Electronic Government and Public Administration in Hungary

Size: px
Start display at page:

Download "Electronic Government and Public Administration in Hungary"

Transcription

1 Electronic Government and Public Administration in Hungary Dr. Péter Risztics, PhD Director Budapest University of Technology and Economics Centre of Information Technology István Jankovits Deputy Director of R&D Budapest University of Technology and Economics Centre of Information Technology Abstract The article presents the visions, plans, and actions related to the implementation of electronic governmental and electronic public administration services in Hungary, in the past few years. The roles of governmental organizations (such as the Ministry of Informatics and Communications, Prime Minister s Office, Ministry of Interior, Ministry of Finance), the legal and technical regulations (such as the XXXV. act in 2001, CVIII. act in 2001, 20/2004. (IV. 21.)), some of the concrete projects (such as the WEB-based pilot projects, XR, IOP, local governmental pilot projects) and plans about the future (written in Hungarian Information Society Strategy [1]) are also shown in the article. Experts keep on working in Hungary therefore this article can be just a snapshot about the actualities. 1. Introduction The efforts to implement electronic government and electronic administration are part of the key objectives of the eeurope Initiative: Bringing every citizen, home and school, every business and administration, online and into the digital age. Creating a digitally literate Europe, supported by an entrepreneurial culture ready to finance and develop new ideas. Ensuring that the whole process is socially inclusive, builds consumer trust and strengthens social cohesion. The first key objective is about the electronic government and electronic public administration on which Hungarian experts are also working. The modernization of administration needs changes in several areas. Review of the workflows, the used data structures, the infrastructure of computer network, access to the Internet via broadband, interconnection of governmental organizations, implementing registries based on databases of the Ministry of Interior to provide valuable services to citizens is still going on. The most important Hungarian projects, results and consequences will be reviewed in this article in connection with electronic government and electronic public administration. 2. Background of e-government and electronic public administration in Hungary 2.1. Governmental roles Prime Minister s Office, Ministry of Informatics and Communications, Ministry of Interior. In Hungary the fields of e-government and electronic public administration belong to two different governmental organizations. It is laid down in the related laws, that the duties of the Ministry of Informatics and Communications (IHM) are the planning and implementation of social, public administrative, cultural, educational, economical programs in connection with informatics excluding governmental information technology systems, the so called front-office. The governmental information systems, the back-office that include information systems of governmental organizations (that means e- Government is equal to G2G communication as the definition of the law says) are under the control of the Prime Minister s Office (MeH). There is also a third party involved, the Ministry of Interior (BM) which provides the different databases about people, companies. Local governments are also under the control of the Ministry of the Interior therefore pilot projects in connection with local governments affect that. The Ministry of Informatics and Communications has also supervisory rights to the tasks controlled by the Prime Minister s Office, but the projects of the Prime Minister s Office must follow the guidelines written in the Hungarian Information Society 1

2 Strategy (MITS). The duties of the Ministry of Informatics and Communications are the following: definition of standard information technology guidelines, phasing the strategies of other governmental organizations in connection with information technology systems, definition of technical specifications for governmental information technology systems, definition of quality of service, applications used by governmental organizations, co-operation with the Prime Minister s Office. The duties of the Prime Minister s Office are the following: specification of requirements at electronic communication between governmental organizations, implementation of governmental backbone (network), implementation of governmental portal. It can be suspected, that these two groups may have shared areas - therefore nowadays, as the number of tasks is increasing the Ministry of Informatics and Communications gets the main role, it becomes the leader of planning and implementing information technology systems in e-government and electronic public administration in Hungary Other related Ministries. In 2003 the Hungarian Information Society Strategy was born, supported by the Ministry of Informatics and Communications. This document specifies visions, plans and actions that are based on widespread discussion of information technology experts. The Hungarian Information Society Strategy has the following aims for the next ten years: stepping into the digital age, harmonization of projects that help bringing up the information society, improving the competitiveness of the Hungarian economy, proving that information technology is not just a chance but the key solution of improvement, following the directives, guidelines, requirements of the European Union, this document must be the base of other plans, projects. The visions, plans and actions of the Hungarian Information Society Strategy comply with the eeurope+ and eeurope 2005 action plans. Fortunately, many of the aimed plans have already come true, and experts are also working on implementing the others. The electronic public administration chapter of the Hungarian Information Society Strategy includes plans about the inner communication and document management of the governmental organizations and about those twenty public services that are mentioned in the eeurope action plans. The twenty public services written in the eeurope are the following for citizens: income taxes (declaration, notification of assessment), job search services by labor offices, social security contributions (unemployment benefits, family allowances, medical costs, student grants), personal documents (passport and driver s license), car registration (new, used and imported cars), application for building permission, declaration to the police (e.g. in case of theft), public libraries (availability of catalogues, search tools), request and delivery of certificates (birth, marriage), enrolment in higher education, university, announcement of moving (change of address), health related services (e.g. interactive advice on the availability of services in different hospitals; appointments for hospitals), and for businesses: social contribution for employees, declaration and notification of corporation tax and VAT, registration of a new company, submission of data to statistical offices, customs declarations, environment-related permits (include reporting), public procurement. The information technology system of the local governments must be able to provide these electronic public services, therefore the Hungarian Information Society Strategy also specifies visions, plans and actions in this area. Other chapters are out of the scope of the e- Government and electronic public administration but can be related topics. The economic chapter includes plans about telework (working at home connected to the company via Internet), e-business, e-commerce (supporting SMEs to improve information technology systems), aiding logistics, intelligent transport, information portal for agrarians. In the cultural chapter the plans of National Digital Data Archives (NDA) are specified that is in connection with the e-content project in eeurope documents. The educational chapter is about providing digital content for students, running registry of students and lecturers, teachers and give the chance of life-long learning. Health related plans conform with the e-health action plan in eeurope documents. The environmental protection chapter is about the need of running information portal and providing access to databases for experts. The internet access via broadband is the aim at the chapter on infrastructure which is in 2

3 connection with e-science (broadband at universities, GEANT). The accessible internet is a related chapter to the previous one. This chapter is about implementing public internet access points at smaller settlements. The infrastructural services chapter is about several metadata databases. In the knowledge chapter the learning of computer usage is the aim such as at e-skill in eeurope documents. An important chapter is e-security which is based on cryptography and devices such as smart cards. Security is also a vital requirement in the case of e- democracy solutions. R+D projects must be supported, the accentuated areas are listed in the chapter of IST (Information Society Technologies) in the Sixth Framework Programme ( ) of the European Union. Social regulation about solving the problem of digital gap and handicapped people is also included in the Hungarian Information Society Strategy Legal regulation The most mentioned acts and regulations in connection with the information society are the act about electronic signature (XXXV. act in 2001), the act about electronic commerce (CVIII. act in 2001) and the regulation of the Ministry of Finance (PM) about electronic invoices (20/2004. (IV. 21.)). The electronic signature is the base of all actions in connection with the regulation of the information society. The Hungarian act is based on the 1999/93/EC directive. This defines the expressions related to the electronic signature, the several kinds of services such as providing certification service, time stamping service and key generation service. This list will be extended in 2004 by the revision of the original act with electronically signed data archive service (this is a requirement of archiving e.g. electronic invoices in a long range of time). The required management of the registry about certification service providers is maintained by the National Communications Authority (NHH). There are five advanced certification service provider and two qualified one as it is written in the registry. The evaluated and qualified products (such as smart cards, electronic signature-creation applications), the evaluator organizations of products, foreign certification service providers and experts are also listed in the registry which is available on the Internet. The act and the related regulations define strict requirements based on the directive in connection with the operation, responsibilities and commitments of the certification service providers, in connection with technological issues such as the construction of the qualified certificates, the requirements of an SSCD (secure signature-creation device). The electronic signature became the base of other regulations. In Hungary the 3000 top tax-payers must use electronically signed forms since the 1st of February in 2004, the needed smart cards, smart card readers, certificates and applications are supported by the related ministries. The dues (in connection with superannuation) can also be returned by using electronic signatures. The rules of electronic commerce and other services that aim information society are laid down in the Hungarian act (CVIII. act in 2001) which is based on the 2000/31/EC directive of the European Union. The act defines the way of providing electronic contracts, the strict rules of data management (privacy, data protection), the responsibilities and commitments of the service providers, and regulates the advertisements via electronic channels (such as the problem of spam s). This latter topic generated a large dispute among the experts, because in the first round the opt-out system (posterior signing off) was preferred but finally the opt-in system (preliminary singing in) became the chosen solution. The directive of the Council 2001/115/EC about electronic invoicing has been implemented in the regulation of the Ministry of Finance. Hungary has accomplished the implementation of managing electronic invoices until the deadline, the date of accession to the European Union (1st of May in 2004) and the first electronic invoice was issued on the 5th of May in The electronic invoice needs to have qualified time stamp and advanced electronic signature. Other acts have also been modified, the ways of managing documents, contracts have been raised but using electronic signature is still not everyday thing in the life of people. The reason is mainly the unavailability of systems, services therefore the main aim of the Hungarian pilot projects was to provide services such as XR in connection with the governmental portal to have useful and usable systems in the topic of electronic signature Technological environment Technology stands in the background of legal regulation at the matter of electronic government and electronic public administration in most cases. The base of electronic government and electronic public administration is the Internet. Technological and social development was needed, therefore several ways of education have started (such as ECDL courses) and also the infrastructure has been enhanced. The governmental backbone network makes interconnection between 120 governmental organizations via broadband Internet (622 Mbit/sec). The academic backbone has also been enhanced; the interconnection between e.g. universities is based on broadband Internet. The computer-penetration of companies is about 90% in 2004 but at home just the 26% of people have computer. In Budapest (the capital) 14% (8% on the average) of citizens have internet access at home. The computer and internet penetration of home users are the base of the telework. The 1% of workers were teleworkers in Hungary in the second half of

4 The government has started several programs to increase the computer and internet penetration of households. Pedagogues and parents were able to buy computers for reduced costs in the Sulinet Express program, the Ministry of Informatics and Communications had also supported the fees of broadband Internet access such as ADSL. One of the biggest internet service providers (with more than subscribers in December of 2003) says that the 20% of all Internet access is based on ADSL technology. The conditions of being used of electronic government and electronic public administration by home users are evolving. On the other hand the government has to implement and provide services that fulfill the security and legal requirements. Solutions of electronic government and electronic public administration are based on Internet (TCP and IP protocols) therefore the nature of the network determines basic rules in connection with security which is one of the most important problem of functioning. The repeatedly mentioned requirements of secure communication are confidentiality, integrity, authentication, non-repudiation, and secure systems also have the availability parameter. A stand-alone system can be secure if these requirements are fulfilled, but there can also be problems in communication between systems. The fault can be either e.g. at communication protocols, implementation of these protocols or at message formats, contents. Interoperability matter is a serious issue, the failure of fast spreading electronic signature in 2001 (after the legal regulation had been born) was the interoperability problem of PKI systems and applications. Systems have user interfaces, data can be accessed by users that must also be under strict control. The listed requirements are also taken into account at accessibility to data, databases, and services. The key solutions to satisfy these requirements are open standards and cryptography. Taking into account these guidelines secure and interoperable solutions can be implemented either in the front-office or in the backoffice. In public key cryptography sender and recipient have a pair of keys, a public key which corresponds to the secret one. To make digitally signed messages, the sender must use its own secret key with the hash of the message, document, and the recipient can verify using the sender s public key. To make encrypted messages, the sender must use the recipient s public key with the message, document, and the recipient can decrypt using its own secret key. Public keys can be accessed by downloading them from a directory (e.g. using LDAP protocol to access an X.500 directory). Cryptographic keys are issued by trusted third parties that use PKI technology. The CA (Certification Authority) makes a mapping between realworld entities and electronic objects by corresponding public keys to real-world entities personal data. This structured, and digitally signed (by the CA) data, called certificate, is published in the directory. The secret key is stored on a smart card and issued to the user. This device cannot reveal the bit string of the key, just enables communication via the interface of the smart card and the electronic signature-creation application. Question of open standard is the other keystone of making systems in general (not just at electronic government projects, but there the need is much bigger) secure and interoperable. The standards of communication in the lower layers are TCP/IP and in the upper layers at electronic government and electronic public administration HTTP and HTTPS. Used languages to form data, messages must be XML according to trends in other countries. In Hungary the act about electronic signature was the first step to the formation of information society, but technology and law couldn t solve several problems. One of them is the matter of data protection, privacy. Privacy questions of real-world entities and unambiguous identification (e.g. distinguished name) of an object in electronic world are two contrary assertions. The user and government can choose either the service is secure, and e.g. digitally signed forms can be accepted as manuallysigned real-world documents. The Hungarian CSPs (Certification Service Providers) started their operating as registered (by National Communications Authority) service providers but the number of subscribers has been grown slowly because of the small number of usable applications, services related to electronic signature. In Hungary and also over the world the following two years were the projects of examining interoperability. Methodologies and specifications have been made to have standard requirements expected from CSPs. The European Union and United States have also funded projects in connection with the interoperability of PKI solutions. In the US the idea of a newly implemented federal Bridge-CA was born. The EU funded PKI Challenge and other projects such as European Bridge-CA aimed to make standard decisions about acceptable cryptography and communication standards, configuration of applications (S/MIME mailing applications), communication methods (using OCSP servers to make the access of certificate status information easier). Part of the interoperability question is the list of cryptographic algorithms. It can be possible that one of the users generates digital signature by DSA algorithm, but the other user can verify digital signatures made by RSA therefore the set of algorithms must have been declared (e.g. at electronic invoices). The government had an unfinished project about implementing PKI at governmental organizations that also defined 4

5 requirements in connection with cryptographic algorithms. The problems of PKIs occured at the server-side, at the CSPs but there were also problems and more serious problems at client-sides. The vendors of PKI solutions implemented client-side applications and verifier tools but these were just plug-ins to other applications (e.g. mailing application, document editor application). At the interoperability tests it was clear that on the client side there must be stand-alone applications or plug-ins but with strict and standardized interfaces. Interfaces to smart cards is the matter of CSPs (Cryptographic Service Provider), interfaces to applications (used algorithms, format of data, complete and correct verification of certificates and CRLs) is matter of implemented open standards. The usage of S/MIME applications on the client side can be obvious but security requirements are fulfilled just at the correct configuration of applications. S/MIME profiles have been declared at the German ISIS-MTT and the PKI Challenge either. In these profiles signeddata and envelopeddata profiles are specified based on the RFC The main problem is with default settings that in most cases the retrieval of CRLs or the checking of certificate status (OCSP) is missing, or not implemented and functioning correctly (e.g. checks certificates serial number in a cached CRL, but unfortunately the issuer of the CRL has become invalid or the sender s certificate has been compromised). Experts says that these cases (certificate status is not checked correctly) when the user has false security feeling is worse than not checking anything but warning the user that certificate status is not checked. In the latter case the user can decide whether to accept or not the digital signature, otherwise if the user accepts a digital signature which was made by an e.g. stolen smart card and private key a large amount of property damage can occur by an e.g. false settling of an invoice. The correct and complete verification of the certificate is the key point of public key technologies. This task must include the check of the validity of certificate (valid from and valid to), the digital signature made by the issuer, checking the keyusage bit in the certificate (nonrepudiation must be set exclusively), the CRL must be retrieved from the given URI (URL) and processed and the related policies (CP from the given URL of certificatepolicies extension) either, and also other extensions may be checked (e.g. MonetaryValue defined in ETSI TS ). These checks must be made on each certificate in the certificate chain from the end user to the root CA. The matter of unambiguous identification of an object in the electronic world can be solved if the object is not a human being (in this case privacy questions means difficulties). The ITU and ISO has a Registration- Hierarchical-name-tree in which they can assign a number to each object. This OID (object identifier) must be used at objects such as CPS (Certification Practice Statement) and CP (Certificate Policy) documents and at SPs (Signature Policy) which can be automatically processable if that is based on the ETSI TR document. In Hungary the regulation of OIDs needs a lot of time, but the decision has already been born, Hungary will use the subtree of joint-iso-itu with the number of {joint-iso-itu-t(2) country(16) hu(348)} at CPSs and CPs. In a worldwide functioning interoperability needs OIDs either at electronic government and electronic public administration services. The documents such as printed matters, records must have OIDs in all countries to be able to be referred. Interoperability of applications of different vendors usually result in failures. The situation is similar in the case of electronic signature-creation applications. Different vendors use different functions, different APIs, different algorithms. Nowadays platform-independent solutions are based on Java source-coded applications using crypto packages (such as javax.crypto), but there are also applications that use MS Crypto API. There are efforts to make these different applications interoperable. The result of these efforts is that many technical specifications and technical reports has been generated in the past two years at ETSI, one of the standardization organizations of the European Union. Before the newly accepted specifications of ETSI at W3C and IETF the standard of XML-based electronic signature has been born. The advantages of XML electronic signature are the following: based on web (worldwide usage), more strict rules at using tags (HTML vs. strict XML), plain text, easier portability between databases, standard character set using UTF-8 encoded Unicode characters (this also helps to keep integrity of messages during transformations from one language to another), defining schemas by XSD means so that users can make automatically processable forms (such as at governmental forms), any of the files can be signed digitally by XML electronic signature-creation applications and other applications can verify them easily. The standard of W3C was adopted by IETF and that has issued RFC The basic XML schema of the electronic signature consists of the information to be signed (referenced file), the method of canonicalization (the way of filtering white spaces ), OID of the signature method (e.g. SHA-1 with RSA encryption) and digest method (e.g. SHA-1), and the values of the digest and the signature. Other elements are optional. ETSI has extended the basic set of these tags. ETSI TS (XAdES) has defined several types of XML electronic signature schemas. 5

6 The XAdES satisfies the legal requirements for advanced electronic signatures as defined in the European Directive on electronic signatures. as it is written in the technical specification. Important extensions at XAdES are the value of time stamp and the possibility of attaching other certificates in the certificate chain and CRLs. These are all necessary to archiving digitally signed documents (such as governmental documents). The requirements of archiving electronic invoices in Hungary are fulfilled by the electronic signature of XAdES-A type. Hungarian companies and the government know that XML electronic signature is the key point of electronic government and electronic public administration. Two Hungarian XML signature-creation applications (that are based on ETSI TS and also fulfills the requirements of CWA and CWA and also ETSI TR ) have already been registered as evaluated and qualified application at the National Communications Authority in Hungary. On behalf of interoperability of applications Hungarian experts are following with attention the efforts of ETSI. The results of ETSI plugtests (in several topics) give a good view about the present situations of XAdES or other projects such as IPv6, Java card applications, VoIP, ENUM project. One of the Hungarian vendors of XML electronic signature-creation application had also taken part in the first ETSI XAdES plugtests taking into account the results and consequences of them. The year of 2004 can be expectedly the year of changes in using electronic services related to electronic government and electronic public administration such as by XR which will be enhanced at security by cryptography, but the usage of electronic invoices can also be an important step, and these fields of usage can affect other fields in the future. 3. Pilot projects 3.1. WEB-based pilot projects In the middle of the year 2001 when electronic signature and the idea of a centralized governmental portal was an actual topic (at the birth of the act of the electronic signature) at the predecessor of the Ministry of Informatics and Communications (called Information Technology Government Commissioner (IKB) under the control of Prime Minister s Office). The start of the electronic administration was in the end of The portal which provided the service got the ekormanyzat.hu name. The main features were the motor-vehicle database, firm database and real estate database. The user could initiate searches, queries in these databases. Other related projects have also been started such as Central Electronic Signature System (KEAR), Governmental Document Management System (KIR) but because of political changes these projects have been finished without final results. The new cabinet has continued the work based on the results of the previous governmental period and on new elements and finally the electronic governmental portal has been moved from ekormanyzat.hu to magyarorszag.hu and has its services been extended by other functions such as XR. Nowadays the site has more than 100 thousand visitors a day XR The Hungarian Information Society Strategy involves a chapter about e-government and electronic public administration that is about providing public services to people such as those twenty public services listed in the eeurope documents. The concept of XR (Internet Public Administration Service System) was that instead of having several, insular solutions this one must be a standard central gate to all public services. The XR is a virtual document office which is part of the Hungarian governmental portal. The site has more than 100 thousand visitors a day, and the 30% of them seeks information about administration. The virtual document office started operation in November in The registries came from the Ministry of the Interior so now issuing and renewal of postal address cards, driving licenses, identity cars of personal entrepreneurs, birth certificates, marriage certificates are accessible and also can make appointments with administrators via Internet in connection with identity card, passport. The users can query the registry of motor-vehicle database, firm database or real estate database. The authorized access is secured by using login name and password that are issued to the user after the registration. The number of document offices connected to the XR system is increasing and it is planned to reach the maximum number of 256 in Since the connection to the system is relatively simple, this goal can be achieved. The public services that need personal attendance still need an appointment with the administrator but just once, because all other steps can be managed via Internet such as filling forms, subscribing contracts. 6

7 3.3. IOP In the area of public administration, the communication between parties (e.g. between governmental organizations) needs interoperable standards, data models and communication schemas. The project was under the control of the Ministry of Informatics and Communications [2]. The expectation of the European Union is that all of the member countries must have their own one-window administration solution that must be interoperable with each other. The aims of the project were the declaration of the needed standards, definition of workflows including legal regulation. In the project experts have taken into account the European Union project called IDA (Interchange of Data between Administrations) at accessibility, multilingualism, security, protection of private data, subsidiarity, usage of open standards, usage of open source code application. These tasks need a governmental control therefore the Hungarian Electronic Public Administration Interoperability Framework (MEKIK) became the leader. As the project document says the law must support the interoperability questions of electronic public administration. Most of the interoperability problems were based not just on technology but on management and workflow. During the overall work experts examined solutions, standards in other countries such as in United Kingdom, in Sweden, in Germany, in France, in Denmark, in Australia and in the European Union. The project made suggestions for communication, messages in transactions taking into account the security matters. The technology issues were based on XML (SOAP protocol, XML signature, XML encryption, XSD schemas) and also solutions of the future were mentioned (WSDL, UDDI). The security issue now is fulfilled by login name and password -based client authentication at XR system, but IOP project unambiguously said that security features must be based on PKI (Public Key Infrastructure) technology Local governmental pilot projects Local governments are under the control of the Ministry of the Interior. The overall project of electronic local governments is also the task of Ministry of Informatics and Communications. The aim was that all local government would have access to the Internet until the end of 2003 and the availability of electronic administration would be achieved until 2005 [3]. The front-office of the portal of a local government must provide information for the users, must ensure access to the public administration services, and the back-office must aid the work of governing body. 4. Basic tasks in electronic public administration A necessary prerequisite of introducing the electronic public administration is the survey and documentation of the data and information assets of the important IT systems. In order to reach the goals it is also necessary to identify those workflow elements and process phases which are possible targets of a standardization process. Also, the catalogisation of business processes and objects in the public administration domain is of high importance. During these tasks, the application of standard methods and technologies is a must. The mentioned tasks must be accomplished having the business processes in mind, targeting their modernization and focusing on interoperability. One of the important requirements of an e-government application is to hide the back-office processes, thus allowing one stop services. The e-government applications should be structured in three-tiers, where the first tier consists of the back-office databases and their standard connectors, in the intermediate second tier there are the business processes and regulations. The intermediate tier is the location of the meta-data which may control the administration processes and support the query functions. The third tier implements the front-office functions. According to the experiences of the pilot projects, the following steps are necessary: Concerning the target systems: 1. build the inventory of functions for each system (at least two hierarchical function groups, structured on a function level) 2. define the map of system objects, their description and attributes (1 st level metadictionary) 3. realize the technological description of the managed objects (mode of data management, types, etc.) (2nd level meta dictionary) 4. assess the currently supported business processes (3 rd level meta dictionary) 5. reveal the processes to be supported a. as services for other systems, especially those affecting multiple organizations b. concerning interoperability aspects 6. work out the standard communication layer of the processes to be supported a. rules of base data handling b. communication data model c. schemas of primary data descriptions d. rules of data conversion, specifying the above i. structured data plain text ii. data dictionary for plain text problems 7

8 To support mid and long term standardization efforts: 1. Application of the existent, progressive standards a. From the national standards b. From the International, especially European standards 2. for the standardization of functions, the functional steps which can be derived from the business processes 3. for the objects to be standardized 4. for the applicable standard a. realization methodologies b. technological elements. 5. Summary The technological, social and educational conditions of using electronic government and electronic public administration are given in Hungary. The legal regulation has made the possibility (and also made decisions about commitments) of the future usage of electronic administration such as using digitally signed documents, electronic invoices, contracts, using governmental portal and filling in electronic forms on the Internet via a browser by unambiguously identified and authenticated users. The base system of the electronic government and electronic public administration is running on the governmental portal called XR, the interconnection of governmental organizations such as local governments, databases of the Ministry of Interior is achieved via broadband access to the Internet. The generation of increasing computer and Internet penetration is based on governmental projects supported by the Ministry of Informatics and Communications. The matter of future is the enhancing of the existing systems in electronic government and electronic public administration such as XR. Security and interoperability questions must be solved to have services that fulfill the requirements of standards and eeurope. 6. References [1] Hungarian Information Society Strategy, [2] IOP, ekik [3] Local Government Projects, ormanyzat_pri_doc_v1 [4] P. Risztics, Sz. Szigeti, Zs. Sikolya: Keynote: Transition to IPv6 in e-government Networks Conference of e-gov Day 2004: State of Art, Vienna- Budapest, of March, Proceedings pp., Austrian Computer Society, 8

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

User Guide of edox Archiver, the Electronic Document Handling Gateway of

User Guide of edox Archiver, the Electronic Document Handling Gateway of User Guide of edox Archiver, the Electronic Document Handling Gateway of project v0.7 SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI-283481 Table of Contents 1 INTRODUCTION...

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Certificate Policy for. SSL Client & S/MIME Certificates

Certificate Policy for. SSL Client & S/MIME Certificates Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it

More information

StartCom Certification Authority

StartCom Certification Authority StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

e-szigno Digital Signature Application

e-szigno Digital Signature Application MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012

Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012 Certipost Trust Services Version 1.2 Effective date 03 May 2012 Certipost NV ALL RIGHTS RESERVED. 2 13 Definitions : Activation Data Certificate Certificate Holder Certificate Public Registry Certificate

More information

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate

More information

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA Non-official translation DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA ORDER ON THE CONFIRMATION OF THE SPECIFICATION ADOC-V1.0 OF THE ELECTRONIC

More information

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0 DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

ETSI TS 102 280 V1.1.1 (2004-03)

ETSI TS 102 280 V1.1.1 (2004-03) TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,

More information

Certificate Path Validation

Certificate Path Validation Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security

More information

The Estonian ID Card and Digital Signature Concept

The Estonian ID Card and Digital Signature Concept The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3

More information

CERTIFICATE REVIEW RECORD

CERTIFICATE REVIEW RECORD REVIEW HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office of

More information

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

Making Digital Signatures Work across National Borders

Making Digital Signatures Work across National Borders Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Operating a CSP in Switzerland or Playing in the champions league of IT Security

Operating a CSP in Switzerland or Playing in the champions league of IT Security Operating a CSP in Switzerland or Playing in the champions league of IT Security Agenda SwissSign Technology Products and Processes Legal Aspects and Standards Business Model Future Developments 2 SwissSign

More information

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates

More information

Digital Signatures in a PDF

Digital Signatures in a PDF This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

Programme of Requirements part 3h: Certificate Policy Server certificates Private Services Domain (G3)

Programme of Requirements part 3h: Certificate Policy Server certificates Private Services Domain (G3) Programme of Requirements part 3h: Certificate Policy Server certificates Private Services Domain (G3) Appendix to CP Government/Companies (G1) and Organization (G2) domains Datum 27 July 2015 Private

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital

More information

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...

More information

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric

More information

E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA)

E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA) E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA) QUALIFIED CERTIFICATE POLICY AND PRACTICE STATEMENT (CP-CPS) VERSION 1.0 DATE OF ENTRY INTO FORCE : JUNE, 2008 OID 2.16.792.3.0.4.1.1.2 E-TUGRA

More information

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates Version March 2004 Version 2004-03 SwissSign Gold CP/CPS Page 1 of 66 Table of Contents 1. INTRODUCTION...9 1.1 Overview...

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key. The way the world does business is changing, and corporate security must change accordingly. For instance, e-mail now carries not only memos and notes, but also contracts and sensitive financial information.

More information

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic

More information

Electronic Archive Information System

Electronic Archive Information System 107 Electronic Archive Information System Saulius RAGAISIS a,1, Adomas BIRSTUNAS b, Antanas MITASIUNAS b and b Arunas STOCKUS a Software Engineering Department, Vilnius University, Lithuania b Computer

More information

Programme of Requirements part 3f: Certificate Policy - Extended Validation

Programme of Requirements part 3f: Certificate Policy - Extended Validation Programme of Requirements part 3f: Certificate Policy - Extended Validation Datum 27 July 2015 Extended Validation policy OID 2.16.528.1.1003.1.2.7 Page 1 of 37 Publisher's imprint Version number 4.1 Contact

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

X.500 and LDAP Page 1 of 8

X.500 and LDAP Page 1 of 8 X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard

More information

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Guidelines and instructions on security for electronic data interchange (EDI) English translation 2011-06-23 based on Swedish version 2.

Guidelines and instructions on security for electronic data interchange (EDI) English translation 2011-06-23 based on Swedish version 2. Guidelines and instructions on security for electronic data interchange (EDI) English translation 2011-06-23 based on Swedish version 2.0 This is an unofficial translation. In case of any discrepancies

More information

Visa Public Key Infrastructure Certificate Policy (CP)

Visa Public Key Infrastructure Certificate Policy (CP) Visa Public Key Infrastructure Certificate Policy (CP) Version 1.7 Effective: 24 January 2013 2010-2013 Visa. All Rights Reserved. Visa Public Important Note on Confidentiality and Copyright The Visa Confidential

More information

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Public Key Infrastructure. A Brief Overview by Tim Sigmon Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Gandi CA Certification Practice Statement

Gandi CA Certification Practice Statement Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

A Noval Approach for S/MIME

A Noval Approach for S/MIME Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya

More information

SBClient SSL. Ehab AbuShmais

SBClient SSL. Ehab AbuShmais SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc. THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by

More information

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Paper SAS1541-2015 SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Heesun Park and Jerome Hughes, SAS Institute Inc., Cary, NC ABSTRACT

More information

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,

More information

Pre requisites for Digital Signature

Pre requisites for Digital Signature Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities

More information

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: comera@us.ibm.com February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The

More information

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys. Foundations for secure e-commerce (bmevihim219) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.

More information

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1

More information

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES

More information

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we

More information

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 PKI NBP Certification Policy for ESCB Encryption Certificates OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document

More information

GlobalSign Enterprise Solutions

GlobalSign Enterprise Solutions GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...

More information

TC TrustCenter GmbH. Certification Practice Statement

TC TrustCenter GmbH. Certification Practice Statement TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance

More information

phicert Direct Certificate Policy and Certification Practices Statement

phicert Direct Certificate Policy and Certification Practices Statement phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a

More information

Certificate Policy. SWIFT Qualified Certificates SWIFT

Certificate Policy. SWIFT Qualified Certificates SWIFT SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities

More information

CMS Illinois Department of Central Management Services

CMS Illinois Department of Central Management Services CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF

More information

Version 2.4 of April 25, 2008

Version 2.4 of April 25, 2008 TC TrustCenter GmbH Certificate Policy for SAFE NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certificate Policy is published in conformance with international

More information

SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement

SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement SWITCHaai Metadata CA Certificate Policy and Certification Practice Statement Version 1.0, OID 2.16.756.1.2.6.7.1.0 July 15, 2008 Table of Contents 1. INTRODUCTION...6 1.1 Overview...6 1.2 Document name

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information