Electronic Registration Identification (ERI)

Size: px
Start display at page:

Download "Electronic Registration Identification (ERI)"

Transcription

1 Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009

2 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration Identification (ERI) 18 juni 2009

3 The ERI standard: Scope ISO/TS Electronic Registration Identification (ERI) A standard for identifying vehicles by electronic means Suitable for: Identification of local and foreign vehicles by authorities Vehicle manufacturing, vehicle life cycle management Safety related purposes Crime reduction Commercial services Adhering to privacy/data protection regulations 3 Electronic Registration Identification (ERI) 18 juni 2009

4 The ERI standard: History A CEN and ISO standard (part 5 is ISO only) A basic variant: Basis ERI Work started in spring 2003 Participants from: US, Mexico, Japan, several EU countries 2004: Expert opinions security & feasibility Currently a Technical Specification (TS) In transition to an International Standard (IS) unanimous positive vote in June 4 Electronic Registration Identification (ERI) 18 juni 2009

5 The ERI standard: 5 parts and Basic ERI : Architecture : Operational Requirements 24535: Basic ERI : Vehicle data : Secure communications Using asymmetrical techniques Basic ERI : allows for proprietary security implementations Part 4: Security may vary from very modest to highly secure Part 5: Used in Japan : Secure communications Using symmetrical techniques Focus on application layer communication, lower layers are only referenced 5 Electronic Registration Identification (ERI) 18 juni 2009

6 User requirements: Identification Two types of identification: Specific vehicle identification Vehicle vicinity identification Safe, no hindrance to the driver Mandatory: no due diligence assumed Under all traffic and whether conditions Irrespective of the vehicle s speed Readable with roadside, mobile & handheld equipment 6 Electronic Registration Identification (ERI) 18 juni 2009

7 User requirements: Security Adaptable to user needs from very modest to highly secure Identification usable as legal evidence Authenticity (as needed) Is the ERT attached to the right vehicle Is it a genuine (not a fake) ERT ERT inoperable when removed Confidentiality (to the roadside) (as needed) privacy and protection against attack Read authorisation of authorities / third parties Support of international vehicle sales ERT key management / diversification 7 Electronic Registration Identification (ERI) 18 juni 2009

8 User requirements: ERI data Vehicle Id Vehicle Identification Number VIN (ISO 3779) Or, registration authority specific (WMI + e.g. a chassis number) Additional ERI data (optional) More then 60 different items E.g. vehicle registration certificate data Registration authority specific data 8 Electronic Registration Identification (ERI) 18 juni 2009

9 ERI: Architecture Overview: Basics Overall system concept The ERI system Two board variants In-vehicle architecture 9 Electronic Registration Identification (ERI) 18 juni 2009

10 Architecture: Basics For an acquirer: Architecture = Procurement policy! Only distinguish components if more than one party will be involved, i.e.: Different suppliers / maintenance companies Different owners / users do not specify internal details /interfaces Focus on behaviour / interfaces: Vehicle road-side (the main interface) In-vehicle (to support other onboard applications & architectures) ERI part 4 defines complete interfaces 10 Electronic Registration Identification (ERI) 18 juni 2009

11 Architecture: Overall system concept Vehicle Reader (writer) (Registration) authority Road Road-side (garage) Back office 11 Electronic Registration Identification (ERI) 18 juni 2009

12 Architecture: The ERI system ERI system ERT ERI reader/ writer Sensor system Onboard Non-ERI equipment ERI back office system E.g. a (registration) authority Vehicle 12 Electronic Registration Identification (ERI) 18 juni 2009

13 Architecture: Two onboard variants One single onboard component: ERT + DSRC tag Multiple onboard components: ERT ERR Other DSRC application module Onboard communication DSRC beacon ERI readers or readers/writers (ERRs) DSRC beacon Vehicle Road side 13 Electronic Registration Identification (ERI) 18 juni 2009

14 Architecture: In-vehicle architecture ERI standard interface ERI standard interface ERI Device Inductive coupling Internal reader /writer Other In vehicle device In vehicle communication Comm. device Air Interface e.g. ISO e.g. ISO / CEN Electronic Registration Identification (ERI) 18 juni 2009

15 Architecture: The ERT life cycle Customisation to a vehicle Writing vehicle data into the ERT Commissioning by a registration authority (RA) who may: assigns himself as the vehicle s RA enable / disable signing / encryption capabilities allow others to access ERT data Deployment, i.e. customised and commissioned Withdrawn (customised with revoked commissioning) 15 Electronic Registration Identification (ERI) 18 juni 2009

16 Current status ERI standard: Last steps in transition from TS to IS In the Netherlands: a TNO RDW project (see e.g. For 2 use cases: The inspector Rush hour avoidance Proprietary environment (=> secret keys) Multiple tags per vehicle to prevent identity fraud 16 Electronic Registration Identification (ERI) 18 juni 2009

17 In summary The ERI standard TS with part 4: Defines a complete interface with the OBE Allows a variety of onboard architectures Security is adaptable to user needs 17 Electronic Registration Identification (ERI) 18 juni 2009

18 Thank you for your attention For further information: Jan Vis Electronic Registration Identification (ERI) 18 juni 2009

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Concept for a cryptographic infrastructure for measurement components in smart grids

Concept for a cryptographic infrastructure for measurement components in smart grids Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

How To Use Pki On A Pc (For A Non-Profit)

How To Use Pki On A Pc (For A Non-Profit) Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary

More information

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved. Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S

More information

Safety Pilot Security System

Safety Pilot Security System Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1 Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted

More information

Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015

Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015 Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service

More information

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information

More information

2012 ISO TC46/SC4/WG11 N246

2012 ISO TC46/SC4/WG11 N246 RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of

More information

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office. siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Technologies and Techniques for Collecting Floating Car Data Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Presentation What is Floating Car Data? Why is FCD of interest for Network

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

Always one step ahead.

Always one step ahead. Always one step ahead. Image 25.4 x 5.28 cm 1 DSRC - Components basics for multi application solutions. Image 25.4 x 5.28 cm 14 th European Parking Congress, Vienna, 23-25 of September 2009 DI Werner Dreschl

More information

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement

More information

Module 1: e- Learning

Module 1: e- Learning Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

ETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)

ETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) TR 102 893 V1.1.1 (2010-03) Technical Report Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) 2 TR 102 893 V1.1.1 (2010-03) Reference DTR/ITS-0050005 Keywords

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Part A) I. Focus areas from the perspective of the German Government s on automated and connected driving

Part A) I. Focus areas from the perspective of the German Government s on automated and connected driving Cybersecurity and data protection Part A) Focus areas for presentation at the IG ITS/AD meeting in November 2015 Part B) Issues for discussion Part C) Preliminary Draft proposal for Guidelines on measures

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS)

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) erp1110 paper on VPS for Turin World Congress.doc by Ian Catling, Ian Catling Consultancy, Ash Meadow, Bridge Way,

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

4.6 Internet Connection

4.6 Internet Connection 4.6 Internet Connection Road users can utilize Internet connection to obtain various kinds of information, including road traffic, tourism, and vicinity information, while seated in their cars at parking

More information

Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data

Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data IBTTA Global Summit- Prague - 20 th October 2014 - PTOLEMUS intellectual property PTOLEMUS in a nutshell

More information

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

A Secure RFID Ticket System For Public Transport

A Secure RFID Ticket System For Public Transport A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It

More information

An Effective Approach to Open Payment Systems

An Effective Approach to Open Payment Systems An Effective Approach to Open Payment Systems Steven Grant May 18, 2012 Planning for Implementation of New Technology Assess the current fare system Are there goals and objectives? What is available? What

More information

INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS

INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS Turn-key solutions In a world facing rapid urbanization and accelerating environmental challenges, the role of public transportation is at the forefront. By

More information

New Mobile App. Virtual Inspector revolutionizes vehicle inspections

New Mobile App. Virtual Inspector revolutionizes vehicle inspections New Mobile App Virtual Inspector revolutionizes vehicle inspections Vehicle inspections don t have to be timeconsuming and costly. New technologies and analytics are making them easy and inexpensive. Underwriters

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

An introduction to Cryptosoft

An introduction to Cryptosoft An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company

More information

ETSI TC ITS RELEASE PROCESS

ETSI TC ITS RELEASE PROCESS ETSI TC ITS RELEASE PROCESS ITS Workshop Doha 7-9 February 2012 Søren Hess Chairman ETSI TC ITS hess@shess.dk Status of ETSI standardisation M/453 Applicationand Facility Network and transport GeoNetworking

More information

Digital Identity in Canada The little Trust Framework that could

Digital Identity in Canada The little Trust Framework that could Digital Identity in Canada The little Trust Framework that could Why is Canada leading the world in federated identity? SecureKey Technologies Inc. All rights reserved. Page 1 SecureKey Technologies Inc.

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011 Privacy and Data Protection Impact Assessment Framework for RFID Applications 12 January 2011 1 INDEX 1. Introduction...3 1.1. Key Concepts...4 1.2. Internal Procedures...5 2. The PIA Process...6 2.1.

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

FIDO Trust Requirements

FIDO Trust Requirements FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms

More information

Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you:

Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: Privacy Policy I What type of information do we collect? Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: - Register / Become a Europcar member

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

mobile payment acceptance Solutions Visa security best practices version 3.0

mobile payment acceptance Solutions Visa security best practices version 3.0 mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

TURPAK Vehicle ID Solution Solution Overview for Oil Companies TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,

More information

Fit and proper person guidelines. for inspecting organisations and vehicle inspectors

Fit and proper person guidelines. for inspecting organisations and vehicle inspectors Fit and proper person guidelines for inspecting organisations and vehicle inspectors Fit and proper person guidelines for inspecting organisations and vehicle inspectors NZ Transport Agency August 2011

More information

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement Smart Roadside is the leading law enforcement platform in commercial vehicle safety. Our success is defined by delivering real world

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

TOP SECRETS OF CLOUD SECURITY

TOP SECRETS OF CLOUD SECURITY TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3

More information

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1 Car Data New access via telematic systems Maja Berends, ADAC 12 September 2013 10-13 SEPT 1 Access to car data Relevance for Automobile Clubs Ø Consumer protection Consumers free choice Ø Consumer data

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Managing Information Security @ Stanford

Managing Information Security @ Stanford Managing Information Security @ Stanford March 4, 2011 Tina Darmohray, Assistant Vice President and Chief Information Security Officer 1 Stanford Information Assets Stanford s diversity results in many

More information

International Working Group on Data Protection in Telecommunications

International Working Group on Data Protection in Telecommunications International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers

More information

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

FAQ: (Data) security and privacy

FAQ: (Data) security and privacy Shockwave Traffic Jams A58 FAQ: (Data) security and privacy The strength of the shockwave traffic jam service developed in the project Shockwave Traffic Jams A58 is that the participants receive customized

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Fleet management solutions for your business

Fleet management solutions for your business Fleet management solutions for your business IN PARTNERSHIP WITH 2 IN PARTNERSHIP WITH Make the right decisions based on facts In today s economic climate, businesses are working hard to improve processes

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

Swedbank Payment Portal Implementation Overview

Swedbank Payment Portal Implementation Overview Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key

More information

How To Be A Successful Company

How To Be A Successful Company 177 Hitachi s Approach As a global company, upholding the laws and regulations of the countries and regions where we do business is a basic premise of our operations. We have enhanced our compliance framework

More information

Transformation of POS Operations at

Transformation of POS Operations at Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail

More information

Interoperability Support systems Nationwide components (Estonia)

Interoperability Support systems Nationwide components (Estonia) Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications ICT legislation (1) Personal

More information

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,

More information

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT WiSafeCar Particpants Mobisoft (Co-ordinator) Finnish Meteorological Institute VTT Infotripla Taipale Telematics Sunit University

More information

DEPARTMENT OF TRANSPORTATION. National Highway Traffic Safety Administration

DEPARTMENT OF TRANSPORTATION. National Highway Traffic Safety Administration [Note from NHTSA: The Senior Associate Administrator for Vehicle Safety signed the following document and we are submitting it for publication in the Federal Register. While we have taken steps to ensure

More information

The research area of SET group is software engineering, and model-based software engineering in particular:

The research area of SET group is software engineering, and model-based software engineering in particular: Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider

More information

Required changes to Table 6 2 in FIPS 201

Required changes to Table 6 2 in FIPS 201 The PIV Working Group appreciates the opportunity to provide guidance on the initial scope for ICAM Part B. In addressing your request we created three bodies of content: Required changes to Table 6 2

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

Technical regulation in the scope of ERA-GLONASS emergency response system deployment

Technical regulation in the scope of ERA-GLONASS emergency response system deployment Technical regulation in the scope of ERA-GLONASS emergency response system deployment Victor Gladkikh, Deputy head of complex on technical regulation, Phd Artem Klimovskiy, Technical analyst Seminar on

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Security Engineering Part III Network Security. Security Protocols (II): IPsec Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA Robin Wilton Corporate Architect (Federated Identity) Sun Microsystems robin.wilton@sun.com +44 705 005 2931 http://blogs.sun.com/racingsnake Aim

More information

A Resilient Protection Device for SIEM Systems

A Resilient Protection Device for SIEM Systems A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo

More information

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt. TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Trustis FPS PKI Glossary of Terms

Trustis FPS PKI Glossary of Terms Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate

More information

Sage Accpac CRM 5.8. Self Service Guide

Sage Accpac CRM 5.8. Self Service Guide Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,

More information

The Vision of Vehicle Infrastructure Integration (VII)

The Vision of Vehicle Infrastructure Integration (VII) The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

Technical security standardization aspects. PRACTICE Workshop on Standardization

Technical security standardization aspects. PRACTICE Workshop on Standardization Technical security standardization aspects PRACTICE Workshop on Standardization Alina Iatan CEN-CENELEC, Brussels, 22 September 2014 1 CONTENT Standardization- a unique system CEN deliverables CBRN-related

More information

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/ DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing

More information

FHWA. Potential DCM Program Roles in a Connected Vehicle and Multi-Modal Data World. 27 March 2014

FHWA. Potential DCM Program Roles in a Connected Vehicle and Multi-Modal Data World. 27 March 2014 FHWA Potential DCM Program Roles in a Connected Vehicle and Multi-Modal Data World 27 March 2014 Outline Session Objectives Federal and DCM Program Role for Connected Vehicles DCM Role for Research DCM

More information