a cer;ficate (OCSP) Long- term validity of a documents is ensured MSSP Mobile-ID DigiDoc-library (Win/Unix/C/Java) OCSP XML CSP PKCS#11 ID card
8 ID-card versus Mobile ID Internetipank Internetipank ID card (PIN 1,2) ID card reader PC with ID card reader and ID card Mobile-ID SIM card (PIN 1,2) Mobile phone Any PC connected to public Internet
9 Description of the solution " SK has been offering mobile ID (MID) solution since 2007 " SK was driving development and implementation of requirements in " SK is offering the CA and TSP service for 4 different mobile operators " Unique toolset to combine WPKI and PKI possibilities
10 General architecture E-Services SK TSP Mobile Operators Time Stamp Service SK and other Certification Authorities
11 General technical architecture
12 Digital signature cost-benefit calculator There are 80 million digitally signed documents! All in all people/companies have saved The study carried out with University of Tartu, Eesti Loto and Eltel Networks showed that if the customer service time spent per customer is 10 minutes If the document consist of 4 pages If there are 2 copies If there are 500 documents in a month If 20% of the documents are sent by mail Company saves 9100 / a year Calculate how much money You could save
13 Focus on digital signature! o Public sector is obliged to accept digitally signed documents o Digital signature is universal ü Open user group ü Any rela;on government, business, private o Focus on document concept ü Equivalent to what we are doing on paper But how about cross- border digital signature?
14 LESSONS LEARNED project start o Important ques;ons in genng started: ü Is ID card mandatory or voluntary? Lessons ü Infrastructure Learned How or services to start first? o PKI enabled ID card is just a tool for accessing services. o Mo;va;on both service providers and users must have the necessity to use ID card for authen;ca;on and digital signing o Public- private partnership is vital ü It is reasonable to set up ONE COMMON Root- CA /trust chain ü Public investments are minimized by service contracts with private vendors ü Technology risks to be handled by private vendors o Time is the most valuable resource ü Public procurement disputes can mess up ;me- table ü Poli;cal and legal issues will take a lot of ;me
15 LESSONS LEARNED VOL. 2 o Posi;ve enforcement of electronic services o Use solu;ons based on proven interna;onal standards (if exist) o Share common infrastructure with private sector o Provide open source s/w tools and drivers o Distribute in mass ID card readers at affordable price o Main usage volume comes from private services not from e- government services o There is never too much promo;on and training for end users o Users privacy and security stands on a top o Learning by doing leads to mistakes admit, correct and learn from it o Avoid home- blindness and project fa;gue o Future is in mobile ID and
16 LESSONS LEARNED vol.3 Government: let the private sector take initiative promote all aspects of information society create and maintain the legislative framework view IT developments together with public administrative reform promote a project based development (more chance for selfcorrection, if something doesn t work) Count new channels as mobile and social media And finally, as government: take care of your culture and language (nobody else will do it for you)
17 Useful links: Thank you! Jüri Voore, Estonian Cer;fica;on Centre
Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager
Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:
More informationeauthentication in Estonia and beyond Tarvi Martens SK
eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:
More informationDigital Signatures in Reality. Tarvi Martens SK
Digital Signatures in Reality Tarvi Martens SK Free-flowing digital documents Estonia has deployed digitally signed documents which are recognised universally. These are: Perfectly legal For use in arbitrary
More informationThe Estonian ID Card and Digital Signature Concept
The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3
More informationIDENTITY ANYONE CAN TRUST
IDENTITY ANYONE CAN TRUST TRUST SERVICE PROVIDER SINCE 2002 SK provides full e-authentication and digital signature solutions for even the most demanding private and public services. We work on a level
More informationEHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill
EHR central system advantages and disadvantages, the case of Estonia Estonian E-health Foundation Raul Mill Estonia - 45 000 km2 1.29 mlj. inhabitants GDP: Agriculture 2,7% Industry 26,3% Service 74,5%
More informationElectronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves
Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,
More information1. Lifecycle of a certificate
1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it
More informationInteroperability Support systems Nationwide components (Estonia)
Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications ICT legislation (1) Personal
More informationGlobal eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationPKI Architecture for VISIONng Proposal by A-TrustA
PKI Architecture for VISIONng Proposal by A-TrustA October 2001 Stephan Grill grill@a-trust.at Overview Objective Products and Services of A-Trust Requirements Description of the PKI Architecture Certificates
More informationTrus%ng your Cloud Provider s System
Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied
More informationExploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
More informationPKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
More informationMaking Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
More informationX-Road. egovernment interoperability framework
X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected
More informationCase Studies in Solving Testing Constraints using Service Virtualization
Case Studies in Solving Testing Constraints using Service Virtualization Rix.Groenboom@Parasoft.NL 2/21/14 1 Introduction Paraso& is supplier automated tes1ng solu1ons Since 1984, Los Angeles (US) and
More informationSpanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations
Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services Ministry of Public Administrations Miguel Álvarez Rodríguez IT Manager Contents 1. The new eid citizen s
More informationAn introduction to EJBCA and SignServer
An introduction to EJBCA and SignServer PrimeKey Solutions AB Tomas Gustavsson http://www.primekey.se tomas@primekey.se EJBCA and SignServer Euro PKI projects and use cases 1 EJBCA - Open Source Enterprise
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationLong term electronic signatures or documents retention
Long term electronic s or documents retention IWAP 2004 Yuichi Suzuki SECOM IS Laboratory IWAP 2004 Yuichi Suzuki (SECOM IS Lab) 1 Problem of validity period of certificate PKI does work well in a validity
More informationSignature policy for TUPAS Witnessed Signed Document
Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for
More informationTRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia
TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia To be discussed 1. From data accumulation to information
More informationeid/authentication/digital signatures in Denmark
eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency Authentication and
More informationDigital Signature Service. e-contract.be BVBA info@e-contract.be 2 september 2015
Digital Signature Service e-contract.be BVBA info@e-contract.be 2 september 2015 About e-contract.be BVBA Consultancy Projects: eid/security related only SOA security From analysis to operational hosting
More informationPotential efficiency of digital signatures to Finnish SMEs. Tham Nguyen
Potential efficiency of digital signatures to Finnish SMEs Tham Nguyen Bachelor s Thesis Degree Programme in International Business December 2014 Abstract 07.12.2014 Degree Programme in International Business
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana
More informationUsing ISO/IEC 24727 for mobile devices
Using ISO/IEC 24727 for mobile devices Jan Eichholz, Giesecke & Devrient GmbH Dr. Detlef Hühnlein, secunet Security Networks AG Manuel Bach, Bundesamt für Sicherheit in der Informationstechnik Eichholz/Hühnlein/Bach
More informationBest prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
More informationEgypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
More informationEXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
More information10/13/2008. Electronic document management. How can it be achieved? (2) Hannes Astok Based on the lecture of Raivo Ruusalepp - raivo@eba.ee www.eba.
Electronic document management How can it be achieved? (2) Hannes Astok Based on the lecture of Raivo Ruusalepp - raivo@eba.ee www.eba.ee Overload of electronic information Most or all documents are digital
More informationFOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic
FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,
More informatione-szigno Digital Signature Application
MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353
More informationSubmitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex
Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationSetup and Maintenance Factors of Adap3ve Case Management Systems
Setup and Maintenance Factors of Adap3ve Case Management Systems Thanh Tran Thi Kim 1 Max Pucher 1 Jan Mendling 2 Christoph Ruhsam 1 1. ISIS Papyrus Europe AG {thanh.tran,max.pucher,christoph.ruhsam}@isis-
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationStudy on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile
Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte
More informationEDI legal aspects in Estonia
EDI legal aspects in Estonia Sharing the experience: einvoicing Riga, ECR Baltic seminar, April 15, 2010 Taavi Valdlo Department of State Information Systems Ministry of Economic Affairs and Communications
More informationVisual Enterprise Architecture
Business Process Management & Enterprise Architecture Services and Solutions October 2012 VEA: Click About to edit Us Master title style Global Presence Service and Solution Delivery in 22 Countries and
More informationCer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS
Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS Stephanos Matsumoto (CMU/ETH Zurich) Raphael M. Reischuk (ETH Zurich) Workshop on the Security of Emerging Network Technologies
More informationNumber of relevant issues
Electronic signature Lecture 8 Number of relevant issues cryptography itself algorithms for signing documents key management generating keys, distribution, key revocation security policy certificates may
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationChhattisgarh State Power Companies
Chhattisgarh State Power Companies User Manual for e-bidding Version 2.0 Page 1 of 39 CONTENT 1. About E-tender Web Portal... 3 2. Pre-requisites to participate in Bidding... 4 3. PC/Laptop Settings...
More informationDigital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security
Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of
More informationHow to implement esignature validation
www.peppol.eu How to implement esignature validation EU-Supply experience How to implement online validation Background Desired user experience How to implement Piloting, initial experiences Further information
More information1. Project title Implementation of digital document management system in Tartu City Government 2001-2002 2. Background Information
1. Project title Implementation of digital document management system in Tartu City Government 2001-2002 2. Background Information Project location: Tartu, Estonia Launch date: May 3, 2001 Start date of
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationServer based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
More informationesignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationTABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ...
TABLE OF CONTENTS Frequently Asked Questions (FAQ) on Vendor Web & e-registration...2 Usage of Digital Signature Certificate...3 What is an etoken?. 4 What is stored in etoken? How to install the etoken
More information2 2 & 2 3 3 3 4 / / EMD
Contents Website... 2 Live Tenders... 2 Registration & Digital Signatures... 2 Participation in the Tender... 3 Login... 3 Online Request for the Tender... 3 Download Documents... 4 Upload files Technical
More informationProcesso civile telematico «on line civil trial»
Processo civile telematico «on line civil trial» Giulio Borsari IT Officer Department of Judicial Organization, Personnel and Services Civil justice in Italy: huge numbers! 140 tribunals 26 Courts of Appeals
More informationPAdES signatures in itext and the road ahead. Paulo Soares
PAdES signatures in itext and the road ahead Paulo Soares About the speaker Paulo Soares M.Sc. Electronics and Telecomunications Hardware background in military comunication systems Works for www.glintt.com
More informationIntroduc)on to STORK2.0 project
Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE
More informationFrost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
More informationSome Public Sector Cloud Views
Some Public Sector Cloud Views Herbert.Leitold@a-sit.at Digital Enterprise Europe, London, June 11 th, 2014 Zentrum für sichere Informationstechnologie - Austria Expectations and Take Up some are high
More informationDigital Signatures. Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Date 01/2016
Digital Signatures Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Company SIEMENS NV/SA Name Digital Signatures Date 01/2016 Author: Siemens File: Validating
More informationBalancing Usability and Security for Medical Devices
Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationDraft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
More informationStandardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI
More informationeid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
More informationA KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL
A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL Wangjian, Xu Guoai, Zhangmiao National Engineering Laboratory for Disaster Backup and Recovery, Beijing University
More informationSicherheitsaspekte des neuen deutschen Personalausweises
Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking
More informationCS 5150 So(ware Engineering Evalua4on and User Tes4ng
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Evalua4on and User Tes4ng William Y. Arms Usability: The Analyze/Design/Build/Evaluate Loop Analyze requirements Design User
More informationMain Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
More informationDeveloping a Full- Spectrum Security Training Program
Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our
More informationIAS2. ets Market analysis
IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market SMART 2012/0001 ets Market analysis
More informationCERTIFICATE REVIEW RECORD
REVIEW HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office of
More informationCertificate Path Validation
Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More informationFinger Vein digital biometric signature: use cases
Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric
More informationCommission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER
More informationLong-term archiving of electronically signed documents in Hungary
Long-term archiving of electronically signed documents in Hungary Dr. István Zsolt BERTA, PhD, MBA, CISA Microsec Ltd. HUNGARY istvan.berta@microsec.hu www.e-szigno.hu http://www.e-szigno.hu Microsec Ltd.
More informationSmart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler ivan.buetler@csnc.ch Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
More informationImplementation of Digital Signature Solution
Implementation of Digital Signature Solution Nuno Filipe Jorge Guedes Extended Abstract April, 2008 1. Introduction The scope of this study points to security area and has its own focus on digital signatures
More informationPublic Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
More informationANKING AND USINESS SOLUTIONS (BBS) Bjørn Søland
ANKING AND USINESS SOLUTIONS (BBS) Bjørn Søland BBS A knowledge-based IT-company 700 employees Total turnover: 183 Mill Owned by banks Subsidiary companies BBS AB, LD Betalingssystemer AS, ZebSign AS Ownership
More informationFact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients.
Certipost Panel Presentation European Commission Bart Callens Product and Sales Manager Document Protection Services 1 Fact sheet: sa Certipost nv Company Shareholders De Post/La Poste, 50% Belgacom, 50%
More informationProject Management Introduc1on
Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?
More informationCapacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward.
Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Enabling cross-border paperless trade data exchange findings from regional studies
More informationScoping Cross-Border e-id Management and Facilitating International e-trade
Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity
More informationBDOC FORMAT FOR DIGITAL SIGNATURES
:2013 BDOC FORMAT FOR DIGITAL SIGNATURES Version 2.1:2013 OID: 1.3.6.1.4.1.10015.1000.3.2.1 Table of Contents INTRODUCTION... 2 1. SCOPE... 3 2. REFERENCES... 4 3. DEFINITIONS AND ABBREVIATIONS... 5 4.
More informationThe Costs of Managed PKI:
The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations
More informationIncorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka
Incorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka Presentation by Sunimal Weerasooriya, CEO LankaClear (Pvt) Ltd. Introduction to LankaClear Originated as Sri
More informationOpen Source Enterprise Application - uengine
Open Source Enterprise Application - uengine The universal engine for e-business www.uengine.org Jinyoung Jang The North East Asia OSS Promotion Forum Sep/2007 Contents History Main Product Business Process
More informationHigh-Performance Qualified Digital Signatures for X-Road
High-Performance Qualified Digital Signatures for X-Road Arne Ansper 1,2, Ahto Buldas 1,2, Margus Freudenthal 1, Jan Willemson 1 1 Cybernetica AS, Mäealuse 2/1, Tallinn, Estonia 2 ELIKO Competence Centre
More informationGLOBAL TO LOCAL / LOCAL TO GLOBAL PSS IMPLEMENTATION @ REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION
GLOBAL TO LOCAL / LOCAL TO GLOBAL PSS IMPLEMENTATION @ REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION Presenta?on by Dr. Stefan Germann World Vision Interna?onal, REPSSI Board of Directors
More informationNorway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post
Norway Post s Electronic ID Case study on authentication Oslo 17. June 1999 Terje Kolnes, Norway Post.0 Presentation Objective The Norway Post National electronic ID, The enabler for e-commerce Global
More informationSpecifying the content and formal specifications of document formats for QES
NATIONAL SECURITY AUTHORITY Version 1.0 Specifying the content and formal specifications of document formats for QES 24 July 2007 No.: 3198/2007/IBEP-013 NSA Page 1/14 This English version of the Slovak
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationStefan Santesson Consultant, 3xA Security AB (http://aaa-sec.com) Born November 2, 1962 in Malmö, Sweden
CV Stefan Santesson Consultant, 3xA Security AB (http://aaa-sec.com) Born November 2, 1962 in Malmö, Sweden Björnstorp 744 240 13 Genarp Sweden sts@aaa-sec.com Tel +46-767 861337 Skype: Razumain COMPETENCE
More informationETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
More informationThe Belgian e-id: hacker vs developer
OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org
More informationWindows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication
More information