ACCESSIBILITY CHALLENGES IN E-GOVERNMENT:
|
|
|
- Sibyl Sharp
- 10 years ago
- Views:
Transcription
1 ACCESSIBILITY CHALLENGES IN E-GOVERNMENT: AN AUSTRIAN EXPERIENCE Clemens Orthacker 1 and Thomas Zefferer 2 Institute for Applied Information Processing and Communications, Graz University of Technology, Austria 1 [email protected], 2 [email protected] ABSTRACT Secure user authentication and electronic signatures are key requirements for e-government applications. Many EU Member States rely on smart-card technology for these purposes. In addition to security, accessibility is crucial for the integration of smart cards into web based e-government processes. In Austria, the open-source software MOCCA provides access to smart-card functionality by means of Java Applet technology. Assuring MOCCA's compliance to established accessibility standards has turned out to be a challenging task. This paper discusses several accessibility issues that may arise in smart card based e-government infrastructures. We focus on MOCCA and accessibility improvements that have been applied to this core component of Austria's e-government infrastructure. We identify several accessibility issues related to Java Applets and show how faced problems have been overcome in order to achieve WCAG 2.0 compliance for MOCCA. The gained experiences and employed techniques presented in this paper can help to improve the accessibility of any Java Applet based application. KEYWORDS Accessibility, e-government, smart cards, Java Applets, authentication, electronic signature 1. INTRODUCTION For many decades, interaction with governmental administrations has been cumbersome for citizens due to complex procedures, limited office hours, and long queuing times. Positively influenced by customer-oriented services from the private sector and enabled by the emergence of information and communication technologies (ICT), governments have started to offer services to citizens also via web based technologies. The application of ICT to facilitate administrative procedures has become commonly known under the term e-government. E- Government has rendered personal attendance of citizens in public offices unnecessary. Nowadays, citizens use the Internet to communicate with governmental administrations and to carry out administrative procedures. Due to intense effort that has been invested in e- Government initiatives during the past decade, Austria has been repeatedly awarded to be one of the leading European countries in terms of e-government availability [4]. Security and accessibility are two crucial success factors for e-government. Security requirements are usually met by applying established cryptographic mechanisms such as strong authentication and electronic signatures. In many European countries, smart cards act as enabling technology for electronic signatures and secure user authentication in e-government processes. Among many other countries, also Belgium [5] and Austria [6] have introduced smart card based e-government solutions. On the other hand, accessibility is usually considered by striving for compliance with the Web Content Accessibility Guidelines (WCAG) [7]. These guidelines have been proposed by the Web Accessibility Initiative (WAI) and define requirements and best practices to achieve accessibility in web-based environments.
2 Integration of smart cards into e-government processes while preserving accessibility has turned out to be a challenging task. In this paper, we discuss accessibility in the context of smart card based e-government services and address different issues that had to be overcome in Austria. We do so by reconsidering the open source software MOCCA (Modular Open Citizen Card Architecture) that has been introduced by the authors in [2]. By now, MOCCA represents a core component of Austria's e-government infrastructure. MOCCA makes use of the Java Applet technology to integrate smart-card functionality into e-government applications. Unfortunately, the Java Applet technology has turned out to be a potential source of various accessibility problems. In this paper we present our solutions to the faced problems and show how accessibility has been assured for one of the central building blocks of Austria's e- Government infrastructure. The remainder of this paper is structured as follows. Section 2 discusses the two basic requirements of web based e-government solutions: accessibility and integration of smart-card functionality. Subsequently, Section 3 describes different technical challenges that arise as a consequence of these two requirements. In this section we also present our approaches to overcome the faced challenges. Conclusions are finally drawn in Section CHALLENGES IN E-GOVERNMENT Secure user authentication and electronic signature creation are crucial requirements of e- Government services. Similar to numerous other countries, Austria relies on smart-card technology to fulfil these requirements. Unfortunately, the use of smart cards raises various problems with regard to accessibility. This section discusses the relevance of smart card technology and describes how it is integrated into Austrian e-government applications. We then emphasize the relevance of accessibility in the context of e-government and identify various problems that have been faced during the development of MOCCA in Austria The Smart-Card Access Challenge User authentication in common web based services is usually accomplished with username/password schemes. This method is vulnerable to identity theft 1 and does not provide strong authentication as required by legally binding transactions in e-government. Contrary, smart cards provide two-factor authentication by relying on something the user possesses (the card) and something she knows (the PIN). Apart from strong authentication, smart cards also allow citizens to create electronic signatures that are legally equivalent to handwritten signatures [1]. Many EU Member States have adopted this technology as an integral component of their e- Government infrastructure and have rolled out smart cards to citizens. In Austria, the majority of currently available e-government services are web based. Hence, citizens mainly use web browsers to interact with public authorities. Unfortunately, no standardized approaches for accessing smart-card functionality from web applications exist and rollout of many different smart-card types and generations renders this task even more difficult. In order to hide the complexity of smart-card communication from web applications, an abstraction layer is in use in Austria. This abstraction layer for smart-card access is called Security Layer and has been introduced in [6] by Leitold et al. Figure 1 illustrates the basic idea of the Security Layer (SL) concept. Following a middleware approach, access to the functionality of different smart cards is provided through a common web based interface to higher-level services and applications. 1 For instance, dictionary attacks pose a serious threat to the security of username/password based authentication schemes.
3 As the specifications of this abstraction layer are open and technology neutral, there are currently several different implementations in place in Austria 2. However, MOCCA is the only open source Security Layer implementation and therefore plays a central role in Austria s e- Government infrastructure. According to the Security Layer specifications, MOCCA implements low level communications with smart cards and provides their functionality to e- Government applications through the Security Layer interface. MOCCA is therefore a crucial component and used by many e-government applications that rely on smart card based user authentication or electronic signatures. Figure 1 illustrates MOCCA s relevant interfaces. MOCCA accesses smart cards through the PC/SC interface. Applications may access smart-card functionality via the web based Security Layer (SL) interface. Required user input such as PIN entries is collected through a user interface. Figure 1. Layered architecture: MOCCA's user interface may be included in the e-government service's web page. Smart-card PINs are entered via MOCCA's user interface (unless a pin-pad card reader is employed). One of the basic ideas behind MOCCA was to follow a minimal-footprint approach. This should release citizens from the need to install software on their client PCs, which in the past has turned out to be troublesome for inexperienced users. By following a minimal-footprint approach, MOCCA significantly improves the usability of e-government services. Given the demand for a minimal-footprint solution and the requirement for system and browser independence, the available technological alternatives are actually limited. A survey of current rich Internet application frameworks and web-browser extensions finally yielded the Java Applet technology as most appropriate technology to access smart cards from web browsers. 2 For a selection of such middleware implementations to be installed on the client PC see
4 MOCCA makes use of Java's smartcardio 3 library to access the host system s PC/SC 4 interface. Likewise, Java's Swing library is used to implement the user interface and to enable users to interact with MOCCA through a provided Java Applet. Due to Java's platform independence, MOCCA can basically be used on all common operating systems, which again improves usability and accessibility The Accessibility Challenge Information and communication technologies have the potential to significantly improve governmental and administrative processes in terms of efficiency. It is therefore reasonable that an increasing number of governmental services are already offered electronically. However, this trend involves the risk that impaired citizens, who are unable to use these new technologies, are excluded from these services. This phenomenon is commonly known as Digital Divide. To counteract the Digital Divide, especially governmental and administrative services need to be accessible to all citizens, regardless of existing disabilities or other factors that limit the use of ICT. Therefore, e-government services have to be designed and implemented such that their degree of accessibility is maximized. Since most e-government services are currently web based, compliance to the Web Content Accessibility Guidelines (WCAG) that have been introduced by the Web Accessibility Initiative (WAI) is a crucial requirement for accessible e- Government services. Conformance with WCAG is actually an integral part of Austria's e-government strategy. The need for accessibility in e-government services is also regulated by Austria's e-government Act [3]. Being a relevant component of Austria's e-government infrastructure, the requirement for WCAG compliance applies also to MOCCA. Due to MOCCA's Java Applet based nature, the need for accessibility has brought up several challenges. In the following section, we elaborate on observed problems, show how several technical issues have threatened to compromise accessibility, and present solutions to the faced challenges. 3. PROBLEM ANALYSIS AND SOLUTIONS It has been shown that the demand for minimal-footprint integration of smart-card functionality into web based e-government services leads to the requirement for Java Applet technology. Furthermore, it has been discussed that accessibility is another important issue, especially in e- Government. Attempts to overcome both the smart-card access challenge and the accessibility challenge have brought up several problems during the development of MOCCA. In this section we discuss selected problems regarding accessibility that have been faced during implementation and present the corresponding solutions we have come up with. The Java programming language features support for accessibility technologies, allowing programmers to build software that can also be used by people with disabilities. However, especially for Java Applets running in web browsers, several problems regarding accessibility arise. Additionally, the design of the Austrian Security Layer interface and the special architecture of MOCCA still complicate the situation. During the development of MOCCA, the accessibility challenges discussed in the following subsections had to be overcome. 3.1 Keyboard Navigation According to WCAG, input elements such as text fields or links must be selectable via keyboard using the TAB key. Current web browsers assure this by default for input elements in web pages
5 and the Java technology provides means to support keyboard navigation within Applets. However, web browsers in general do not provide means for switching the focus from the web page to the embedded Applet and vice versa. The user, cycling the focus with the TAB key, cannot reach the Applet's input elements if the focus is within the web page. Similarly, the web page's elements cannot be reached with the TAB key if the focus currently lies within the Java Applet. The seamless integration of Java Applets into web sites in terms of keyboard navigation has turned out to be a challenging task. In fact, this problem seems to be a weakness of the web browser and requires a workaround. We have chosen the following JavaScript based approach to overcome this issue. To allow users to move the keyboard focus into the Applet using the TAB key, a JavaScript function is called whenever the HTML input element that is located right before the Java Applet loses the focus, i.e. ceases to be active 5. Within this JavaScript function, a public method of the embedded Java Applet is called via JavaScript. This Java method requests the focus for one of the Applet's currently displayed input elements. To move the keyboard focus from the Applet to the embedding web site, a similar approach has been followed. Within a Java Applet, the Applet's context can be accessed through the Java 6 class java.applet.appletcontext. In our solution, this class is used to call a JavaScript function of the embedding web site. The called JavaScript function then assigns the keyboard focus to an arbitrary element outside the Applet. To switch the keyboard focus between a Java Applet and its embedding web site, we employ the feature that public methods of a Java Applet can be called from its embedding web site using JavaScript and that Java Applets can call JavaScript functions of the embedding web site. This satisfies the accessibility requirement that all elements of a web site have to be selectable by keyboard. 3.2 Applet Scaling and Font Resizing Web browsers usually allow users to easily change the font size of the displayed web site via keyboard shortcuts or menu items. However, this does usually not affect the font size of label texts within Java Applets. While all text in the embedding web site increases and decreases as supposed, neither the font size of text labels nor the size of several other user interface components in Java Applets do change. We have addressed this issue by assuring that all Applet components are scaled according to the Applet s current size, which is automatically adjusted with any change of the embedding web site s font size. Whenever a resizing of the Applet is detected, all displayed Applet GUI components are re-rendered appropriately. Additionally, two HTML buttons have been added to the embedding website, allowing the user to increase or decrease the size of the Applet and all of its GUI components along with the web site's font size. This resizing is again triggered by JavaScript functionality, which is used to assign a new size to the embedded Java Applet object. Either by including HTML buttons or by relying on web browsers means for changing the font size, our approach guarantees that the Applet and all of its displayed GUI components can be resized dynamically. Both methods contribute to the satisfaction of the accessibility requirement for dynamically scalable contents. 5 Alternatively, an invisible HTML input element could be inserted right before the Applet. Whenever this element receives the focus it could call the JavaScript method instead. 6 For further information on this Java class refer to
6 3.3 Screen Reader Support By default, contents of Java Applets cannot be accessed by screen reader software. Java's Accessibility API 7 and the Java Access Bridge 8 provide means for the inclusion of interfaces required by assistive software such as screen readers. While contents of the embedding web site can be read out, the Applet's contents are by default ignored by screen reading software. To solve this problem, our solution makes use of Java's Accessibility API. Through this API, each GUI element can be assigned with additional information that is then provided to assistive software such as screen readers through a welldefined interface. Using the Java Accessibility API is in general good practice to achieve accessibility for Java programs. We have used this technique to make MOCCA compliant to screen reader software and similar assistive technologies. 3.4 Pop-Ups A context sensitive help system is crucial for the usability of any complex software. In particular, this applies to software for creating electronic signatures with legal effects. Thus, the Austrian e-government style guide convention [8] requires e-government forms to provide context sensitive help to the user via a defined clickable help icon. MOCCA provides a collection of web pages covering help topics for every single step and possible error situation in the signature creation or authentication process. Given the complexity of these processes, every help topic consists of an entire web page. In order not to interfere with the authentication process, a new browser window or tab should open if the user clicks the help icon. Since the help page to be displayed depends on the current state of the authentication or signature-creation process, it seems natural to open the new window via the Java Applet. Modern web browsers feature pop-up blockers that prevent new pages from being opened automatically, i.e. if the user does not click on a link in the current page. Unfortunately, web browsers do not recognize the user's click on the help link inside the Applet and thus would block the help page from being displayed. In general, pop-up blockers display a warning, asking the user to either permit or disallow new pages being opened depending on their host URL. Once allowed, all help pages would open in a new help tab without the pop-up blocker interfering. Apart from the unsettling warning about potentially insecure content, another, more severe problem persists: if the user confirms the pop-up, certain pop-up blockers reload the entire web page that caused the new page to open. Without going into details about the integration of the smart-card based authentication process in web applications, a reload of the entire page would restart this (multi-stage) process from the beginning 9, leaving the user with what appears as an aborted login. A first solution yielded a new Java Frame opening (thus circumventing the browser's pop-up blocker) and displaying the help page using standard Java HTML components. However, the Java HTML rendering engine s functionality is rather limited and does not support several features required for WAI conformance, such as ALT texts or TAB navigation. Current web browsers feature very good accessibility support. It therefore seems natural to dispose of them to display the help pages. In order to circumvent the pop-up blockers, the help link must be placed in the embedding web page and not in the Applet. Again, JavaScript was See Section 3.5
7 employed to request the current help context via the Applet's public interface and construct the hypertext link to the respective help web page. 3.5 Application Integration The Austrian smart card based authentication process consists of several stages and involves several modules (including MOCCA) that cooperate via HTTP and HTML forms. Application providers usually try to create a user experience comparable to simple username/password based authentication mechanisms. The entire authentication process is hidden from the user apart from the MOCCA Applet being displayed as part of the application's web site. Tight integration of the authentication process into the embedding web application is typically achieved by means of an HTML inline frame (IFRAME) in the application's web site. Unfortunately, with the use of the IFRAME element several accessibility issues arise. Seamless integration requires to fix the inline frame's size to the space required by the Applet and to hide scrollbars. This however causes issues if any content different from the Applet shall be displayed. Error messages, which are for instance shown when the Applet cannot be loaded, might not fit into the IFRAME's limited area. Since the process requires secured communication with multiple online modules, server certificates of these modules have to be reviewed and accepted by the user. Upon first interaction with a secured site, browsers generally block the site's content and display a security warning instead. The user may add the server certificate to the trusted sites by clicking a button on the security-warning page. Any further communication with that server will be indicated as secured and no further warning will be displayed. Unfortunately, if the inline frame is neither resizable nor scrollable, the contained security warning cannot be displayed entirely and the user cannot accept the certificate by clicking the cropped or even completely hidden button. In the common setting where online modules and the application share a common server certificate, this issue is not relevant at all. Otherwise, it can be avoided by ensuring that the certificates are trusted prior to the initiation of the authentication process. The application site may include referenced content from the secured site in order to force the user to accept the certificate prior to authentication. The fixed size of the inline frame causes another potential issue if MOCCA and the application are hosted by different operators. MOCCA updates might introduce changes in the Applet's size, requiring the application site to be adjusted. In our experience this is effectively a major problem. As already mentioned in the previous section, a page reload causes the inline frame to reset to its initial state and the authentication process to abort. The authentication process requires an initial request to a remote authentication module. The embedding web page contains some input element to trigger this authentication request, causing the IFRAME to be inserted in the web page by means of JavaScript. The HTTP communication between the modules involved in the authentication process takes place within that IFRAME. Of course, a reload of the entire page causes the IFRAME to disappear. This might cause confusion with the user. The issues arising from the integration via inline frames could be avoided by not integrating the authentication process and the MOCCA Applet as tight into the application site. However, we consider that the gain of usability caused by the tight inline frame integration outweighs the above-mentioned drawbacks of this solution. Of course, this trade-off leaves some room for improvements. The discussed problems show that Java Applets can cause several severe problems regarding accessibility. At the same time, Java Applets are currently the only appropriate technology to implement an operating-system independent minimal-footprint middleware for smart-card access. Striving for WCAG 2.0 compliance of MOCCA 10, we have shown how Java Applet 10 In 2010, MOCCA has been certified to be compliant to WCAG 2.0
8 related accessibility challenges can be overcome in practice. By assuring accessibility for MOCCA, we have contributed to the overall accessibility of Austria s e-government infrastructure. 4. CONCLUSIONS Web content accessibility is a crucial requirement for providers of web based services. This especially applies to providers of e-government applications, as these services need to be accessible to all people including those with physical disabilities. In order to counteract the Digital Divide, this challenge has to be faced. Assuring accessibility in e-government has turned out to be challenging due to given constraints and the indispensable integration of complex technologies such as smart cards. In this paper we have reported on our experiences with assuring accessibility for Austrian e- Government services. We have focused on the design and development of MOCCA, which is an integral part of Austria's e-government infrastructure and mainly used to integrate smart-card functionality into web-application based e-government services. We have addressed several accessibility issues that arise mainly due to MOCCA's Java Applet based nature. Furthermore, the identified problems have been analyzed and accessibility-preserving solutions to the found problems have been presented. The implementation of MOCCA has shown that accessibility requirements can pose serious challenges to smart card based web-applications. Nevertheless, these challenges can be overcome. We have shown how smart-card functionality can be integrated into web-based services while preserving accessibility. This way, our proposed solution contributes to an accessible Austrian e-government infrastructure and assures that e-government services remain accessible to all Austrian citizens. REFERENCES [1] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, [2] Centner, Martin & Orthacker, Clemens & Bauer, Wolfgang (2010) Minimal-Footprint Middleware for the Creation of Qualified Signatures, Proceedings of the 6 th International Conference on Web Information Systems and Technologies. [3] Austrian E-Government Act (Bundesgesetz über Regelungen zur Erleichterung des elektronischen Verkehrs mit öffentlichen Stellen) (2004), xe?abfrage=bundesnormen&gesetzesnummer= ). [4] Capgemini: 9th Benchmark Measurement of European egovernment services (2010), [5] De Cock, D. & Wouters, K. & Preneel, B. (2004) Introduction to the belgian eid card, Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.) Public Key Infrastructure, Lecture Notes in Computer Science, vol. 3093, pp Springer Berlin / Heidelberg. [6] Leitold, H. & Hollosi, A. & Posch, R. (2002) Security architecture of the austrian citizen card concept. Proceedings of the 18th Annual Computer Security Applications Conference. pp ACSAC '02, IEEE Computer Society, Washington, DC, USA. [7] W3C: Web Content Accessibility Guidelines (WCAG) 2.0 (2008), [8] Wagner-Leimbach, H., Kainz, G.: E-government styleguide (2010),
A Privacy-Preserving eid based Single Sign-On Solution
A Privacy-Preserving eid based Single Sign-On Solution Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer E-Government Innovation Center Graz, Austria {Bernd.Zwattendorfer, Arne.Tauber, Thomas.Zefferer}@egiz.gv.at
TOWARDS A MODULAR ARCHITECTURE FOR ADAPTABLE SIGNATURE-VERIFICATION TOOLS
TOWARDS A MODULAR ARCHITECTURE FOR ADAPTABLE SIGNATURE-VERIFICATION TOOLS Thomas Lenz, Klaus Stranacher and Thomas Zefferer Secure Information Technology Center - Austria, Inffeldgasse 16a, Graz, Austria
Java and JavaScript. Krishna Tateneni
Krishna Tateneni 2 Contents 1 Java and JavaScript 4 1.1 Java............................................. 4 1.2 JavaScript.......................................... 4 3 1 Java and JavaScript 1.1 Java Java
Voluntary Product Accessibility Template Blackboard Learn Release 9.1 April 2014 (Published April 30, 2014)
Voluntary Product Accessibility Template Blackboard Learn Release 9.1 April 2014 (Published April 30, 2014) Contents: Introduction Key Improvements VPAT Section 1194.21: Software Applications and Operating
WCAG 2.0 for Designers: Beyond Screen Readers and Captions
WCAG 2.0 for Designers: Beyond Screen Readers and Captions Loretta Guarino Reid 1 and Andi Snow-Weaver 2, 1 Google, Inc 1600 Amphitheatre Pkwy Mountain View, CA 94043 [email protected] 2 IBM 11501
Adding A Student Course Survey Link For Fully Online Courses Into A Canvas Course
Adding A Student Course Survey Link For Fully Online Courses Into A Canvas Course Instructors who teach fully online courses using Canvas can add a link to the online course survey for their class to their
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
About the HealthStream Learning Center
About the HealthStream Learning Center HealthStream Learning Center TM Administrator access to features and functions described in the HLC Help documentation is dependent upon the administrator s role
Triggers & Actions 10
Triggers & Actions 10 CHAPTER Introduction Triggers and actions are the building blocks that you can use to create interactivity and custom features. Once you understand how these building blocks work,
Proposed Framework for an Interoperable Electronic Identity Management System
page 1 Proposed Framework for an Interoperable Electronic Identity Management System Amir Hayat 1, Thomas Rössler 1 Several Member States in the European Union (EU)have rolled out electronic identity (eid)
Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
2 System Requirements and Authentication
2 System Requirements and Authentication 2.1 System Requirements Getting started in BOCNET (Corp.) is quick and easy. We strongly recommend that the operating computers of BOCNET (Corp.) users should satisfy
Creating Accessible Documents in Word 2011 for Mac
Creating Accessible Documents in Word 2011 for Mac NOTE: Word 2011 for Mac does not offer an Accessibility Checker. After creating your document, you can double-check your work on a PC, to make sure your
Tivoli Integrated Portal Online help. Version 1.0 Tivoli Integrated Portal 2.2
Tivoli Integrated Portal Online help Version 1.0 Tivoli Integrated Portal 2.2 Tivoli Integrated Portal Online help Version 1.0 Tivoli Integrated Portal 2.2 Note Before using this information and the product
Backbase Accessibility
Whitepaper Learn about: Section 508 Accessibility requirements Backbase compliance Introduction This paper discusses the growing importance of Rich Internet Applications (RIA s) and their support for Accessibility.
Encryption-based 2FA for Server-side Qualified Signature Creation
S C I E N C E P A S S I O N T E C H N O L O G Y Encryption-based 2FA for Server-side Qualified Signature Creation Christof Rath, [email protected] Institute for Applied Information Processing
Using the W3C WebCrypto API for Document Signing
Using the W3C WebCrypto API for Document Signing Nick Hofstede and Nick Van den Bleeken Inventive Designers, Sint Bernardsesteenweg 552, 2660 Antwerp, Belgium, https://www.inventivedesigners.com/ Abstract.
MiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
Web Design Specialist
UKWDA Training: CIW Web Design Series Web Design Specialist Course Description CIW Web Design Specialist is for those who want to develop the skills to specialise in website design and builds upon existing
Macromedia Dreamweaver 8 Developer Certification Examination Specification
Macromedia Dreamweaver 8 Developer Certification Examination Specification Introduction This is an exam specification for Macromedia Dreamweaver 8 Developer. The skills and knowledge certified by this
TASKSTREAM FAQs. 2. I have downloaded a lesson attachment, but I cannot open it. What is wrong?
TASKSTREAM FAQs Why do I not receive emails from TaskStream? It could be that your email program is interpreting incoming TaskStream mail as spam, which is a term for junk mail Spam is not typically stored
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Members of staff may also phone for assistance at any time during the college day (extension 3277).
Accessibility Information - How to Use Moodle On this page: Contacting Moodle Administrators Accessing Moodle Accessibility Customising Your Computer Text Size Colours and Viewing Options Cookies Navigation
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee and Bart Preneel COSIC Research Group, Dept. Electrical Engineering-ESAT, Katholieke
Outline. CIW Web Design Specialist. Course Content
CIW Web Design Specialist Description The Web Design Specialist course (formerly titled Design Methodology and Technology) teaches you how to design and publish Web sites. General topics include Web Site
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET
Electronic Ticket and Check-in System for Indico Conferences
Electronic Ticket and Check-in System for Indico Conferences September 2013 Author: Bernard Kolobara Supervisor: Jose Benito Gonzalez Lopez CERN openlab Summer Student Report 2013 Project Specification
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Troubleshooting AVAYA Meeting Exchange
Troubleshooting AVAYA Meeting Exchange Is my browser supported? Avaya Web Conferencing supports the following browser clients for joining conferences (with the described limitations). The supported browsers
From Desktop to Browser Platform: Office Application Suite with Ajax
From Desktop to Browser Platform: Office Application Suite with Ajax Mika Salminen Helsinki University of Technology [email protected] Abstract Web applications have usually been less responsive and provided
YouTrack MPS case study
YouTrack MPS case study A case study of JetBrains YouTrack use of MPS Valeria Adrianova, Maxim Mazin, Václav Pech What is YouTrack YouTrack is an innovative, web-based, keyboard-centric issue and project
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
CaptainCasa. CaptainCasa Enterprise Client. CaptainCasa Enterprise Client. Feature Overview
Feature Overview Page 1 Technology Client Server Client-Server Communication Client Runtime Application Deployment Java Swing based (JRE 1.6), generic rich frontend client. HTML based thin frontend client
Using JCPS Online for Websites
Getting Started Before you begin, an Online Group must be created for you. Send an email requesting the group along with the username of anyone you want added as an editor to [email protected].
GETTING STARTED WITH D2L
GETTING STARTED WITH D2L Quick Start Guide v.9.2.1 ecampus This guide provides tips for users new to using the D2L Learning Environment. It discusses how to navigate the main areas and how to change your
Referencing Web links in the Survey Workbench Questionnaire
Referencing Web links in the Survey Workbench Questionnaire Topic: The Survey Workbench Questionnaire Designer is a powerful tool for creating web-based survey questionnaires. Even without web design skills,
A Web Tour also can be opened up in an external browser: this is called a Web Push. (See Web Push below.)
WEB TOUR The Web Tour feature enables session participants to share web pages with others in the session. Web Tour is a type of content that, like the Whiteboard and Application Sharing, appears in the
Web Accessibility Report
Web Accessibility Report AnnArborCIL.org Divye Bokdia Introduction AnnArborcil.org is an accessible website with AAA conformance. Team of four Michigan students (refer team section) and a staff member
How To Use Dreamweaver With Your Computer Or Your Computer (Or Your Computer) Or Your Phone Or Tablet (Or A Computer)
ITS Training Introduction to Web Development with Dreamweaver In this Workshop In this workshop you will be introduced to HTML basics and using Dreamweaver to create and edit web files. You will learn
Protected PDF Common Installation Issues
Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions
Chapter 14: Links. Types of Links. 1 Chapter 14: Links
1 Unlike a word processor, the pages that you create for a website do not really have any order. You can create as many pages as you like, in any order that you like. The way your website is arranged and
EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators
EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators Version 1.0 Last Updated on 15 th October 2011 Table of Contents Introduction... 3 File Manager... 5 Site Log...
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Software Application & Operating Systems Checklist
REVIEWER INFORMATION Product Name: Version #: Reviewer Name: Date: Filenames/URL: Locations: Intranet Training Academy DCMA360 Other (explain) REVIEW GUIDELINES Complete this review, using the following
OUTLOOK WEB APP (OWA): MAIL
Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon
Embraiz CRM System User Guide
Embraiz CRM System User Guide Version Date Prepared By Remark V 1.0 2008-10-6 Lok shu V 2.0 2008-10-9 Yolanda Tang V 3.0 2008-12-11 Yolanda Tang Contents Preface... 4 About this user guide... 4 Audience...
WCAG 2.0 Checklist. Perceivable Web content is made available to the senses - sight, hearing, and/or touch. Recommendations
WCAG 2.0 Checklist Perceivable Web content is made available to the senses - sight, hearing, and/or touch Guideline 1.1 Text Alternatives: Provide text alternatives for any non-text content Success Criteria
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
How We Did It. Unique data model abstraction layer to integrate, but de-couple EHR data from patient website design.
EHR Accessibility The Big Idea: Provide a standardized and improved user experience for ALL disabled and abled patients while interacting with their providers Electronic Health Records System (EHR). The
pcvisit Software AG remote service for profis!
remote service for profis! Instruction pcvisit EasySupport 10.0 version from: 04.11.2010 Simple and smart online support pcvisit EasySupport 10.0 is specifically tailored to the application of professional
White Paper. Guidelines For Speech-Accessible HTML for Dragon NaturallySpeaking and Dragon Medical
White Paper Guidelines For Speech-Accessible HTML for Dragon NaturallySpeaking and Dragon Medical Contents Overview...3 General Requirements...3 Dictation...4 Navigation (Voice Commands)...5 General Recommendations
Blackboard 9.1 Basic Instructor Manual
Blackboard 9.1 Basic Instructor Manual 1. Introduction to Blackboard 9.1... 2 1.1 Logging in to Blackboard... 3 2. The Edit Mode on... 3 3. Editing the course menu... 4 3.1 The course menu explained...
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:
SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant
If you see "Skip installation of the current version and test the currently installed version of Java" then select that hyperlink.
Workstation, Browser, Java, Connections, Proxy Servers, & Firewall Information March 2, 2015 Contents I. Workstation and Browser Configurations A. Internet Explorer B. Mozilla Firefox C. Google Chrome
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Avaya IP Office Platform Web Self Administration
Avaya IP Office Platform Web Self Administration Release 9.1 Issue 01.02 August 2015 Contents Chapter 1: Avaya IP Office Platform Web Self Administration... 3 Logging in to Web Self Administration... 3
NYS OCFS CMS Contractor Manual
NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
How to Configure Dynamic DNS on a Virtual Access Router
How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...
Implementation of Indirect Single Sign-On Approach to Integrate Web-Based Applications
www.ijcsi.org 21 Implementation of Indirect Single Sign-On Approach to Integrate Web-Based Applications Rinta Kridalukmana 1, Kodrat Iman Satoto 2 1,2 Department of Computer Engineering, Diponegoro University
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Chapter 5 Configuring the Remote Access Web Portal
Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts
If your organization is not already
Before you build your Web site, you need a solid design. Eden Watt At a Glance When you develop your first e-commerce site, you will discover that there are a few new things to learn about application
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Microsoft Office 2000 and Security Against Macro Viruses
Microsoft Office 2000 and Security Against Macro Viruses A White Paper by Darren Chi Symantec AntiVirus Research Center Symantec Corporation Microsoft Office 2000 and Security Against Macro Viruses 1 Contents
Requirements for Developing WebWorks Help
WebWorks Help 5.0 Originally introduced in 1998, WebWorks Help is an output format that allows online Help to be delivered on multiple platforms and browsers, which makes it easy to publish information
Guidelines for the LSS for NemID interaction design and user selection
Guidelines for the LSS for NemID interaction design and user selection Table of contents 1 The purpose and audience of the document... 3 2 Introduction... 4 3 Recommendations... 5 3.1 Visual appearance...
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
Microsoft PowerPoint 2010
Microsoft PowerPoint 2010 Starting PowerPoint... 2 PowerPoint Window Properties... 2 The Ribbon... 3 Default Tabs... 3 Contextual Tabs... 3 Minimizing and Restoring the Ribbon... 4 The Backstage View...
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
collab.virginia.edu UVACOLLAB ECLPS: BUILDING COURSE PORTALS UVaCollab User Guide Series [email protected]
UVACOLLAB ECLPS: BUILDING COURSE PORTALS UVaCollab User Guide Series [email protected] Revised 4/28/2014 CONTENTS The eclps Overview... 3 Objectives... 3 Adding the Syllabus or Lessons Tool to
Config Guide. Gimmal Smart Tiles (SharePoint-Hosted) Software Release 4.4.0
Config Guide Gimmal Smart Tiles (SharePoint-Hosted) Software Release 4.4.0 November 2014 Title: Gimmal Smart Tiles (SharePoint-Hosted) Configuration Guide Copyright 2014 Gimmal, All Rights Reserved. Gimmal
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
