Trusted e-id Infrastructures and services in EU
|
|
|
- Baldric Cook
- 10 years ago
- Views:
Transcription
1 Trusted e-id Infrastructures and services in EU Recommendations for Trusted Provision of e-government services European Union Agency for Network and Information Security
2 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at Authors This report has been produced by ENISA (Prof. Manel Medina and Clara Galán) in collaboration with Atos Consulting (Alejandro Elices and M. Elena Martínez B.) and with the support of EC DG Connect unit H4 and the ISPC of the JRC. Contact For contacting the authors please use [email protected] For media enquires about this paper, please use [email protected]. Acknowledgements This report has been possible thanks to the contributions of the participants in the large scale projects: EPSOS, PEPPOL (Jon Ølnes and Lefteris Leontaridis) and e-codex, that kindly answered the questionnaire prepared by ENISA and the contractor of this project Atos Consulting. Legal notice Notice must be taken that this publication represents the views and interpretations of the authors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the Regulation (EU) No 526/2013. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for information purposes only. It must be accessible free of charge. Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Copyright Notice European Union Agency for Network and Information Security (ENISA), 2013 Reproduction is authorised provided the source is acknowledged. ISBN doi: /26540 Page ii
3 Executive summary Under the scope of the the proposed new Regulation on electronic identification and trust services for electronic transactions in the internal market 1, which will supersede the current Directive 1999/93/EC on a Community framework for electronic signatures, ENISA has conducted a study about the security mechanisms and interoperability issues specific to the new regulated trust services. The aim of this report is to complement the report that summarises the results of the survey, also published by ENISA: TSP services, standards and risk analysis report 2, making more specific recommendations to e-government service providers, encouraging them to use Trusted Third Party service providers to implement the trust services required to give citizens the expected level of confidence and trustwotthines on the services. This document collects the experience of some of the Large Scale Pilots 3 (LSP) funded by the European Commission, that implement trust services defined in the proposed new Regulation (in particular epsos, e-codex and PEPPOL), as cases studies to analyse the current practices and identify gaps and improvement opportunities. Then, the recommendations collected in the Trust Service Providers (TSP) overview report published by ENISA 4 have been adapted for the provision of e-government Services, which include issues for security practices and risk management. The following categories of recommendations have been considered the most relevant ones, to assist in defining and establishing the basis to offer trustworthy e-gov. services to EU citizens 5 : REC.6.R: Specific BCM (Business Continuity Management) standards should be adopted in the provision of trusted services (by TSPs) and required by the e-government customers. REC.5.R, egov_r1: There is a need to define standard qualified profiles and best practices for trusted services, in order to clarify the definition of the services (SLA) and to standardize the QoS to be required by e-government from TSPs. REC.2.R: Promote Trusted Marks assessed against eidas requirements that would be recognised across borders. Independent Trust Services should be integrated in e-gov. services, with European scope, complying both with European eidas Regulation and national supervision. Assessment of qualified trust Services schemas should be extended to other TSPs regulated in the future 6, and mutual assistance system between supervisory bodies in the Member States should be set up. Based on the criticality of the e-gov. services, always assess three aspects: o REC.3.R: the strength of the authentication mechanisms to be used, giving priority to e- signature o REC.4.P: the need for end-to-end encryption and o egov_r8 (TSP_R4): the need for audit trails to collect and preserve electronic evidences The TSP services, standards and risk analysis report will be published in ENISA s website: 5 See full list in Section 3. The letter following the recommendation number indicates the category of stakeholder with higher responsibility on its implementation: Trust Service Providers (P), the Regulators/Supervisors (R) or the egovernment SP (G). 6 Once the draft Regulation on electronic identification and trust services will be approved by the European Parlaimant. Page iii
4 Table of Contents Executive summary iii 1 Introduction Motivation 2 2 Study Cases epsos e-codex PEPPOL 5 3 Recommendations General recommendations to e-government service providers General recommendations to Member States Regulators Specific Recommendations for Trust Service Providers Summary of Recommendations 10 4 Annex I: Abbreviations 12 Page iv
5 1 Introduction The European Commission presented in July 2012 a proposal for a new Regulation on electronic identification and trust services for electronic transactions in the internal market 7, which will supersede the current Directive 1999/93/EC on a Community framework for electronic signatures. Art. 15 of the proposed Regulation establishes certain provisions regarding the security requirements applicable to trust service providers. In order to facilitate the implementation of this provision, as well as to generally support trust service providers (TSP) in the introduction of security best practices, the European Union Agency for Network and Information Security (ENISA) is working on 2013 on a series of studies on the security aspects of trust service providers issuing electronic certificates, as well as on the security and interoperability aspects specific to the new trust services foreseen in the proposed Regulation. One of the actions taken on those studies was a survey conducted by ENISA to Trust Service Providers 8 (TSP). Another action was the brief analysis of some Large Scale Pilots operating in Europe, focusing on the use of: Electronic certificates, including e-signature ones (summarized in other ENISA reports 9 ) Electronic time stamps (creation and handling) ElectronicDocuments 10 storage or management (creation, handling or preservation) Electronic delivery of edocuments services (handling, preservation) Validation of electronic signatures (documents, certificates, seals, websites) Longtime preservation of electronic signatures (documents, time stamps) The definition of trust service in the EU Regulation is quite wider, since teorically covers all combinations of the services applied over the objects shown in the Table 1 below. Table 1: Trust services as defined in the EU Regulation 7 ( 8 The TSP services, standards and risk analysis report will be published in ENISA s website: An edocument should be considered as any kind of data digitally signed using advanced electronic signature (with or without an electronic signature creation device) Page 1
6 1.1 Motivation This document is intended to provide a summary of the recommendations for the implementation of TSP provided in the ENISA s TSP services, standards and risk analysis report 11 for the particular case of e-government portals. This document identifies recommendations for Trusted Provision of egovernment services based in the experience of the LSPs and the recommendations extracted from the survey and fully described in that ENISA s report. Some services already provided in the market are identified by the object they are applied, like Time Stamping or ecertificate provision, whilst others are advertised with the name of the service they provide, like evalidation or Preservation. Others like Creation of esignatures or eseals over edocuments may be hidden in other services, like submission of documents to a public administration portal. In order to simplify the combinations, only those services most frequently referenced in egovernment applications have been included in the analysis. 11 Published in: Page 2
7 2 Study Cases This section summarises the description of the scenarios built for the provision of e-gov. services by the members of the LSPs funded by the EC, which are themost relevant for this analysis. This summary reflects the way each LSP implement the TSPs that are needed to build trust amongst the users of the LSP, either integrated in the platform of the project, or provided by a third party, which in some cases is also partner of the project, providing the service in a commercial basis to the members of the LSP in the same conditions as they provide the TS to other customers. 2.1 epsos The Smart Open Services for European Patients (epsos 12 ) project architecture is based on National Contact Points usually embedded to a competent authority of the country. Health organizations in each participating nation will be connected to the epsos network through the National Contact Point. epsos is implemented only by selected end users (or PoC) of the Participating Member States (MS). Those PoC delegate the following processes to the National Contact Point (NCP) of each country: User authentication (requestor or provider of a document), possibility for electronic signature of documents by its provider, requirements about those signatures, the user authorization to sending personal data out of the country, etc. There have been established bilateral agreements between each pair of countries to accept the application of the technologies used in each MS, because: - There are different requirements of the competent authority in each country about, e.g. the use of electronic signature technologies, like: recognised hash algorithms, advanced vs qualified electronic signature. - epsos is a health service and healthcare is excluded from the EU Directive 2006/123/EC 13.provisions about services in the internal market, which makes epsos unable to mandate the use of advanced electronic signature (that EU Commission Decision 2009/767/EC 14 establishes). There are two software solutions for the NCP: the fully Open Source OpenNCP toolkit and the NCP in-a-box, both based on Open Source components and the closed source backbone from one Vendor. Both are mandated to support the application of electronic signatures. epsos adopts SHA-2 hashed certificates. Since only few CAs offer SHA-2 certificates for servers, most of epsos Countries have adopted certificates generated by the Czech CA 1 st Certification Authority The Directive 2006/123/CE establishes the requirement to simplify the relation with the administration in order to facilitate the dissemination of services in the internal market. Healthcare services are out of this requirement. 14 The Commission Decision 2009/767EC describes the security requirements for procedures according to Art. 8 Services Directive 2006/123/EC. In particular, Art. 1 establishes the possibility to require advanced electronic signature. Page 3
8 epsos specifications require the use of TSPs included in any Trusted List. However not all the epsos Countries are in the condition to fulfill the requirement: termporary relaxation has been approved by the epsos Steering Board. epsos organizations are expected to comply with ISO/IEC or equivalent and the epsos specific security safeguards. The National Contact Point is responsible for auditing its implementations and service providers. They are not expected to comply with BCM standards. The following main services have been implemented: - e-delivery: 4 types of messages are Exchanged between the countries (medical information, e-prescription or e-dispensation, interchange consent, healthcare encounter report). edelivery is provided as a document requesting delivering system. Both the authentication data in the requests of information and the delivered package are signed electronically. Signatures are made/validated in the National Contact Point. - e-document: There is no requirement of including signatures of the exchanged documents itself. The epsos organizations are free of doing it, and in that case the e-documents will be stored in the National infrastructures, not in the epsos network. - Long-Time Preservation and Time-Stamping: these services are used for Audit Trail events in the accesses to patient s data. Audit trails are always electronically signed. They are stored for 10 years. Future re-signs are anticipated and have been extended for fitting one or more electronic signature formats. Audit trails are time stamped. In general, the time stamp in performed internally by a web service on the National Contact Point (without any external TSA) and it is of its responsibility. There is no requirement about using a National or International main time source. Legally, the Audit Trails are compiled, stored and managed under the sole responsibility of the member state operating the system accordance with local law. - Validations Services: epsos performs certificates validations over OCSP, CRL and even with manual certificate validation services in some cases. epsos doesn t use any e-signed document validation services. 2.2 e-codex e-codex 15 e-justice Communication via Online Data Exchange network is composed of National Gateways, one in each country adhere to the pilot. National Systems are then connected to the National Gateway. National Systems are outside the control of e-codex. End-user authentication and end-user signing documents relay on the National System, not in any e- CODEX component. e-codex National Systems delivering trusted documents have to be characterized as an advanced electronic signature system. It seems that this LSP adheres to the Commission Decision 2009/767/EC 16 and EU Directive 2006/123/EC The Commission Decision 2009/767EC describes the security requirements for procedures according to Art. 8 Services Directive 2006/123/EC. In particular, Art. 1 establishes the possibility to require advanced electronic signature. 17 The Directive 2006/123/CE establishes the requirement to simplify the relation with the administration in order to facilitate the dissemination of services in the internal market. Page 4
9 Within the e-codex gateways DG Market s DSS Tool (a java based open source software module that can be used to create, extend and validate XAdES, PAdES ans CAdES esignatures) is used for signature validation. The validation is done in the country of origin before sending an e-document. Internally, the e-codex gateways use X.509 certificates but without any external CSP to provide them. The e-codex National Systems can use their own tools, TSPs, or certificates providers. So e-codex doesn t have any special requirement. No time stamp service is used in this LSP. The e-codex Sender National Gateway and the e-codex Receiver National Gateway have the following tasks to develop: The Sender Gateway has to be able to verify e-document s signature (from its own country) when receiving them from the e-codex National System, and then generate a validation report (the Trust OK token). The processed validation report is transported together with the e-document and a signed Token; thereby the sending country gives an assessment of the signature based on his national requirements. These documents are transported within an ASIC-S container signed by the e-codex gateway. The Receiver Gateway must validate the signed ASIC-S container and Token received from the Sender Gateway against a predefined e-codex Keystore. If the integrity of all documents is confirmed, the documents can be passed on to the e-codex National System. The Trust OK token is then accepted as evidence of validity of original signature of edocument without further validation. There are ETSI Rem (Registered Electronic Mail, ETSI TS ) evidences of all the processes, signed with advanced electronic signature and stored in e-codex platform for as long needed to fulfill national requirements. As a summary these are the trust services implemented in e-codex: - e-document: The end user signing documents service is delegated to National Systems. - e-delivery: This service is implemented by the National Gateways inside the e-codex systems to guarantee the integrity in the transmission. - e-validation: Verification of end user e-documents and internal messages is done by the National Gateways. - Time Stamping: Not implemented - Long Time Preservation: Not implemented 2.3 PEPPOL Pan-European Public Procurement Online (PEPPOL 18 ) project is composed by a Transport Infrastructure (coordinated by OpenPEPPOL Authority) to which Peppol Access Points/Peppol Authorities are engaged. There could be more than one Access Point per country. Service Providers typically represent an eprocurement community and are engaged to an Access Point. Users access an eprocurement community via the Service Providers or via the end-user IT systems, when they have implemented Peppol natively. In PEPPOL, the Transport Infrastructure is used to exchange standardised, structured (XML) eprocurement documents but the Transport Infrastructure can be used also for other purposes in 18 Page 5
10 other contexts than eprocurement. There is an extensive use of the PEPPOL Transport Infrastructure and the standardised documents in some countries, with a continuously growing number of countries connected and using the service. The Transport Infrastructure includes one Service Metadata Locator (SML) and several Service Metadata Publishers (SMPs) for discovery and routing of messages between the Access Points of the Transport Infrastructure. There is no requirement for the Access Points to be characterized as an advanced electronic signature system neither as a qualified electronic signature system. Access Points are operated subject to agreements between the Access Point Service Provider and a Peppol Authority, which regulates some basis business rules (such as the obligation of Access Points about not to charge each other for inter-communications between them, the publication of end-user capacity via the SML/SMP system to receive certain types of documents (in order to facilitate discovery and routing) and the obligation to support PEPPOL document formats). When there is no Peppol Authority in the country, the agreement is signed directly with OpenPeppol. There are also agreements between a Peppol Authority and OpenPeppol. OpenPEPPOL is a nonprofit international association of public and private PEPPOL community members. The Peppol infrastructure has its own internal PKI provided by Verisign. When an Access Point is allowed to connect to the infrastructure, the Access Point obtains a certificate from this PKI. Posession of such a certificate proves that the Access Point is authorized. There are Certificates to sign and encrypt messages between Access Points. Certificate validity is checked by OCSP provided by the internal PKI, and by CRLs for continuity purposes. Protection of messages when delivered from the sender to an Access Point and from an Access Point to the receiver is out of scope. No time stamp service and no long time preservation service are used in this LSP. There are transactions logs kept by Service Providers but the specifications do not impose explicit requirements, so such policies are left to the Service Providers and are part of their commercial policies. There is no requirement to be digitally signed nor time stamped. End-user authentication and end-user signing documents is outside the control of Peppol. It is delegated to Service Providers or end-user IT systems (when applied). The authentication mechanism used is also out of Peppol scope. PEPPOL (and OpenPEPPOL) however provides a validation infrastructure for the recipient of a signed document. This service is completely independent from the Transport Infrastructure and can be integrated in the recipients end system, or in any other system as wished. The usual mode of operation is that the receiver uses a validation service for certificate validation, while other signature processing is done locally. A profile of the XKMS protocol is used for this interface. The response attests not only to the validity of the certificate but also to its quality and legal status (e.g. qualified). The validation infrastructure covers all issuers of qualified certificates in the EU, a substantial number of non-qualified certificates, and qualified certificates from a number of non-eu countries such as from Eastern Europe. A further interface to the validation infrastructure is specified as a profile of OASIS DSS but this interface was not tested by PEPPOL. Using this interface, an entire signed document is sent to the validation infrastructure, which attest to both validity of signatures and signature quality and legal status (e.g. qualified). As a summary these are the trust services implemented in PEPPOL: Page 6
11 - e-document: eprocurement documents are standardised by the CEN BII workshop based on the results of PEPPOL. These are today mainly XML documents for post-award procurement, like catalogue, order, order confirmation and invoice, intended for automated transfer between the IT-systems of the involved actors over the PEPPOL Transport Infrastructure. There is no requirement to sign the documents. - e-delivery: Secure and reliable (receipt confirmation etc.) document transfer between the Access Points of the PEPPOL Transport Infrastructure. - evalidation: Validation infrastructure (certificate validation using an XKMS-based interface) for end user e-signed documents. Validation and quality assessment of certificates from all relevant certificate issuers in the EU and some non-eu countries is provided. There is also a validation infrastructure for the transport infrastructure associated to the internal PKI. - Time Stamping: Not implemented - Long Time Preservation: Not implemented Page 7
12 3 Recommendations This section emphasizes the recommendations made in the TSP Report of ENISA, that are applicable to egovernment services and it includes some new ones identified from the analysis of LSPs experiences collected in the survey. In some cases the recommendation will be applicable as it was stated there, and in others it will include some implementation guidelines, specific for the egovernement environment. The following recommendations are aimed to offer trustworthiness to the provision of any egovernment service. They have been grouped according to the role of the actor that should be responsible of implementing them, with the aim to facilitate their idenfication and adoption by the corresponding agent. The recommendations are numbered using a prefix and a sequence number. The prefix may be: - TSP_Rx, when the recommendation is also given in the TSP overview report of ENISA. In this case, the sequential number Rx corresponds to the number x given in that report. - egov_rn (TSP_Rx), when the recommendation n is specific of this report. Those specific recommendations (egov_rn) express a particularisation of the original recommendation (TSP_Rx) given in the ENISA s TSP report. 3.1 General recommendations to e-government service providers TSP_R4: Promote the implementation of client desktop applications to be executed in the customer computer with web-service access to TSP with end to end encryption in the communication between them. TSP_R5: It s recommended the definition of the adequate service s profiles based on best practices that comply with expected QoS. o egov_r1 (TSP_R5): It is recommended the selection of TSPs based on standardized profiles, to obtain standard QoS through SLAs (e.g. for time stamp services, the synchronization time with main time source or the service recovery time). TSP_R6: Bussiness Continuity Management standards applied to the service as a whole (as could be ISO/IEC 22301) should be promoted. It could be possible also the use of nonespecific standards as ETSI or EN because they include business continuity requirements. TSP_R8: It s recommended the promotion of the use of national or internationally trusted time sources, taking it into consideration for the specification of a qualified service. o egov_r3 (TSP_R8): It is recommended the use of independent time stamp services when there is any requirement about the moment any transaction or operation is made. Time stamp service should be provided by an organization independent from the originator of the transaction or the recipient of the transaction in order to provide guarantees of its authenticity and integrity. TSP_R11: It is recommended guaranteeing the quality of the certificate revocation service to allow the evalidation service trusts more on them. o egov_r2 (TSP_R11): It s recommended to analyze which common requirements on revocation service QoS are needed prior to the selection of TSPs, once the egovernment service has identified the risk it is going to assume. (e.g., the time passed between the users notify the revocation and the revocation itself is effective). TSP_R12: There should be a focus on user training and consciousness of threats to prevent web site / web service impersonation. For example, using messages remembering users about security best practices in storing credentials. Page 8
13 3.2 General recommendations to Member States Regulators TSP_R2: It should be promoted the use of widely recognised Trusted Marks based on conformity assessment of qualified TSPs against eidas requirements that would be recognised across borders. To overcome this problem the EU eidas Regulation proposes that a mutual assistance system between supervisory bodies in the Member States should be set up 19, e.g. cross-border or mutual recognition of accreditation schemas or independent auditing body. It should be promoted the use of widely recognised Trust Marks based on conformity assessment of qualified TSPs against eidas requirements that would be recognised across borders. o egov_r4 (TSP_R2): Trust Services should be developed with European scope, complying with European Regulation, which should be promoted. This practice would solve all interoperability and security issues in a common and trusted way. e-gov. service providers should accept and prioritise TSPs audited by a recognised independent body confirming that TSPs fulfil the obligations laid down in the Regulation Specific Recommendations for Trust Service Providers Recommendations for e-document 21 services (creation, handling or preservation) TSP_R9: best practices must be defined to harmonise the quality and functionality of the Long Time Preservation service (QoS & SLA). TSP_R10: It is recommended the use of two hash algorithms in Long Time Preservation services to protect the integrity of the e-signatures; breaking both algorithms at the same time is less probable. TSP_R11: It is recommended guaranteeing the quality of the certificate revocation service to allow the evalidation service trusts more on them. o egov_r6 (TSP_R11): It is recommended to obtain all the needed information and/or evidences to allow the validation of edocuments from signing time, and keep it with the document. Recommendations for e-validation services TPS_R3: Supervisors should promote a wider use of e-signature as authentication mechanism to access TSP services, barriers for cross-border interoperability of e-signature & eidas certificateshave to be removed. And e-government SP should accept them, under this assumption: o egov_r5 (TSP_R3): It s recommended never to accept any edocument whose origin has not been previously authenticated. o egov_r7 (TSP_R3): Integrate tools to allow cross-border acceptance of e-signature Certificates. This could be accomplished in different ways: With a unique access point (generally supported by an external Certificate Validation TSP) accepting all kinds of certificates. With several access points distributed in the member states, for user authentication and e-signature validation. It s easier for national contact points to know how to validate and understand every one of its own citizen s profiles and attributes (power of attorney or warrant, liability, etc.). 19 As recommended in the whereas 34 of the new Regulation. 20 Art. 16 of draft EU Regulation on electronic identification and trust services. 21 An edocument should be considered as any kind of data digitally signed using advanced electronic signature (with or without an electronic signature creation device) Page 9
14 Promoting the automatic processing of Trusted Lists, to allow interchange of information about accredited service providers, extended to all kinds of Regulated TSPs. TSP_R7: Full adoption of e-signature standards by TSPs should be reached, to achieve full interoperability. Recommendations for e-delivery services TSP_R5: It s recommended the definition of the adequate service s profiles based on best practices that comply with expected QoS. o egov_r8 (TSP_R5): It is recommended to implement audit trails of the transactions, specially when reception is a critical point. For high quality services, which depend on their criticality, it is recommended to electronically sign and time stamp the trails, to preserve the evidence and guarantee their non-repudiation though a TTP (Trusted Third Party TSP). 3.4 Summary of Recommendations This section summarizes the actors to which the recommendations are more relevant (X), the table also indicates which of the actors will have more responsibility (R) on the adoption or imposition of the recommendation: the Trust Service Providers (P), the Regulators (R) and the egovernment SP (G). In some cases the (G) column has been marked with (V), meaning that the egovsp is encouraged to Validate that the TSP is providing the service following the recommendation. Reg/ RECOMMENDATION TSP Stndr egov SP [REC.2.P/R/G] It should be promoted the and use of widely recognised Trust Marks based on conformity assessment of qualified TSPs against eidas requirements that would be recognised across bord. X R egov_r4 (TSP_R2): Trust Services should be developed with European scope, complying with European Regulation, which should be promoted. X R X [REC.3.R/G] Supervisors should promote a wider use of e-signature as R authentication mechanism to access TSPs, barriers for cross-border interoperability of e-signature & eidas certificateshave to be removed. egov_r5 (TSP_R3): It s recommended never to accept any edocument whose origin has not been previously authenticated egov_r7 (TSP_R3): Improve the support of a wider scope of international e- signature certificates. [REC.4.P/R/G] Promote the implementation of client desktop applications to be executed in the customer computer with web-service access to TSP with end to end encryption in the communication between them. R R R X X Page 10
15 RECOMMENDATION TSP Reg/ Stndr egov SP [REC.5.P/R] It s recommended the definition of the adequate service s profiles based on best practices that comply with expected QoS. X R egov_r1 (TSP_R5): It is recommended the selection of TSPs based on standardized profiles, to obtain standard QoS through SLAs (i.e. for time stamp services, the synchronization time with main time source or the service recovery time) egov_r8 (TSP_R5): It is recommended to implement audit trails of the transactions, specially when reception is a critical point. For high quality services, which depend on their criticality, it is recommended to electronically sign and time stamp the trails, to ensure their moment and their non-repudiation from a TTP. [REC.6.P/R/G] BCM standards (ISO 22301) applied to the service as a whole should be promoted, as well as non-specific ones, including BCM controls. X R V [REC.7.P/G] Full adoption of e-signature standards should be reached, to achieve full interoperability. R X [REC.8.P/G] recommended the promotion of the use of national or internationally trusted time sources, taking it into consideration for the R specification of a qualified service. egov_r3 (TSP_R8): It is recommended the use of independent time stamp services when there is any requirement about the moment any transaction or operation is made. [REC.9.P/R/G] best practices must be defined to harmonise the quality and functionality of the Long Time Preservation service (QoS & SLA). X R V [REC.10.P/G] It is recommended the use of two hash algorithms in Long Time Preservation services to protect the integrity of the e-signatures; breaking both algorithms at the same time is less probable. [REC.11.P/G] It is recommended guaranteeing the quality of the certificate revocation service to allow the evalidation service trusts more on them. R egov_r2 (TSP_R11): It s recommended to analyze which common requirements on revocation service QoS are needed prior to the selection of R TSPs, once the egovernment service has identified the risk it is going to assume (i.e, the time passed between the users notify the revocation and the revocation itself is effective). egov_r6 (TSP_R11): It is recommended to obtain all the needed information and/or evidences to allow the validation of edocuments from signing time, and keep it with the document. [REC.12.G] There should be a focus on user training and consciousness of threats to prevent web site / web service impersonation. R X Table 2: Summary of recommendations with Stakeholder category relevance. R R R R V R Page 11
16 4 Annex I: Abbreviations ASIC-S Simple Associated Signature Container, published by ETSI as TS BCM Business Continuity Management CA Certification Authority CAdES CMS Advanced Electronic Signatures, published by ETSI as TS CEN European Committee for Standardization CEN BII CEN Workshop on 'Business Interoperability Interfaces" CRL Certificate Revocation List, see RFC 5280 DG Directorate General DPA Data Protection Authority DSS OASIS Digital Signature Services EC European Commission e-codex e-justice Communication via Online Data Exchange eid Electronic Identification egov e-government eidas electronic Identification and Authentication ENISA European Union Agency for Network and Information Security epsos Smart Open Services for European Patients esign electronic Signature ETSI European Telecommunications Standards Institute ETSI TS ETSI Technical Specification EU European Union GDPR General Data Protection Regulation ICT Information and Communication Technologies IEC International Electrotechnical Commission IP Internet Protocol ISO International Standards Organisation IT Information Technology LSP Large Scale Pilots MS Member State NCP National Contact Point NIS Network and Information Security NRA National Regulator Authorities OASIS Organization for the Advancement of Structured Information Standards OCSP Online Certificate Status Protocol, see RFC 2560 PAdES PDF Advanced Electronic Signature, published by ETSI as TS PEPPOL Pan-European Public Procurement Online PKI Public Key Infrastructure PoC Point of Contact QoS Quality of Service REC Recommendation SAML Security Assertion Markup Language Page 12
17 SHA Secure Hash Algorithm. SLA Service Level Agreement SML Service Metadata Locator SMPs Service Metadata Publishers SP Service Provider STORK Secure IdenTity AcroSs BoRders LinKed project TS Trusted Service TSL Trust-Service Status List, published by ETSI as TS TSP Trust Service Provider TTP Trusted Third Party URL Uniform Resource Locator USB Universal Serial Bus USD United States Dollar XAdES XML Advanced Electronic Signature, published by ETSI as XKMS XML Key Management Specification XML extended Markup Language Page 13
18 Catalogue Number: TP ENISA European Union Agency for Network and Information Security Science and Technology Park of Crete (ITE) Vassilika Vouton, , Heraklion, Greece Athens Office 1 Vass. Sofias & Meg. Alexandrou Marousi , Athens, Greece doi: /26540 PO Box 1309, Heraklion, Greece Tel: [email protected] Page 14
DS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013
Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines
Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex
Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February
NIST-Workshop 10 & 11 April 2013
NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and
STANDARDISIERUNG FÜR EIDAS IM MANDATE/460
STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights reserved STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,
28.8.2014 Official Journal of the European Union L 257/73 REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic
Virtual Appliance Instructions for ENISA CERT Training TLP WHITE APRIL 2015. European Union Agency For Network And Information Security
Virtual Appliance Instructions for ENISA CERT Training TLP WHITE APRIL 2015 www.enisa.europa.eu European Union Agency For Network And Information Security About ENISA The European Union Agency for Network
26.3.2014 A7-0365/133
26.3.2014 A7-0365/133 Amendment 133 Amalia Sartori on behalf of the Committee on Industry, Research and Energy Report A7-0365/2013 Marita Ulvskog Electronic identification and trust services for electronic
Implementation of eidas through Member States Supervisory Bodies
Implementation of eidas through Member States Supervisory Bodies Riccardo Genghini - ETSI TC ESI & CEN-ETSI e-sign Coord. Group Chairman CA Day Berlin June 09 th, 2015 ETSI 2013. All rights reserved 2
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
Digital Signature Verification using Historic Data
Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held
Code of Practice on Electronic Invoicing in the EU
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
How To Assess Risk On A Trust Service Provider
European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
Qualified Time Stamping and eregistered Delivery Services Overall considerations
eias Study on an electronic identification, authentication and signature policy Qualified Time Stamping and eregistered Delivery Services Overall considerations Building blocks for secondary legislation
ROADMAP. A Pan-European framework for electronic identification, authentication and signature
TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
ETSI TS 102 573 V1.1.1 (2007-07)
TS 102 573 V1.1.1 (2007-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for trust service providers signing and/or storing data for digital accounting 2
Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013)
Questions & Answers on e-cohesion Policy in European Territorial Cooperation Programmes (Updated version, May 2013) This fact sheet was drafted jointly by INTERACT and European Commission (DG Regional
CEF Building blocks. Informatics. Joao Rodrigues Frade DIGIT.B4. CEF Project and Architecture Office Directorate-General for Informatics
CEF Building blocks Joao Rodrigues Frade DIGIT.B4 CEF Project and Architecture Office Directorate-General for AGENDA CEF at a glance CEF reuse logic CEF building blocks A fully functioning Digital Single
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
ETSI TS 102 640-3 V2.1.2 (2011-09)
TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
Certificate Path Validation
Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security
Cyber Europe 2012. Key Findings and Recommendations
Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,
Land Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. [email protected]
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA [email protected] 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the
ETSI TR 119 000 V0.0.3 (2014-01)
TR 119 000 V0.0.3 (2014-01) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Rationalised structure for Electronic Signature Standardisation COMPLETE DRAFT FOR PUBLIC REVIEW UNTIL 7 MARCH
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
The Open PEPPOL e-id & e-signature
The Open PEPPOL e-id & e-signature http://www.peppol.eu/ Including inputs from the open PEPPOL community and from the world e-id presentation Rome October 3 rd 2013 [email protected]
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification
TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)
Specifying the content and formal specifications of document formats for QES
NATIONAL SECURITY AUTHORITY Version 1.0 Specifying the content and formal specifications of document formats for QES 24 July 2007 No.: 3198/2007/IBEP-013 NSA Page 1/14 This English version of the Slovak
Building the foundation for European wide eprocurement
www.peppol.eu Building the foundation for European wide eprocurement Project Director André Hoddevik Agency for Public Management and egovernment (Difi) Facts & Figures Public Procurement Government procurement
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548
Introduc)on to STORK2.0 project
Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE
Signature policy for TUPAS Witnessed Signed Document
Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for
Regulation on electronic identification and trust services for electronic transactions in the internal market
Informationsgesellschaft, Telekommunikation Regulation on electronic identification and trust services for electronic transactions in the internal market Meaning of the EU-Regulation for the national legal
ETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
White Paper. Digital signatures from the cloud Basics and Applications
White Paper Digital signatures from the cloud Basics and Applications Contents Basics of digital signature...3 Electronic documents and signature...3 Electronic signature...3 Digital signature...4 Standards
ETSI TS 119 403 V2.1.1 (2014-11)
TS 119 403 V2.1.1 (2014-11) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of
Explanatory notes VAT invoicing rules
Explanatory notes VAT invoicing rules (Council Directive 2010/45/EU) Why explanatory notes? Explanatory notes aim at providing a better understanding of legislation adopted at EU level and in this case
Draft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
How To Understand And Understand The Certificate Authority (Ca)
TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,
FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic
FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security
Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of
How to implement esignature validation
www.peppol.eu How to implement esignature validation EU-Supply experience How to implement online validation Background Desired user experience How to implement Piloting, initial experiences Further information
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
PKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki [email protected] SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Deliverable: Work Package Document WP3.7 D.3.7.2. FINAL
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
ETSI EN 319 403 V2.2.2 (2015-08)
EN 319 403 V2.2.2 (2015-08) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust
Guidelines for the use of electronic signature
Republic of Albania National Authority for Electronic Certification Guidelines for the use of electronic signature Guide Nr. 001 September 2011 Version 1.3 Guidelines for the use of electronic signature
OB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized
Building the PEPPOL community OpenPEPPOL
www.peppol.eu Building the PEPPOL community OpenPEPPOL Project Director André Hoddevik Agency for Public Management and egovernment (Difi) Future of PEPPOL OpenPEPPOL AISBL (Under establishment) Non-profit
Electronic public procurement in the EU
Electronic public procurement in the EU Recent developments EIPA International Public eprocurement seminar Donostia-San Sebastian, 23-24 April 2008 Julia FERGER European Commission Directorate-General
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
e-szigno Digital Signature Application
MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353
Electronic signature and compliance assurance: what s new?
Electronic signature and compliance assurance: what s new? Ignacio ( Nacho ) Alamillo Domingo, CISA, CISM, ITIL-F ISACA Valencia Chapter Research Director Astrea Managing Partner March 2013 2 Table of
Government Service Bus
Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and
ETSI TC ESI PRESENTATION TO CAB FORUM. ETSI 2015. All rights reserved
ETSI TC ESI PRESENTATION TO CAB FORUM Iñigo Barreira March 2015 meeting, Cupertino ETSI 2015. All rights reserved Index ETSI Deliverables. Dates ETSI audits eidas timeline: Qualified web site certificates
EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE. on a common framework for electronic signatures
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 29.04.1999 COM(1999) 195 fmal 98/0191(COD) Amended proposal for a EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE on a common framework for electronic signatures
Digital Signature Service. e-contract.be BVBA [email protected] 2 september 2015
Digital Signature Service e-contract.be BVBA [email protected] 2 september 2015 About e-contract.be BVBA Consultancy Projects: eid/security related only SOA security From analysis to operational hosting
Electronic Signature. István Zsolt BERTA [email protected]. Public Key Cryptographic Primi4ves
Electronic Signature István Zsolt BERTA [email protected] Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,
ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification
TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES
Security in the PEPPOL
Security in the PEPPOL infrastructure Presentation for OASIS BUSDOX TC, March 2011 Thomas Gundel, IT Crew Agenda PART I Security goals in PEPPOL Scope and requirements Security overview PART II Trust models
