European Security Standards Reference Implementation Initiative (ESSRII)
|
|
|
- Archibald Newton
- 10 years ago
- Views:
Transcription
1 European Security Standards Reference Implementation Initiative (ESSRII) A Proposal for Action in Europe on International Information Security Standards Brian Gladman, European Technical Director, Trusted Information Systems (UK) Limited. Brian Randell, Department of Computing Science, University of Newcastle upon Tyne. Purpose The aim of this paper is to seek support for a co-operative initiative to ensure that European companies have early access to reference implementations of important information security standards being developed by international standards bodies such as The Open Group and the Internet Engineering Task Force. Background Over the past decade reference implementations of emerging software standards have played an important role in promoting their rapid transition from paper specifications to operational implementations within mainstream market products. Internet standardisation bodies such as the IETF have relied heavily on experience gained in early prototype implementations to ensure that ratified standards are robust and effective. Moreover, as the benefits of open standards have become widely recognised, many companies have offered the results of their work, including reference implementations, for standardisation through international standardisation groups. Such measures have generally been highly successful in promoting the rapid development of highly effective global information standards but in one area information security this process has run into difficulties. The Problem In recent years the rapidly growing importance of information security has led to the development of an increasing number of standards that involve cryptography. In this situation, when reference implementations have been provided they have become subject to export controls which have largely undermined their open exchange by the international development community. For such standards the leading role of US companies in the information systems domain, when combined with US cryptographic export controls, has prevented non-us companies gaining early access to reference implementations. In consequence non-us companies have often found themselves at a severe disadvantage in exploiting important emerging standards in the information security field. Although it can reasonably be argued that there is nothing to stop European companies building reference implementations in the security domain the fact is that this has not happened. There are probably a number of reasons for this: The relative weakness of European companies in the commodity software products market. The fragmented nature of the European information security market and its dominance by nation by nation government interests. Hence a number of perceived constraints on open, pan- European co-operation in this field. These difficulties must be overcome if Europe is to be able to ensure that its information infrastructures provide an effective and secure basis for the information society of the next century. 3 rd draft, 15 th May 1997 page 1
2 This paper looks at a small but significant step that could be taken to provide a basis on which to build European commercial strength in this vital area. An Early Example In the early 1990s the rapid growth of the Internet and the World Wide Web led to the introduction of the Secure Sockets Layer (SSL) standard as a basis for Web security. This standard, which made heavy use of public key cryptography, was initially promoted by Netscape who provided a reference implementation that was openly available within the US (and Canada). As a result of US export controls companies in Europe were unable to benefit from this early implementation and were hence at a significant disadvantage in attempting to take part in the development and evolution of this standard. The result for Europe has not just been a further weakening of our software supplier base but also an undermining of the security available to European citizens when using the Internet and the World Wide Web. Until recently almost all major Web server and browser products have been produced by US based companies such as Netscape and Microsoft. While US domestic versions of these products are available with strong cryptography, those available in Europe (and elsewhere) offer very limited cryptographic protection. Here the US government has used its export controls to ensure that the internationally available versions of these products have cryptography that is too weak to use for any serious purpose. Cryptographic APIs As a second example, in 1995 Microsoft published an interface standard CryptoAPI that would allow external cryptographic modules to be added to its 32 bit operating systems; that is to support plug and play cryptography. However, in order to control the use of this interface, the US government insisted that Microsoft digitally sign any cryptographic modules in such a way that their operating systems would reject modules without correct signatures. Within the US domestic market both the tools to use this interface and the signature process are not subject to government control and are hence available for general use. Outside the US, however, these capabilities are export controlled and the end result has been that non-us companies have been denied easy access to these capabilities. As far as is known to the authors, only one European company (and a subsidiary of a US company at that) has gained access to these facilities. For the mainstream market, the ability to integrate cryptographic capabilities with Microsoft desktop operating systems is clearly very important. By constraining access by European companies to CryptoAPI, the US government has created an unfair constraint on European self-determination in this vitally important area. A Current Example Recently Intel has released an innovative specification under the title Common Data Security Architecture (CDSA). This standard provides a set of programming interfaces that allow secure applications to rely on a security management layer which integrates a set of underlying security functions. Detailed specifications for CDSA are available on the Intel Web site 1 This standard has been well thought out and promises to be influential in setting a standardised relationship secure applications and underlying security mechanisms. 1 Details of the Intel Common Data Security Architecture can be found at 3 rd draft, 15 th May 1997 page 2
3 While Intel has provided a prototype implementation of CDSA, because it involves cryptographic interfaces and cryptography, this is only available within the US and Canada. Again, therefore, we see an important emerging information security standard for which European companies are being put at a disadvantage because they cannot gain access to the implementations that are being used to underpin standardisation processes. The strength of the CDSA is well illustrated by the fact that The Open Group has now unanimously adopted it as one of their public key management standards. This further underlines the importance of equality of access to reference implementations for such standards and illustrates the need for urgent action in Europe to prevent US export restrictions from undermining the interests of European companies in this area. What Can Be Done Organisation As already indicated, the fragmented nature of the European information systems market has meant that nearly all reference implementations have emerged in the US. This has not mattered outside the information security field since global access has normally been possible. However, when cryptography is involved access has been restricted and this has created a non-level playing field as indicated earlier. Although the costs of building a reference implementation can be significant perhaps several man-years at the same time they are not enormous. If a way could be found to share these costs across a large number of organisations, the costs to any individual organisation could be very small. In practice, since the very intent of a reference implementation is that it should be openly shared in order to provide a spur towards rapid implementation, the idea of a pan-european co-operative initiative to provide reference implementations is well matched to this underlying principle. This is the concept put forward in this paper the idea of a co-operative university/industry partnership in Europe to develop and provide access to reference implementations of important international information security standards. The idea will be referred to here as the European Security Standards Reference Implementation Initiative ESSRII. There are many ways in which ESSRII could be organised. At one end of the scale it is possible that the development and provision of reference implementations in Europe could be commercially successful. In this model the reference implementations would simply be sold for profit. The problem with this, however, it that it requires a speculative investment and it is not clear whether this would be forthcoming. More importantly, however, this approach would not provide the common ownership that is fundamental to the success of the reference implementation concept. Another possible structure would be to form a group to undertake ESSRII that is funded by membership subscriptions. Subscribing members would get free access to all results whereas other, non-member, companies would have to pay. The proceeds from the latter could be used to partly (or fully) sustain the operation. This model would go a long way towards meeting the need for common ownership. Yet another possible approach would be for companies to contribute development effort into a distributed team. This would be more difficult to manage but would have the powerful advantage that the resulting reference implementations would have benefited from a broad base of knowledge and experience and a much closer coupling to those who will be exploiting them to produce commercial products. 3 rd draft, 15 th May 1997 page 3
4 In practice the last two options are not as different as they might seem. In the former arrangement it would certainly be true that company development teams would use the reference implementations as a basis for commercial product development and, in this sense, the model can be thought of as a distributed team with a core component. Equally it is unlikely that the second model would work without a core team of some kind. Thus the most sensible organisation is likely to be a core team together with resources made available by industry participants. The core team might be most appropriately located at a European University site (or sites). This would provide commercial neutrality whilst also allowing an appropriate University site to exploit and develop its related research efforts. The associated industry groups could then be located in or close to product development teams, thereby providing a rapid exploitation route. There could also be secondments to and from the core team to provide for learning and experience transfer. Secure Applications Development Industry Team Members Secure Applications Software Product Market Secure Applications Development Industry Team Members Core Team (possibly University located) The diagram above illustrates the organisational structure that looks most attractive for the proposed initiative. Alternatives to a University location could be the augmentation of an existing industry research association or, possibly, an extension of the role of an existing standardisation group such as The Open Group, for example. The core team could be established by subscription from the industry members, by secondment of staff, or by a mixture of these or other possibilities. It might be possible to secure European Commission or European government funding for the initiative during its early evolution, and this would enhance its standing and greatly encourage European Industry to take advantage of its activities. Access to Results Open, unconstrained access to reference implementations is an important feature of their value and their success in rapidly moving standards into market products. It is thus vital that the model used to form ESSRII does not undermine such open access. At the same time, commercial investment in ESSRII is equally important if the initiative is to succeed and this means that a way has to be found to balance these objectives. One possible solution is that ESRII-produced reference implementations could be openly available for non-commercial use and free to ESRII members for their own commercial use. Commercial use could then be made available to non-members though licensing using terms agreed by members and any sponsoring bodies. The need to ensure open access to reference implementations across European industry as a whole could be underpinned by securing public funding for the core team. This could be especially valuable in getting the initiative off the ground. 3 rd draft, 15 th May 1997 page 4
5 Validation Getting Underway Initial Actions If a reference implementation is to be truly useful there has to be considerable confidence in its correctness. Such confidence can be achieved in many different ways but one of the most important of these is continuing peer review of the evolving implementation. When compared with parallel and independent development of separate implementations, the development of a widely shared reference implementation will be naturally subject to a much higher level of scrutiny during its evolution. The breadth of contributions to its design and implementation will be such that refinements (errors) will be found more quickly and this will lead to rapid improvements in its robustness and effectiveness. In addition, by locating the core team on one or more university sites, it will also be possible to build on the considerable software research strengths available in European universities. In the UK there are highly respected research teams working in the information security field at Newcastle and Cambridge Universities, and at University College and Royal Holloway College in London. Both at these sites and more widely in Europe there is much good work underway on the synthesis, analysis, design and verification of security protocols and standards, all of which could contribute significantly to the success of ESSRII. In many respects, therefore, the proposal made here for pursuing ESSRII using a combination of a core team combined with distributed, industry-based resources will provide an effective basis for building robust and effective reference implementations which European companies could rapidly exploit in bringing software based security applications to market. Such an approach not only reduces the costs to individual contributors but also provides the breadth of expertise and experience necessary to ensure that a sound and effective reference implementation emerges. In order to determine if the idea described here has merit it would be useful to see if it can be pursued using a practical, real world example of an emerging security standard. In fact an ideal opportunity now exists to do just this because there is to be a meeting in the UK in June between ICE and The Open Group at which co-operative possibilities in this general area will be discussed. In December last year The Open Group unanimously adopted the Intel CDSA standard and this could be an ideal first target for ESSRII action. It is worth noting that CDSA contains similar cryptographic module digital signature requirements to those of the Microsoft CryptoAPI. By taking early action to provide a reference implementation, organisations and companies in Europe will have direct control of (and access to) the module signature process and will not suffer the disadvantages that have become only too apparent in the Microsoft approach. The Open Group has a strong track record in practical, effective and timely standardisation. The International Cryptography Initiative (ICE) has focussed its efforts on Plug and Play cryptography standards, both at a technical level and in trying to achieve open, international access to such interface standards and the supporting technology. There is thus a good basis for cooperation between these two organisations in this area. This paper is being circulated prior to the meeting between The Open Group and ICE in June in order to ascertain the extent of the likely interest and support that it might receive. It is also being circulated to organisations that might be interested in hosting or participating in the ESSRII core team. Last but not least, organisations that might be prepared to offer support for the activity are also being approached. The aim will be to build on any feedback obtained in this process at the forthcoming meeting between The Open Group and ICE in June. 3 rd draft, 15 th May 1997 page 5
6 Conclusions Reference implementations for standards associated with information security or cryptography often originate in the US and are hence not available to European companies because of US export controls. If a way can be found to share the costs of such implementations across European industry, the costs to individual companies need not be large whilst the advantages will be substantial in terms of early access to practical implementation examples for important global information security standards. This paper proposes a possible way of doing this A European Security Standards Reference Implementation Initiative that may prove attractive in Europe. If there is sufficient interest this proposal will be discussed further at the forthcoming meeting between The Open Group and ICE to be held in the UK in June. 3 rd draft, 15 th May 1997 page 6
A guide to establishing a national register for exercise professionals
A guide to establishing a national register for exercise professionals Occupational Standards Registers should have a direct relationship to the labour market. Members of Registers should have up- to-
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed!
Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed! Professor Ed Candy Senior Life Member IEEE, Fellow of the IET
Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation
Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation We consider that, on balance, there is a case for Internet Connection Records
QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: [email protected] WWW: http://www.qualityssl.com/
QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark Email: [email protected] WWW: http://www.qualityssl.com/ 2002 BitEngines. All Rights Reserved. Introduction Today, online commerce
The following criteria have been used to assess each of the options to ensure consistency and clarity:
4 Options appraisal 4.1 Overview We have appraised each of the options identified in section 3: Maintain the status quo Implement organisational change and service improvement Partner / collaborate with
Developing a Project Governance Framework
Developing a Project Governance Framework Ross Garland 1 Introduction The UK Government lists "decision making failures" as one of the top 5 causes of project failure. Victorian Treasury which runs the
Tech deficit. June 2014
Tech deficit June 2014 Executive Summary Breaking into new markets, meeting customer requirements and increasing profitability are key objectives for all companies. Efficient and adaptable technology is
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
STRATEGY FOR GENERATING ON LINE CURRICULUM CONTENT FOR AUSTRALIAN SCHOOLS
STRATEGY FOR GENERATING ON LINE CURRICULUM CONTENT FOR AUSTRALIAN SCHOOLS Background This paper has been prepared for CESCEO and MCEETYA by Curriculum Corporation in consultation with Education.Au, Department
GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT
GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT Innovative, practical and relevant SIMON GOTT Graduate Certificate In Organisational Development Programme Director Organisations cannot truly thrive
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
COMMISSION STAFF WORKING DOCUMENT. Executive Summary of the Impact Assessment. Accompanying the document
EUROPEAN COMMISSION Brussels, 11.9.2013 SWD(2013) 332 final COMMISSION STAFF WORKING DOCUMENT Executive Summary of the Impact Assessment Accompanying the document Proposal for a Regulation of the European
The Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
White Paper On Pilot Method Of ERP Implementation
White Paper On Pilot Method Of ERP Implementation Rod Clarke Rod Clarke provides guidance, advice and support to businesses in successfully applying IS/IT in support of their business goals. He brings
Aviation Demand Forecasting
Airports Commission Discussion Paper 01 Aviation Demand Forecasting The Mayor of London s response March 2013 1. Purpose of paper 1.1. In February 2013, the Airports Commission issued a Discussion Paper
Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy
Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology Introduction
REFORM OF STATUTORY AUDIT
EU BRIEFING 14 MARCH 2012 REFORM OF STATUTORY AUDIT Assessing the legislative proposals This briefing sets out our initial assessment of the legislative proposals to reform statutory audit published by
BBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: [email protected] Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
Policy Statement 16/2006. Acute and Multidisciplinary Working
RCN Policy Unit Policy Statement 16/2006 Acute and Multidisciplinary Working The Royal College of Nursing of the United Kingdom and the Royal College of Physicians (London) September 2006 Royal College
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
Exploiting software supply chain business architecture: a research agenda
Exploiting software supply chain business architecture: a research agenda Barbara Farbey & Anthony Finkelstein University College London, Department of Computer Science, Gower Street, London WC1E 6BT,
Industry. Head of Research Service Desk Institute
Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful
White paper. How to choose a Certificate Authority for safer web security
White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online
Delivers for your enterprise
Delivers for your enterprise C24 has a significant track record in providing managed hosting environments, expert technical installation, and connectivity solutions for organisations that have a UK, PAN
Relationship Manager (Banking) Assessment Plan
1. Introduction and Overview Relationship Manager (Banking) Assessment Plan The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It forms a key
The Family Office Guide. A practical guide to the regulatory issues on setting up and running a family office in the UK
The Family Office Guide A practical guide to the regulatory issues on setting up and running a family office in the UK About Taylor Wessing Taylor Wessing is a leading international law firm in Europe,
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES
CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES PRAKASH.V, GOPALAKRISHANAN.S Assistant Professor Department of Computer Applications, SASTRA University Associate Dean Department of Computer
iccp MBA International Certified Credit Professional MBA www.aicd.global
iccp iccp Programme www.aicd.global Architected by the Association of International Credit Directors (AICD) in conjunction with The Open University 1 iccp These are the critical questions that will help
Security Through Transparency: An Open Source Approach to Physical Security
Security Through Transparency: An Open Source Approach to Physical Security John Loughlin Stanton Concepts Lebanon, NJ [email protected] Security through obscurity has never been a sensible approach
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
IT Outsourcing. Third Time Lucky? Winter 2014/15 INSIGHTS
INSIGHTS IT Outsourcing Third Time Lucky? Coeus Consulting looks at whether the emerging third generation sourcing models are the end of the journey or is a fourth generation on the way? Winter 2014/15
Performance Standards and Test Procedures for Environmental Data Management Software. Martin Lloyd
Performance Standards and Test Procedures for Environmental Data Management Software Martin Lloyd Dr M H Lloyd, Farside Technology Research / SIRA Environmental Ltd 12 Acorn Industrial Park, Crayford Road,
Project, Programme and Portfolio Management Delivery Plan 6
Report title Agenda item Project, Programme and Portfolio Management Delivery Plan 6 Meeting Performance Management and Community Safety Panel 27 April 2009 Date Report by Document number Head of Strategy
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 EXAMINERS REPORT Friday 2 nd October 2015 Answer any THREE
Why self-signed certificates are much costlier and riskier than working with a trusted security vendor
The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier and riskier than working with a trusted security vendor Introduction Even when business is booming, smart
the valuation of data as an asset:
the valuation of data as an asset: a consumption-based approach introduction: you need to value it to own it There is a case to argue that if companies managed their finances as badly as they manage their
Appendix A: ICT and Information Management Strategy
Appendix A: ICT and Information Management 2014 2019 Head of Information and Business Change Sarah Caulkin October 2014 1 Version Control: Date Version Author Comments 04/08/14 0.1 Jo Harley First draft
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Chartered Engineer. Go back to www.iop.org to choose an alternative status. Write your professional review report
Chartered Engineer Start your journey Chartered Engineers are characterised by their ability to develop appropriate solutions to engineering problems, using new or existing technologies, through innovation,
Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership
Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Kostas Pentikousis, Mirko Schramm, and Cornel Pampu Huawei Technologies European Research Centre Carnotstrasse
SEGMENTATION IN WEB ANALYTICS
Online Intelligence Solutions SEGMENTATION IN WEB ANALYTICS A fundamental approach By Jacques Warren WHITE PAPER WHITE PAPER ABOUT JACQUES WARREN Jacques Warren has been working in the online marketing
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group.
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group. The Internet has created many new global business opportunities for enterprises
National Institute for Health Research Coordinated System for gaining NHS Permission (NIHR CSP)
National Institute for Health Research Coordinated System for gaining NHS Permission (NIHR CSP) Operating Manual Please check the CRN Website for the latest version. Version: 6.0 Status: Consultation in
SCHEDULE 1 SERVICE DESCRIPTION
SCHEDULE 1 SERVICE DESCRIPTION . Introduction Service Description a) Accreditation Process The Service Provider ( SP ) wishing to be approved by Borsa Italiana as an accredited Service Provider who can
The Front Office of Tomorrow. A Survey of trends in the Front Office
The Front Office of Tomorrow A Survey of trends in the Front Office 01/01/2013 Table of Contents Introduction... 3 Management Summary... 3 Detailed Findings... 4 Views... 4 Automation... 7 Strategy...
Freedom and choice in pensions
Freedom and choice in pensions Response from NEST Overview The recent liberalisation of the rules on decumulation present us with a welcome opportunity to think about what our members need from their pension
The European and UK Space Agencies
The European and UK Space Agencies A response to the House of Commons Science and Technology Select Committee April 2013 Introduction The Royal Academy of Engineering is pleased to submit evidence to the
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Managing SSL Security in Multi-Server Environments
Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Windows Server 2003 Migration: Take a Fresh Look at Your IT Infrastructure
EXECUTIVE BRIEF Windows Server 2003 Migration: Take a Fresh Look at Your IT Infrastructure Sponsored by: Symantec Carla Arend December 2014 Andrew Buss IDC Opinion Microsoft will be ending Extended Support
British Dental Association. Strategy
British Dental Association Strategy 2015-2018 Foreword by Mick Armstrong, Chair of the Principal Executive Committee Put simply, a membership organisation is its members. And like all organisations financial
How to Become a Data Driven Business
January 2012 Executive summary Becoming a Data Driven Business, particularly from a Marketing perspective, presents significant benefits in helping your business to grow, develop and succeed, by working
The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations
Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic
G R E E N W I C H S C H O O L O F M A N A G E M E N T. management. programmes
G R E E N W I C H S C H O O L O F M A N A G E M E N T L O N D O N executive management programmes contents Personal Message from the Director of the GSM Executive Programmes 3 The Executive Master of
Digital Preservation: the need for an open source digital archival and preservation system for small to medium sized collections,
Digital Preservation: the need for an open source digital archival and preservation system for small to medium sized collections, Kevin Bradley ABSTRACT: Though the solution to all of the problems of digital
RSPG public consultation related to the draft opinion on EU spectrum policy implications of the digital dividend.
RSPG public consultation related to the draft opinion on EU spectrum policy implications of the digital dividend Vodafone comments Vodafone welcomes the opportunity to comment on the draft RSPG Opinion
QCF. Residential childcare. Centre Handbook
QCF Residential childcare Centre Handbook OCR Level 3 Diploma for Residential Childcare (England) Entry code 10405 OCR Level 5 Diploma in Leadership and Management for Residential Childcare (England) Entry
Outsourcing RESEARCH PAPER
Written by Maxine Holt, March 2002 INFRASTRUCTURE Research and Advisory Services Outsourcing RESEARCH PAPER Infosys Outsourcing Services Abstract Infosys provides a range of IT outsourcing services to
Masters. in Digital Marketing. www.digitalmarketinginstitute.com
Masters in Digital Marketing www.digitalmarketinginstitute.com Contents Masters in Digital Marketing 1. Welcome 2. Course overview 3. Course content 4. Course assessment 5. Digital Qualifications Roadmap
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Efficiency Scrutiny Committee 16 th September 2014 IT - Scrutiny of the Service Review process and viability of options for change
Efficiency Scrutiny Committee 16 th September 2014 IT - Scrutiny of the Service Review process and viability of options for change For Decision Member Champion(s): Cllr A Alford, Corporate - Director:
CEEP OPINION ON THE TRANSATLANTIC TRADE
Brussels, 12 June 2014 Opinion.05 CEEP OPINION ON THE TRANSATLANTIC TRADE AND INVESTMENT PARTNERSHIP (TTIP) Executive Summary Focus 1: The respect of the EU Treaty Principle and EU political balance on
Communication Satellites for European Defence and Security: Challenges and Opportunities
Communication Satellites for European Defence and Security: Challenges and Opportunities Partnership Improving security for the people of Europe Magali Vaissiere Director of Telecommunications and Integrated
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Delivering e-procurement Local e-gov National e-procurement Project Overarching Guide to e-procurement for LEAs
1. Introduction Background The National e-procurement Project (NePP) and Centre for Procurement Performance (CPP) are working to support and enable schools to meet their e- Government targets and to gain
Briefing note: GCHQ Internships
Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2
Outsourcing. Knowledge Summary
Knowledge Summary Outsourcing P&SM professionals should have the knowledge and skills required to manage the outsourcing process and to advise colleagues of the most appropriate solution to obtain best
How To Increase Car Insurance Prices On A Price Comparison Website
Response by Moneysupermarket.com Limited to the Competition Commission Private Motor Insurance Market Investigation Statement of Issues Introduction 1. Moneysupermarket.com Limited ( MS ) is an independent
ENCOURAGING A DYNAMIC LIFE INSURANCE INDUSTRY: ECONOMIC BENEFITS AND POLICY ISSUES
ENCOURAGING A DYNAMIC LIFE INSURANCE INDUSTRY: ECONOMIC BENEFITS AND POLICY ISSUES by Gerry Dickinson Professor and Director, Centre for Insurance & Investment Studies, City University Business School,
Wolverhampton City Council
Agenda Item No: 11a Wolverhampton City Council OPEN INFORMATION ITEM Scrutiny Panel AUDIT COMMITTEE Date 24 SEPTEMBER 2012 Originating Service Group(s) DELIVERY Contact Officer(s)/ PAT MAIN PETER OAKESHOTT
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
