DIGITALLY SIGNING DATA. Cihan Biyikoglu Program Manager HealthVault Core Platform
|
|
- Kristina Melton
- 8 years ago
- Views:
Transcription
1 DIGITALLY SIGNING DATA Cihan Biyikoglu Program Manager HealthVault Core Platform
2 Session Objectives Find out how to guard data against tampering and repudiation using digital signatures. Understand built-in support for digitally signing data in Healthvault.
3 Session Outline 1. Overview 2. Signing and Validation 3. Future Improvements 4. Conclusion & QA
4 Session Outline 1. Overview 2. Signing and Validation 3. Future Improvements 4. Conclusion & QA
5 Overview Digital Signatures in Healthvault What is a digital signature? The encrypted cryptographic hash of the data to provide evidence that data has not been tampered with and origin of the data is verifiable. For Instance: Clinic#1 signs the medication data before it is submitted to Healthvault. Pharma#2 retrieves the medication and validates the signature to ensure 1. Clinic#1 was the one who signed the data & 2. Data has not been tampered with.
6 Overview How does signing work? Signing Document Hash Digest Encrypt Signature Signed Document Appended Document
7 Overview cont. How does signing work? Validation Signed Document Document Hash Digest Signed Document Signature Decrypt Digest?
8 Overview cont. Signature Attributes in Healthvault W3C specification with the following requirements
9 Session Outline 1. Overview 2. Signing and Validation 3. Future Improvements 4. Conclusion & QA
10 Digitally Signing Data HealthRecordItem.Sign() or ItemTypes.type.Sign() Signs the item using an X509 certificate. // Pharma#1 grabs the cert out of the machine cert store X509Store store = new X509Store(StoreLocation.LocalMachine); store.open(openflags.readonly); X509Certificate2 cert = store.certificates.find(x509findtype.findbyserialnumber, "5a 9a bb ae 7d e0 37 6c d0 ", true)[0]; //Pharma#1 grabs a new medication Microsoft.Health.ItemTypes.Medication med = new Medication(); //fill out the properties med.blah = new blah(); //Pharma#1 sign the medication item med.sign(cert); //Pharma#1 add the signed item to the health record PersonInfo.SelectedRecord.NewItem(med);
11 Signature Validation at Creation <Signature xmlns=" <SignedInfo> <CanonicalizationMethod Algorithm=" /> <SignatureMethod Algorithm=" /> <Reference URI=""> <Transforms> <Transform Algorithm=" <xs:transform xmlns:xs=" version="1.0"> <xs:template match="thing"> <xs:copy-of select="data-xml" /> <xs:value-of select="data-other" /> </xs:template> </xs:transform> </Transform> </Transforms> <DigestMethod Algorithm=" /> <DigestValue> lkj=)hwjdafjnawki3ce=</digestvalue> </Reference> </SignedInfo> <SignatureValue> <KeyInfo> <X509Data> <X509Certificate> MIIEASDFHRNEWhsafhjWENRKHJSADFIUWEKRHADWM</X509Certificate> </X509Data> </KeyInfo> </Signature>
12 Validating Signed Data HealthRecordItemSections.Signature Digital signature is stored in the Signature section of the item. HealthRecordSearcher searcher = PersonInfo.SelectedRecord.CreateSearcher(); HealthRecordFilter filter = new HealthRecordFilter(typeID); //add the signature section to retrieve the signature with the items //All does include HealthRecordItemSections.Signature; filter.view.sections = HealthRecordItemSections.All; //add the filter to the searched searcher.filters.add(filter); //retrieve items HealthRecordItemCollection items = searcher.getmatchingitems()[0];
13 Validating Signed Data cont. HealthRecordItem.ValidateCertificate() Verifies the Certificate is still valid. //Pharma#2 verify certificate stored in HealthRecordItemSignatures is valid med.validatecertificate(); HealthRecordItem.IsSignatureValid() Validates the signature for the health record item. //Pharma#2 check to see if there is a signature on the object. if (med.healthrecorditemsignatures.count >0) //validate signature isvalid = med.issignaturevalid();
14 Viewing Signed Data Remember: Edits to the core data invalidates the signature.
15 Session Outline 1. Overview 2. Signing and Validation 3. Future Improvements 4. Conclusion & QA
16 Future Improvements Improvements to Java SDK Improvements to Blob handling in core platform
17 Conclusion Digital Signatures provide a great way to protect integrity of critical health data. HealthVault.Net SDK provides great ease of use.
18 Q&A Questions? Also Visit: Look into the Future with Healthvault 5:00 6:00 in
19
20 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
21
Personal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Software version: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2010-2012 Entrust. All rights reserved. Entrust
More informationTrust. The essential ingredient for innovation. Thomas Langkabel National Technology Officer Microsoft Germany
Trust The essential ingredient for innovation Thomas Langkabel National Technology Officer Microsoft Germany How do we understand innovation? Innovation is the conversion of knowledge and ideas into new
More information2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for
More informationConfiguring and Monitoring SharePoint Servers
Configuring and Monitoring SharePoint Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMicrosoft Cloud Services for Education. Matthew Fox Western Europe HQ Cloud Lead mfox@microsoft.com http://uk.linkedin.com/in/matthewfox1972
Microsoft Cloud Services for Education Matthew Fox Western Europe HQ Cloud Lead mfox@microsoft.com http://uk.linkedin.com/in/matthewfox1972 1 2 3 4 Defining the Cloud Why the Cloud? Microsoft offering
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationX.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
More informationConfiguring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
More informationAdding Digital Signature and Encryption in Outlook
Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be
More informationSharePoint as a Document Management System. Tyler Durham Microsoft Corporation Grant Newton Clifford Chance LLP
SharePoint as a Document Management System Tyler Durham Microsoft Corporation Grant Newton Clifford Chance LLP Agenda Introduction What s New Upgrade, Migration, and Integration Spotlight: Clifford Chance
More informationPipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target
More informationDarkFS - An Encrypted File System
1 DarkFS - An Encrypted File System Team: Arjun Narayanan, Yuta 1. Motivation In many software applications, we want to store files in a remote, untrusted file server. With an untrusted file server, we
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationNetwork FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
More informationArkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationAvePoint SearchAll 3.0.2 for Microsoft Dynamics CRM
AvePoint SearchAll 3.0.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision C Issued February 2014 1 Table of Contents Overview... 3 Before You Begin... 4 Supported and Unsupported
More informationGetting Started with Apple Pay on the Authorize.Net Platform
Title Page Getting Started with Apple Pay on the Authorize.Net Platform September 2014 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC
More informationWireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
More informationSINGLE SIGNON FUNCTIONALITY IN HATS USING MICROSOFT SHAREPOINT PORTAL
SINGLE SIGNON FUNCTIONALITY IN HATS USING MICROSOFT SHAREPOINT PORTAL SINGLE SIGNON: Single Signon feature allows users to authenticate themselves once with their credentials i.e. Usernames and Passwords
More informationProject #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
More informationConfiguring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationSEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
More informationAvePoint SearchAll 3.0.2 for Microsoft Dynamics CRM
AvePoint SearchAll 3.0.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision E Issued April 2014 1 Table of Contents Overview... 3 Before You Begin... 4 Supported and Unsupported Web
More informationHow to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
More informationQUICK GUIDE FOR. Installing Nokia Connectivity Cable Drivers
QUICK GUIDE FOR Installing Nokia Connectivity Cable Drivers Contents 1. Introduction...1 2. Must haves...1 3. Installing Nokia Connectivity Cable Drivers...1 3.1 Before installation...1 3.2 Installing
More informationKey Technology Trends
Key Technology Trends New Social and App Patterns Data Explosion Consumerization of IT Cloud Computing Millions Millions Millions Growth in Multiple Dimensions Server Shipments Expected to Continue Growth
More informationApplication Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
More informationAvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM
AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued April 2014 1 Table of Contents Overview... 3 Obtaining the Record Rollback Solution Package...
More informationPipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
More informationBalamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter
Balamaruthu Mani Supervisor: Professor Barak A. Pearlmutter Plain email text Mail Server Mail Server Encrypted on transfer Encrypted on transfer Sender Email Communication Encryption over network Recipient
More informationGrid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
More informationUnderstanding and evaluating risk to information assets in your software projects
Understanding and evaluating risk to information assets in your software projects ugh.. what a mouthful Dana Epp Windows Security MVP Who am I? Microsoft Windows Security MVP Information Security Professional
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
More informationHow Secure are your Channels? By Morag Hughson
How Secure are your Channels? By Morag Hughson Building Blocks So, you ve gone to great lengths to control who has access to your queues, but would you care if someone could see the contents of your messages
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationPipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com
Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationMOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
More informationPipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Opportunity Management 205 Pipelinersales Inc. www.pipelinersales.com Opportunity Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT. Creating and sharing
More informationSmart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationIntel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
More informationWindows Hard Disk Encryption
Windows Hard Disk Encryption Usage Analysis September 2010 Windows Hard Disk Encryption Usage Analysis Introduction This is the first OPSWAT usage report for hard disk encryption products. Because Microsoft
More informationEMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
More informationSecure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationMOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
More informationCertification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
More informationWindows Azure Security
Windows Azure Security A Peek Under the Hood Charlie Kaufman 06/03/2010 Agenda Introduction Azure Compute Security Azure Storage Security SQL Azure Security Questions Azure Combines Three Components Compute
More informationMessage Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox 6.x deployment via Group Policy An InLoox Whitepaper Published: February 2011 You can find up-to-date information at http://www.inloox.com The information
More informationBy Koji MIYAUCHI* ABSTRACT. XML is spreading quickly as a format for electronic documents and messages. As a consequence,
Falsification Prevention and Protection Technologies and Products XML Signature/Encryption the Basis of Web Services Security By Koji MIYAUCHI* XML is spreading quickly as a format for electronic documents
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationConsolidating Your Database Infrastructure. Tom Mills Consultant Microsoft Corporation Tom.Mills@Microsoft.com
Consolidating Your Database Infrastructure Tom Mills Consultant Microsoft Corporation Tom.Mills@Microsoft.com Overview Today s Challenges What Is Consolidation? Consolidation Approach What Can I Consolidate?
More informationUpdate and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1
Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management
More informationUser Guide for Paros v2.x
Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationPipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Lead Management 205 Pipelinersales Inc. www.pipelinersales.com Lead Management Learn how to use sales lead management with Pipeliner Sales CRM Application. CONTENT. Creating and sharing the Sales Lead
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationMicrosoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
More informationLab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet
More informationCSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
More informationUsing SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationOOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
More informationConfiguring and Monitoring SNMP Generic Servers. eg Enterprise v5.6
Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationPipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com
Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In
More informationCRM to Exchange Synchronization
CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information
More informationSolutions for Microsoft Project Server and Microsoft Dynamics GP Timesheet Integration
Solutions for Microsoft Project Server and Microsoft Dynamics GP Timesheet Integration White Paper Date: May 2011 http://www.daxdata.com/project-server.php 1 Table of Contents Introduction... 3 The Solution
More informationNew Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
More informationSecurity: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationTrustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
More informationManaging Linux Servers with System Center 2012 R2
Managing Linux Servers with System Center 2012 R2 System Center 2012 R2 Hands-on lab In this lab, you will use System Center 2012 R2 Operations Manager and System Center 2012 R2 Configuration Manager to
More informationODETTE CA Subscriber Agreement for Certificates
ODETTE CA Subscriber Agreement for Certificates ODETTE Subscriber Agreement for Certificates 3 Table of Contents 1 ODETTE CA Subscriber Agreement for Certificates... 5 2 Definitions... 5 2.1 Digital Certificate...
More informationUsing the TPM: Data Protection and Storage
Using the TPM: Data Protection and Storage Ariel Segall ariels@alum.mit.edu Day 2 Approved for Public Release: 12-2749. Distribution unlimited License All materials are licensed under a Creative Commons
More informationVirtual Machine Encryption Basics
VMWARE TECHNICAL NOTE VMware ACE Virtual Machine Encryption Basics VMware ACE gives administrators the option of enhancing the security of virtual machines they distribute to end users by encrypting key
More informationMarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
More informationGuidelines for Developing Cryptographic Service Providers (CSPs) for Acrobat on Windows
Technical Note Providers (CSPs) for Acrobat C ONTENTS Requirements for Minimal Functionality 1 Recommendations for Maximum Functionality 2 For a Better User Experience Using CSPs in Acrobat 3 Other Recommendations
More informationCALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
More informationOnline signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
More informationEnable File and Folder Auditing
Enable File and Folder Auditing Publication Date: Feb 9, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide: This guide will help the end user to enable auditing
More informationTechnical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
More informationPipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com
Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner
More informationIntroduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling
Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling Secure software made easier Presenter Name Date Course Overview Introduction and Goals How to Threat Model The STRIDE per
More informationGrow Your Business with Bing Tools. Harness the power of Bing to drive more traffic to your website.
Grow Your Business with Bing Tools Harness the power of Bing to drive more traffic to your website. Welcome Expert Presenter: Duane Forrester Senior Product Manager, Bing Webmaster Program Here s what
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationEntrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December 2014. Document issue: 2.0
Entrust Certificate Services Java Code Signing User Guide Date of Issue: December 2014 Document issue: 2.0 Copyright 2009-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationAvePoint Timeline Pro 2.0.1 for Microsoft Dynamics CRM. Installation and Configuration Guide
AvePoint Timeline Pro 2.0.1 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued December 2014 Table of Contents About AvePoint Timeline Pro... 3 Required Permissions... 4
More informationBluetooth Pairing. User Guide
Bluetooth Pairing User Guide Copyright 2012 Hewlett-Packard Development Company, L.P. Microsoft, Windows, and Windows Vista are U.S. registered trademarks of Microsoft Corporation. Bluetooth is a trademark
More informationB U S I N E S S G U I D E
VeriSign Microsoft Office/Visual Basic for Applications (VBA) Code Signing Digital Certificates Realizing the Possibilities of Internet Software Distribution CONTENTS + What Is Developer Code Signing?
More informationPDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
More information