Electronic Registration Identification (ERI)
|
|
- Claribel Daniels
- 8 years ago
- Views:
Transcription
1 Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009
2 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration Identification (ERI) 18 juni 2009
3 The ERI standard: Scope ISO/TS Electronic Registration Identification (ERI) A standard for identifying vehicles by electronic means Suitable for: Identification of local and foreign vehicles by authorities Vehicle manufacturing, vehicle life cycle management Safety related purposes Crime reduction Commercial services Adhering to privacy/data protection regulations 3 Electronic Registration Identification (ERI) 18 juni 2009
4 The ERI standard: History A CEN and ISO standard (part 5 is ISO only) A basic variant: Basis ERI Work started in spring 2003 Participants from: US, Mexico, Japan, several EU countries 2004: Expert opinions security & feasibility Currently a Technical Specification (TS) In transition to an International Standard (IS) unanimous positive vote in June 4 Electronic Registration Identification (ERI) 18 juni 2009
5 The ERI standard: 5 parts and Basic ERI : Architecture : Operational Requirements 24535: Basic ERI : Vehicle data : Secure communications Using asymmetrical techniques Basic ERI : allows for proprietary security implementations Part 4: Security may vary from very modest to highly secure Part 5: Used in Japan : Secure communications Using symmetrical techniques Focus on application layer communication, lower layers are only referenced 5 Electronic Registration Identification (ERI) 18 juni 2009
6 User requirements: Identification Two types of identification: Specific vehicle identification Vehicle vicinity identification Safe, no hindrance to the driver Mandatory: no due diligence assumed Under all traffic and whether conditions Irrespective of the vehicle s speed Readable with roadside, mobile & handheld equipment 6 Electronic Registration Identification (ERI) 18 juni 2009
7 User requirements: Security Adaptable to user needs from very modest to highly secure Identification usable as legal evidence Authenticity (as needed) Is the ERT attached to the right vehicle Is it a genuine (not a fake) ERT ERT inoperable when removed Confidentiality (to the roadside) (as needed) privacy and protection against attack Read authorisation of authorities / third parties Support of international vehicle sales ERT key management / diversification 7 Electronic Registration Identification (ERI) 18 juni 2009
8 User requirements: ERI data Vehicle Id Vehicle Identification Number VIN (ISO 3779) Or, registration authority specific (WMI + e.g. a chassis number) Additional ERI data (optional) More then 60 different items E.g. vehicle registration certificate data Registration authority specific data 8 Electronic Registration Identification (ERI) 18 juni 2009
9 ERI: Architecture Overview: Basics Overall system concept The ERI system Two board variants In-vehicle architecture 9 Electronic Registration Identification (ERI) 18 juni 2009
10 Architecture: Basics For an acquirer: Architecture = Procurement policy! Only distinguish components if more than one party will be involved, i.e.: Different suppliers / maintenance companies Different owners / users do not specify internal details /interfaces Focus on behaviour / interfaces: Vehicle road-side (the main interface) In-vehicle (to support other onboard applications & architectures) ERI part 4 defines complete interfaces 10 Electronic Registration Identification (ERI) 18 juni 2009
11 Architecture: Overall system concept Vehicle Reader (writer) (Registration) authority Road Road-side (garage) Back office 11 Electronic Registration Identification (ERI) 18 juni 2009
12 Architecture: The ERI system ERI system ERT ERI reader/ writer Sensor system Onboard Non-ERI equipment ERI back office system E.g. a (registration) authority Vehicle 12 Electronic Registration Identification (ERI) 18 juni 2009
13 Architecture: Two onboard variants One single onboard component: ERT + DSRC tag Multiple onboard components: ERT ERR Other DSRC application module Onboard communication DSRC beacon ERI readers or readers/writers (ERRs) DSRC beacon Vehicle Road side 13 Electronic Registration Identification (ERI) 18 juni 2009
14 Architecture: In-vehicle architecture ERI standard interface ERI standard interface ERI Device Inductive coupling Internal reader /writer Other In vehicle device In vehicle communication Comm. device Air Interface e.g. ISO e.g. ISO / CEN Electronic Registration Identification (ERI) 18 juni 2009
15 Architecture: The ERT life cycle Customisation to a vehicle Writing vehicle data into the ERT Commissioning by a registration authority (RA) who may: assigns himself as the vehicle s RA enable / disable signing / encryption capabilities allow others to access ERT data Deployment, i.e. customised and commissioned Withdrawn (customised with revoked commissioning) 15 Electronic Registration Identification (ERI) 18 juni 2009
16 Current status ERI standard: Last steps in transition from TS to IS In the Netherlands: a TNO RDW project (see e.g. For 2 use cases: The inspector Rush hour avoidance Proprietary environment (=> secret keys) Multiple tags per vehicle to prevent identity fraud 16 Electronic Registration Identification (ERI) 18 juni 2009
17 In summary The ERI standard TS with part 4: Defines a complete interface with the OBE Allows a variety of onboard architectures Security is adaptable to user needs 17 Electronic Registration Identification (ERI) 18 juni 2009
18 Thank you for your attention For further information: Jan Vis Electronic Registration Identification (ERI) 18 juni 2009
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationConcept for a cryptographic infrastructure for measurement components in smart grids
Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert
More informationNetwork Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationCloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
More informationHow To Use Pki On A Pc (For A Non-Profit)
Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary
More informationConnected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.
Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S
More informationSafety Pilot Security System
Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1 Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted
More informationElectronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service Enforcement CCMTA, June 16, 2015
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Electronic Logging Devices (ELD)s Reliability and Efficiency for Hours Of Service
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More information2012 ISO TC46/SC4/WG11 N246
RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of
More informationsiemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.
siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
More informationTechnologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems
Technologies and Techniques for Collecting Floating Car Data Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Presentation What is Floating Car Data? Why is FCD of interest for Network
More informationMobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationLecture II : Communication Security Services
Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication
More informationAlways one step ahead.
Always one step ahead. Image 25.4 x 5.28 cm 1 DSRC - Components basics for multi application solutions. Image 25.4 x 5.28 cm 14 th European Parking Congress, Vienna, 23-25 of September 2009 DI Werner Dreschl
More informationAdvanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.
MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement
More informationModule 1: e- Learning
Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)
TR 102 893 V1.1.1 (2010-03) Technical Report Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) 2 TR 102 893 V1.1.1 (2010-03) Reference DTR/ITS-0050005 Keywords
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More informationPart A) I. Focus areas from the perspective of the German Government s on automated and connected driving
Cybersecurity and data protection Part A) Focus areas for presentation at the IG ITS/AD meeting in November 2015 Part B) Issues for discussion Part C) Preliminary Draft proposal for Guidelines on measures
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationTHE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS)
THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) erp1110 paper on VPS for Turin World Congress.doc by Ian Catling, Ian Catling Consultancy, Ash Meadow, Bridge Way,
More informationStrategy for Mobile ID
Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2
More informationSecuring Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
More information4.6 Internet Connection
4.6 Internet Connection Road users can utilize Internet connection to obtain various kinds of information, including road traffic, tourism, and vicinity information, while seated in their cars at parking
More informationBig data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data
Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data IBTTA Global Summit- Prague - 20 th October 2014 - PTOLEMUS intellectual property PTOLEMUS in a nutshell
More informationSSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between
More informationFrequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com
Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet
More informationA Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
More informationAn Effective Approach to Open Payment Systems
An Effective Approach to Open Payment Systems Steven Grant May 18, 2012 Planning for Implementation of New Technology Assess the current fare system Are there goals and objectives? What is available? What
More informationINTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS
INTELLIGENT AND INNOVATIVE TRANSPORT SYSTEMS Turn-key solutions In a world facing rapid urbanization and accelerating environmental challenges, the role of public transportation is at the forefront. By
More informationNew Mobile App. Virtual Inspector revolutionizes vehicle inspections
New Mobile App Virtual Inspector revolutionizes vehicle inspections Vehicle inspections don t have to be timeconsuming and costly. New technologies and analytics are making them easy and inexpensive. Underwriters
More informationSafety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
More informationAn introduction to Cryptosoft
An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company
More informationETSI TC ITS RELEASE PROCESS
ETSI TC ITS RELEASE PROCESS ITS Workshop Doha 7-9 February 2012 Søren Hess Chairman ETSI TC ITS hess@shess.dk Status of ETSI standardisation M/453 Applicationand Facility Network and transport GeoNetworking
More informationDigital Identity in Canada The little Trust Framework that could
Digital Identity in Canada The little Trust Framework that could Why is Canada leading the world in federated identity? SecureKey Technologies Inc. All rights reserved. Page 1 SecureKey Technologies Inc.
More informationGOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
More informationPrivacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011
Privacy and Data Protection Impact Assessment Framework for RFID Applications 12 January 2011 1 INDEX 1. Introduction...3 1.1. Key Concepts...4 1.2. Internal Procedures...5 2. The PIA Process...6 2.1.
More informationBSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationFIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
More informationEuropcar.co.uk collects personal data that you voluntarily provide. This information is collected when you:
Privacy Policy I What type of information do we collect? Europcar.co.uk collects personal data that you voluntarily provide. This information is collected when you: - Register / Become a Europcar member
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationmobile payment acceptance Solutions Visa security best practices version 3.0
mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid
More informationEMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
More informationTURPAK Vehicle ID Solution Solution Overview for Oil Companies
TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,
More informationFit and proper person guidelines. for inspecting organisations and vehicle inspectors
Fit and proper person guidelines for inspecting organisations and vehicle inspectors Fit and proper person guidelines for inspecting organisations and vehicle inspectors NZ Transport Agency August 2011
More informationIIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement
IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement Smart Roadside is the leading law enforcement platform in commercial vehicle safety. Our success is defined by delivering real world
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationTOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
More informationCar Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1
Car Data New access via telematic systems Maja Berends, ADAC 12 September 2013 10-13 SEPT 1 Access to car data Relevance for Automobile Clubs Ø Consumer protection Consumers free choice Ø Consumer data
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationManaging Information Security @ Stanford
Managing Information Security @ Stanford March 4, 2011 Tina Darmohray, Assistant Vice President and Chief Information Security Officer 1 Stanford Information Assets Stanford s diversity results in many
More informationInternational Working Group on Data Protection in Telecommunications
International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers
More informationAn Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com
More informationBIOMETRIC AUTHENTICATION SECURITY AND USABILITY
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationFAQ: (Data) security and privacy
Shockwave Traffic Jams A58 FAQ: (Data) security and privacy The strength of the shockwave traffic jam service developed in the project Shockwave Traffic Jams A58 is that the participants receive customized
More informationG-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
More informationCurrent and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
More informationDIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationFleet management solutions for your business
Fleet management solutions for your business IN PARTNERSHIP WITH 2 IN PARTNERSHIP WITH Make the right decisions based on facts In today s economic climate, businesses are working hard to improve processes
More informationSnow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
More informationSwedbank Payment Portal Implementation Overview
Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key
More informationHow To Be A Successful Company
177 Hitachi s Approach As a global company, upholding the laws and regulations of the countries and regions where we do business is a basic premise of our operations. We have enhanced our compliance framework
More informationTransformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
More informationInteroperability Support systems Nationwide components (Estonia)
Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications ICT legislation (1) Personal
More informationCPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES
CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,
More informationWireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT
TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT WiSafeCar Particpants Mobisoft (Co-ordinator) Finnish Meteorological Institute VTT Infotripla Taipale Telematics Sunit University
More informationDEPARTMENT OF TRANSPORTATION. National Highway Traffic Safety Administration
[Note from NHTSA: The Senior Associate Administrator for Vehicle Safety signed the following document and we are submitting it for publication in the Federal Register. While we have taken steps to ensure
More informationThe research area of SET group is software engineering, and model-based software engineering in particular:
Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider
More informationRequired changes to Table 6 2 in FIPS 201
The PIV Working Group appreciates the opportunity to provide guidance on the initial scope for ICAM Part B. In addressing your request we created three bodies of content: Required changes to Table 6 2
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationTechnical regulation in the scope of ERA-GLONASS emergency response system deployment
Technical regulation in the scope of ERA-GLONASS emergency response system deployment Victor Gladkikh, Deputy head of complex on technical regulation, Phd Artem Klimovskiy, Technical analyst Seminar on
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationSecurity Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
More informationSecurity in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationNet-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton
Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA Robin Wilton Corporate Architect (Federated Identity) Sun Microsystems robin.wilton@sun.com +44 705 005 2931 http://blogs.sun.com/racingsnake Aim
More informationA Resilient Protection Device for SIEM Systems
A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo
More informationTICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
More information(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
More informationTrustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
More informationSage Accpac CRM 5.8. Self Service Guide
Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,
More informationThe Vision of Vehicle Infrastructure Integration (VII)
The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts
More informationInnovative means to exchange telecom fraud and network security risks information
Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing
More informationTechnical security standardization aspects. PRACTICE Workshop on Standardization
Technical security standardization aspects PRACTICE Workshop on Standardization Alina Iatan CEN-CENELEC, Brussels, 22 September 2014 1 CONTENT Standardization- a unique system CEN deliverables CBRN-related
More informationAPWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
More informationFHWA. Potential DCM Program Roles in a Connected Vehicle and Multi-Modal Data World. 27 March 2014
FHWA Potential DCM Program Roles in a Connected Vehicle and Multi-Modal Data World 27 March 2014 Outline Session Objectives Federal and DCM Program Role for Connected Vehicles DCM Role for Research DCM
More information