Demonstration of Electronic Health Records (EHR) on Java Card 3.0 Technology-Based Devices
|
|
- Kory Hodge
- 8 years ago
- Views:
Transcription
1 BOF-4576 Demonstration of Electronic Health Records (EHR) on Java Card 3.0 Technology-Based Devices Nicolas Anciaux Jean-Jacques Vandewalle
2 Overview Show a real deployment of Java Card 3 devices in the context of an experimental health care system Consortium (called PlugDB) supported by builds the system Leader: DBMS technology Java Card 3 devices Health app. Data integration Practitioners organizations Experimental deployment (called DMSP) supported by the French authority of the Yvelines district Field deployment starting Oct. 2009
3 Agenda > Functional description: a health care systems with one personal server per patient to store her medical records > Technical details about the personal server architecture > The Java Card 3 platform > The embedded DBMS > Live demonstration > Discussion
4 Agenda > Functional description: a health care systems with patient s personal server to store their medical records > Technical details about the personal server architecture > The Java Card 3 platform > The embedded DBMS > Live demonstration > Discussion
5 E-health records (EHRs) requirements > Availability at patient s home > Accesses to EHRs must be guaranteed at patient homes > Even without a (secure, fast and reliable) a network link > Care coordination between practitioners > Centralizing data on a server provides completeness, internet access, consistency, durability > But citizens may be reluctant to adhere because of a justified or perceived loss of control > Protection and sharing of patient data > Enabling patients to control their sensitive data while allowing data sharing
6 Availability at patient s home > EHR on a personal server > Access from a browser (on a netbook) by patient s visitors (doctors & social workers, family ) Personal Server Disconnected access to Personal Servers (1 / patient)
7 Care coordination between practitioners > EHRs on a central server > Web access & exchange > Sync. via Smart Badges > No data re-entered > No network link required > EHR on a personal server > Access from a browser (on a netbook) by patient s visitors (doctors & social workers, family ) External Personal Server Sync. with central server via Smart Badges (1 / practitioner) Smart Badge
8 Protection and sharing of patient data > Patients control the sharing of their data by deciding among 3 levels of accessibility > A solution compatible with care coordination Regular Data Stored classically on the central server, replicated in the personal server Confined Shared among a reduced circle of trusted persons. Stored encrypted on the central server; encryption keys are stored in the smart badges or in the personal server Authentication via Smart Badges Secret Data Stored exclusively on the personal server
9 The personal server complements the central server > Better coordination of care > Simple and fast access everywhere (with or without) a network link > Synchronized content in disconnected and connected servers > Increases the patient s trust in the EHR system > Patients can mask their data by deciding among 3 levels of accessibility > Sound and innovative technologies > Similar software chain on personal servers and central server > Compliance with standard protocols and development tools Real-life experimentation with a field deployment Oct in the context of a medical & social network providing medical care and social services at home for elderly people
10 Focus on personal server > Embeds a Java Card 3 platform and a DBMS in a secure chip with a large storage capacity Javacard 3 Serveur web + + DBMS SGBD Smart chip FLASH Health care records
11 Agenda > Functional description: a health care systems with patient s personal server to store their medical records > Technical details about the personal server architecture > The Java Card 3 platform > The embedded DBMS > Live demonstration > Discussion
12 Usage of Java Card 3 Serveur web + SGBD Java Card 3 UI web app Smart chip JDBC API DBMS FLASH Health care records Patient s personal server Sync. web app Java Card 3 Smart chip Sync. files File System API FLASH Practitioner s smart badge
13 Java Card 3 web apps > Sync. web app. on practitioner s smart badge > Opens an HTTPS client connection to target server (patient s personal server or central server) > Authenticates with TLS > Fetches or sends a synchronization file from/to the target server > UI web app. on patient s personal server > Works through an HTTPS server connection > Checks user s credentials with TLS > Enables to read/add patient data via HTML pages and forms (same GUI as the one on the central server) > Reads/adds records to the DB through the JDBC API
14 Value added to Java Card 3 DB records FLASH > A complete embedded software chain usually found on traditional servers > Web Apps Web container JDBC API - DBMS DB records on Flash > Compliance with standard protocols and development tools Web App Web App Servlet Servlet Servlet Servlet Servlet API Web Container HTTP(S) SSL (TLS) TCP/IP USB JDBC API DBMS Not in the JC 3 specs
15 Java Card 3 JDBC API: a subset of the Java 2 JDBC API > Supports DML SQL statements that are enriched with hints > Hints are passed as comments at the end of the SQL query > Hints are used by the DBMS query processor to generate execution plans > Supports few java.sql.types > CHAR(512), VARCHAR(512), DATE, NUMBER and BINARY > Supports subsets of java.sql classes for > Connecting (Connection, Driver, DriverManager) > Executing statements (Statement, PreparedStatemant) > Retrieving execution results (ResultSet, ResultSetMetadata) > Consistency (Date, SQLException, )
16 Challenges of the embedded context From the DBMS point of view A few KBs of RAM to manage large amount of data (MBs to GBs) RAM NAND not part of the secure chip Security DBMS Query processing Transactions Access control Cryptography Indexation / Storage RAM CPU NOR FLASH Crypto BUS NAND FLASH Health care records Updates Issues with NAND: Erase block before rewrite page Write sequentially in Flash blocks (64 pages) Limited lifetime (10^5 erase ops) Same issues with NOR (at different granularity)
17 DBMS features and challenges (1/2) SELECT queries > Joins and selections queries to recompose the GUI forms SELECT E.date, D.name, L.label, L.value FROM Form F, Doctor D, Event E, Line L WHERE F.id=E.fid AND D.id=E.did AND E.id=L.eid AND // joins F.name= X AND // selection(s)... // + control accesses > Efficient execution of selections and joins requires > Lots of working memory (computed hash tables ) > To maintain indexes (high rate random write structures) RAM Updates
18 Design approach Illustrated on query processing > Favoring sequential scheme for storage and indexing > Indexes are built from sequential summaries (patented) > UPDATE, DELETE: avoid rewrite in-place > Updated records are logged in NAND and indexed in NOR > Then, logs are read only when necessary > Massive indexation of joins (particular kinds of indexes) > climbing index similar to star join indexes in data warehouse > descending index store relations between tables Updates RAM
19 DBMS features and challenges (2/2) Other illustrations > INSERT, UPDATE, DELETE queries > A lot of updates required for indexes maintenance > Processing of synchronization files > Performance: batch processing of INSERT, UPDATE, DELETE > Support of transactions needed because a full HTML form is stored via a set of INSERT queries > Atomicity: Flash provides no guaranty against write/erase failure > Complex access control for health care enforced by law > Even more complex queries (with implicit joins and selects) Updates > Crypto protected data in Flash > Crypto works on large grain, DBMS on small grain Security
20 Summary of technologies used for the embedded DBMS Massive indexation; Join indexes are climbing / descending indexes DBMS Query processing Transactions Access control Cryptography Indexation / Storage Local atomicity and recovery by undoing last actions; Durability by synchronization A new masking model called E-BAC (Event-based access control) Encryption scheme enabling processing on encrypted values (equality-selections) Update/delete out of place (log in NAND); Indexes build of sequential summaries
21 Agenda > Functional description: a health care systems with patient s personal server to store their medical records > Technical details about the personal server architecture > The Java Card 3 platform > The embedded DBMS > Live demonstration (beware! French language inside ) > Discussion
22 Demonstration scenario One patient (PAT) equipped with a personal server One doctor (DOC) equipped with a smart badge One central server auth. sees 1. PAT browses her records on her personal server at PAT s home PAT authenticates with her PIN code PAT sees all the records 2. DOC browses the PAT s records on the PAT s personal server at PAT s home DOC authenticates with his own smart badge DOC sees only medical records (and not social records) DOC adds a new medical record DOC uploads a synchronization file from the PAT s personal server to his own smart badge auth. sees adds sync. 3. DOC browses the PAT s records on the central server from his office DOC authenticates with his own smart badge DOC sees PAT s records on the central server DOC uploads the synchronization file from his own smart badge to the central server DOC sees the new record added thanks to the synchronization auth. sees sync.
23 Agenda > Functional description: a health care systems with patient s personal server to store their medical records > Technical details about the personal server architecture > The Java Card 3 platform > The embedded DBMS > Live demonstration > Discussion
24 What you ve seen > Real life use case of Java Card 3 Connected Edition with a health care smart USB key > EHR data stored on a NAND-flash managed by an embedded DBMS > Accessed by Java Card 3 web apps using a JDBC subset > Hosted on a Java Card 3 Connected Edition Web platform > Java Card 3 web apps reproduce identically the central server health care application > Synchronized with remote servers via usage of practitioners smart badges > Hardware: smartcard microcontroller + NAND Flash > Form factor: USB Key and SmartBadge (but not limited to)
25 What you may wonder > In the health care sector, decentralized personal servers have a value as complementary to central servers > Could such a solution also complement initiatives like Google Health or Microsoft Vault? > Data on personal server could also be mashup ed with remote data while there are accessed at a connected point? > Could it be applied to other business sectors? > Embedded Flash-based DBMS and Java Card 3 Connected Edition are key technologies for personal server in small chips: web platform + database on Flash > What are the technical alternatives for personal servers?
26 Wrap Up > Java Card 3 Connected Edition is a mature technology for embedded personal server applications > Embedding DBMS with data in NAND Flash enables management of complex data even in small chips > We hope coming back next year, discussing ROE about this first deployment starting Oct. 2009
27 Contacts INRIA Nicolas Anciaux +33 (0) Gemalto Jean-Jacques Vandewalle +33 (0) More information at Jean François Navarre +33 (0)
28
Secure Portable Data Server. 25/06/2012 Alexei Troussov SMIS team INRIA Rocquencourt
Secure Portable Data Server 25/06/2012 Alexei Troussov SMIS team INRIA Rocquencourt Agenda SMIS team (Secure & Mobile Information Systems) Areas of research interests Past projects and results Recent work
More informationChapter 9 Java and SQL. Wang Yang wyang@njnet.edu.cn
Chapter 9 Java and SQL Wang Yang wyang@njnet.edu.cn Outline Concern Data - File & IO vs. Database &SQL Database & SQL How Connect Java to SQL - Java Model for Database Java Database Connectivity (JDBC)
More informationICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
More informationIntroduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system
Introduction: management system Introduction s vs. files Basic concepts Brief history of databases Architectures & languages System User / Programmer Application program Software to process queries Software
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationGetting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL
Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL Overview This short guide explains how to use Attunity CloudBeam to replicate data from your on premises database to Microsoft
More informationIntroduction: Database management system
Introduction Databases vs. files Basic concepts Brief history of databases Architectures & languages Introduction: Database management system User / Programmer Database System Application program Software
More informationAvailability Digest. www.availabilitydigest.com. Raima s High-Availability Embedded Database December 2011
the Availability Digest Raima s High-Availability Embedded Database December 2011 Embedded processing systems are everywhere. You probably cannot go a day without interacting with dozens of these powerful
More informationDatabase FAQs - SQL Server
Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license
More informationJVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationiservdb The database closest to you IDEAS Institute
iservdb The database closest to you IDEAS Institute 1 Overview 2 Long-term Anticipation iservdb is a relational database SQL compliance and a general purpose database Data is reliable and consistency iservdb
More informationPersonal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design.
Document Control Document Title Personal Computer Standard Version 1.0 Owner National Infrastructure Group Author Paul McLaren, paul.mclaren@scotland.gsi.gov.uk, 0131 244 2258 Creation date 13 th November
More informationConnecting Software. CB Mobile CRM Windows Phone 8. User Manual
CB Mobile CRM Windows Phone 8 User Manual Summary This document describes the Windows Phone 8 Mobile CRM app functionality and available features. The document is intended for end users as user manual
More informationStrong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More informationToken User Guide. Version 1.0/ July 2013
Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationExploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More information2. Accessing Databases via the Web
Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, xiaquan@comp.nus.edu.sg 2 Hong Kong Polytechnic University, China,
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationDevice-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationMEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
More informationVerfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014
Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution
More informationwww.egnyte.com The Hybrid Cloud Advantage White Paper
www.egnyte.com The Hybrid Cloud Advantage White Paper www.egnyte.com 2012 by Egnyte Inc. All rights reserved. Revised June 21, 2012 Why Hybrid is the Enterprise Cloud of Tomorrow All but the smallest of
More informationAndroid for the Enterprise Ge#ng from Here to There
Android for the Ge#ng from Here to There 1 Overview addresses enterprise needs: security and device management. 2 Overview pla6orm server so4ware 3 Overview 4 Use cases 5 Use cases Loss Remediation Minimize
More informationConvenience and security
Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.
More informationArchitecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
More informationMDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning
MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,
More informationEnterprise Application Integration
Enterprise Integration By William Tse MSc Computer Science Enterprise Integration By the end of this lecturer you will learn What is Enterprise Integration (EAI)? Benefits of Enterprise Integration Barrier
More informationIBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
More informationSmartcards with Webservice Interface
Smartcards with Webservice Interface 22. SIT-SmartCard Workshop 8./9. February 2012 Jan Eichholz Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC 24727 The
More informationCTX-1259BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Administration
CTX-1259BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Administration This course provides the foundation necessary to effectively deploy and administer Citrix Presentation Server
More informationRELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
More informationEnhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationLifecycle Manager Installation and Configuration Guide
Lifecycle Manager Installation and Configuration Guide vcenter Lifecycle Manager 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationLifeSize Video Center Administrator Guide March 2011
LifeSize Video Center Administrator Guide March 2011 LifeSize Video Center 2200 LifeSize Video Center Adminstrator Guide 2 Administering LifeSize Video Center LifeSize Video Center is a network server
More informationBest Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More information1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
More informationIt is recommended that learners have experience administering Microsoft Windows Server 2003 environments.
4.): Administration Objectif 4.): Administration provides the foundation necessary to effectively deploy and administer the product and its components, including Load Manager, Installation Manager, Web
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationLSC @ LDAPCON. 2011. Sébastien Bahloul
LSC @ LDAPCON. 2011 Sébastien Bahloul About me Developer and software architect 10 years experience in IAM Recently hired as product manager by a French security editor, Dictao, providing : personal and
More informationFIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
More informationExecutive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite
Technical paper Infor Cloverleaf Integration Suite Executive summary Many hospitals struggle with managing the increasing amounts of information coming from multiple data sources. Not only can it be difficult
More informationefolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationInternet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007
Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
More informationSQL Server 2014 New Features/In- Memory Store. Juergen Thomas Microsoft Corporation
SQL Server 2014 New Features/In- Memory Store Juergen Thomas Microsoft Corporation AGENDA 1. SQL Server 2014 what and when 2. SQL Server 2014 In-Memory 3. SQL Server 2014 in IaaS scenarios 2 SQL Server
More informationPhire Architect Hardware and Software Requirements
Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationNetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
More informationeid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
More informationQlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
More informationConnecting Software Connect Bridge - Mobile CRM Android User Manual
Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationSmart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
More informationMBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
More informationIntroduction. AppDynamics for Databases Version 2.9.4. Page 1
Introduction AppDynamics for Databases Version 2.9.4 Page 1 Introduction to AppDynamics for Databases.................................... 3 Top Five Features of a Database Monitoring Tool.............................
More informationDeveloping Offline Web Application
Developing Offline Web Application Kanda Runapongsa Saikaew (krunapon@kku.ac.th) Art Nanakorn Thana Pitisuwannarat Computer Engineering Khon Kaen University, Thailand 1 Agenda Motivation Offline web application
More informationDeriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationSOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
More informationCA IDMS Server r17. Product Overview. Business Value. Delivery Approach
PRODUCT sheet: CA IDMS SERVER r17 CA IDMS Server r17 CA IDMS Server helps enable secure, open access to CA IDMS mainframe data and applications from the Web, Web services, PCs and other distributed platforms.
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationCasper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
More informationOperationalise Predictive Analytics
Operationalise Predictive Analytics Publish SPSS, Excel and R reports online Predict online using SPSS and R models Access models and reports via Android app Organise people and content into projects Monitor
More informationSecure Access Control for Control System Operations. Andrew Wright, CTO andrew.wright@n-dimension.com
Secure Access Control for Control System Operations Andrew Wright, CTO andrew.wright@n-dimension.com ... Access Control... Authentication who you are Authorization AAA what you may do Audit what did you
More informationConfiguring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Sun Microsystems Trondheim, Norway Agenda Apache Derby introduction Performance and durability Performance tips Open source database
More informationTrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
More informationDecision Support System Software Asset Management (SAM)
DecisionSupportSystem SoftwareAssetManagement(SAM) ReleaseNotes Version1.2.3 May,2010 BigFix DSSSAM1.2.3 2009-2010 BigFix, Inc. All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix
More informationCourse Outline. Kasun@sjp.ac.lk Faculty of Applied Sciences University of Sri Jayewardanepura. Information Technology
Course Outline Kasun@sjp.ac.lk Faculty of Applied Sciences University of Sri Jayewardanepura Information Technology Objectives Outcomes Course outline Examination & Certificate Overview of a Computer System
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationSecurity Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
More informationSAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
More informationVMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
More informationApplication-Tier In-Memory Analytics Best Practices and Use Cases
Application-Tier In-Memory Analytics Best Practices and Use Cases Susan Cheung Vice President Product Management Oracle, Server Technologies Oct 01, 2014 Guest Speaker: Kiran Tailor Senior Oracle DBA and
More informationv7.1 Technical Specification
v7.1 Technical Specification Copyright 2011 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
More informationHelp us make this document better smarttech.com/docfeedback/170892. Security information
Help us make this document better smarttech.com/docfeedback/170892 Security information SMART kapp includes data security features designed to keep your content controlled in a predictable way. This document
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationSAS Drug Development Integration & PheedIt
SAS Drug Development Integration & PheedIt Andrew Fagan, SAS Institute, USA Carl-Olow Magnusson, SAS Institute, Sweden Copyright 2004 SAS Institute Inc. All rights reserved. Presentation Overview! What
More informationM-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationDataBlitz Main Memory DataBase System
DataBlitz Main Memory DataBase System What is DataBlitz? DataBlitz is a general purpose Main Memory DataBase System that enables: Ð high-speed access to data Ð concurrent access to shared data Ð data integrity
More informationChapter 2 Database System Concepts and Architecture
Chapter 2 Database System Concepts and Architecture Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Outline Data Models, Schemas, and Instances Three-Schema Architecture
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationReal-time Data Replication
Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different
More information