Open Identity Summit 2013 September 9th - 11th 2013, Kloster Banz, Germany
|
|
|
- Muriel White
- 10 years ago
- Views:
Transcription
1 Open Identity Summit 2013 September 9th - 11th 2013, Kloster Banz, Germany organised by Special Interest Groups BIOSIG CRYPTO PET within Gesellschaft für Informatik e.v. FutureID Project and Open ecard Team in cooperation with opencloudinitiative.org
2 September 9 th 2013 Pre-Workshop and Welcome Reception Pre-Workshop Trusted Identities for the Cloud (12:00-18:00) Welcome Reception for Open Identity Summit (starting at 19:00) September 10 th 2013 Open Identity Summit 2013 (Day 1) 08:45-09:00 Heiko Roßnagel and Detlef Hühnlein: Welcome to the Open Identity Summit 2013 Common Criteria vs. Open Source 09:00-09:45 Tomas Gustavsson: Common Criteria certified open source software fact or fiction? Trusted Execution Environment and Applications Identity Management in Decentralized Social Networks 09:45-10:15 Maximilian Stein: Mobile Devices as Secure eid Reader using Trusted Execution Environments 10:15-10:45 Roland van Rijswijk-Deij and Erik Poll: Using Trusted Execution Environments in Two-factor Authentication: comparing approaches Simon Thiel, Marcel Heupel, Fabian Hermann and Mohamed Bourimi: Unlinkability Support in a Decentralised, Multiple-identity Social Network Andreas Kuckartz: Identities and the Federated Social Web: Survey and Outlook
3 eid Foundations and Status in Europe 11:00-11:30 Bud P. Bruegger and Moritz-Christian Müller: The eid-terminology Work of FutureID 11:30-12:00 Detlef Houdeau and Udo Sommer: Landscape eid in Europe in CY 2013 Secure Cloud Computing Bernd Zwattendorfer, Bojan Suzic, Andreas Derler and Peter Teufl: Secure Hardware-Based Public Cloud Storage Hubert Jäger and Arnold Monitzer: Sealed Cloud A Novel Approach to Preventing Insider Attacks Lunch (75 minutes) Open Source eid Projects 13:15-13:45 Ahmad-Reza Sadeghi and Sven Wohlgemuth: PersoApp Secure and user friendly internet applications 13:45-14:15 Tobias Wich, Moritz Horsch, Dirk Petrautzki, Johannes Schmölz, Detlef Hühnlein, Thomas Wieland and Simon Potzernheim: An extensible client platform for eid, signatures and more Requirements for eid and Modern Authentication Michael Kubach, Heiko Rossnagel and Rachelle Sellung: Service providers requirements for eid solutions: Empirical evidence from the leisure sector Rolf Lindemann: Not Built On Sand - How Modern Authentication Complements Federation More Open Source eid Components and Applications Distributed and Federated Identity Management 14:30-15:00 Holger Funke and Tobias Senger: An open source eid simulator Armin Lunkeit and Jürgen Großmann: Authentication on high critical infrastructures using interoperable federated identities 15:00-15:30 Yacine Rebahi, Mateusz Khalil and Simon Hohberg: An eid based solution for anonymity and privacy protection in mobile participation The Open eid Fraunhofer project Thomas Bauereiss, Stefan Gohmann, Dieter Hutter and Alexander Kläser: Selective LDAP Multi-Master Replication 15:30-16:00 Raik Kuhlisch, Dirk Petrautzki, Johannes Schmölz, Ben Kraufmann, Florian Thiemer, Tobias Wich, Detlef Hühnlein and Thomas Wieland: An Open ecard Plugin for accessing the German national Personal Health Record Florian Holzschuher and René Peinl: Approaches and challenges for a single sign-on enabled extranet using Jasig CAS
4 Towards collaborating open source projects 16:15-17:15 Panel with selected experts: Synergies and collaboration between open source projects wishful thinking or reality? German Chapter of the OpenID Foundation Poster Presentations 17:30-18:00 Henrik Biering and Axel Nennker: Upcoming specifications from the Menno Pieters: Password Management through PWM OpenID Foundation 18:00-18:30 Towards a German Chapter of the OpenID Foundation Hermann Strack: Authentication and security integration for services at the University of Applied Sciences Harz (Hochschule Harz) using German electronic Identity Card/eID and egovernment Standards 18:30-19:30 Guided tour to explore the picturesque Kloster Banz Dinner (starting at 19:30)
5 September 11 th 2013 Open Identity Summit 2013 (Day 2) From Upper Franconia to Estonia 09:00-09:15 Christian Meißner: Welcome to Kloster Banz and Upper Franconia 09:15-10:00 Tarvi Martens: Internet voting in Estonia Cloud Computing, eid and Electronic Signatures Mobile Authentication 10:15-10:45 Stephan Sädtler: Identity management in cloud computing in conformity with European Union law? - Problems and approaches pursuant to the proposal for a regulation by the European Commission on electronic identification and trust services for electronic transactions in the internal market 10:45-11:15 Marcel Selhorst and Carsten Schwarz: Cloud-based provisioning of qualified certificates for the German eid card Florian Feldmann and Jörg Schwenk: How to authenticate mobile devices in a web environment - The SIM-ID approach Martina Mueller, Fabian Zoller, Ingo Pansa and Ansgar Gerlicher: Authentication on Mobile Devices for Business Application Novelties and Perspectives for Electronic Signatures 11:30-12:15 Jos Dumortier: The European eidas-regulation Status and Outlook 12:15-13:00 Panel with selected experts: Further Novelties and Perspectives for Electronic Signatures
6 Lunch and Farewell Open Identity Partners BIOSIG Biometrics and Electronic Signatures ( The special interest group Biometrics and Electronic Signatures (BIOSIG) within GI e.v. is dedicated to the fundamentals, methods, techniques, processes and implementations used to guarantee the authenticity and integrity of entities. CRYPTO Applied Cryptology (fg-krypto.gi.de) The special interest group "Applied Cryptology" (CRYPTO) within GI e.v. connects users and researchers in the area of cryptology, whereas the scope of activities comprises the design, analysis, implementation and practical application of cryptographic systems. PET - Privacy-Enhancing Technologies (fg-pet.gi.de) The special interest group Privacy-Enhancing Technologies (PET) within GI e.v. aims at introducing and promoting privacy-enhancing technologies in science, industry and policy. FutureID Project ( The EU-funded FutureID project builds a comprehensive, flexible, privacy-aware and ubiquitously usable identity management infra-structure for Europe, which integrates existing eid technology and trust infrastructures, emerging federated identity management ser-vices and modern credential technologies to provide a usercentric system for the trustworthy and accountable management of identity claims. Open ecard Team ( The Open ecard Team is an open community, which aims at providing an open source and cross platform implementation of the ecard-api-framework (BSI-TR-03112) and related international standards such as ISO/IEC and OASIS DSS through which arbitrary applications can utilize authentication and signatures with arbitrary smart cards. BITKOM ( The Federal Association for Information Technology, Telecommunications and New Media (BITKOM) is the voice of the information technology, telecommunications and new media industry in Germany. BITKOM represents more than 1,700 companies, of which 1,200 are direct members and many of them are involved in working groups focusing on Identity Management, eid technology, Open Source Software and Cloud Computing for example. CAST Forum ( The Competence Center for Applied Security Technology, (CAST) e.v. offers a variety of services in the field of secure modern information technology and is a contact for all questions regarding IT security.
7 Deutsche Wolke ( The open source initiative Deutsche Wolke has been established as a network of renowned German and international organisations, which aims at establishing a federal cloud infrastructure for Germany. European Association for eidentity and Security (EEMA) ( For 25 years, EEMA has been Europe s leading independent, non-profit e-identity & Security association, working with its European members, governmental bodies, standards organisations and interoperability initiatives throughout Europe to further e-business and legislation. IDentity.Next Association (IDnext) ( The main mission of the IDnext association is to create an open and independent platform to support and facilitate innovative approaches in the world of Digital identity. IT-Cluster Oberfranken ( In the IT-Cluster Oberfanken e.v. companies and intstitutions from all over Upper Franconia merge to a focused regional network in the field of information and communication technology. In this way a knowledge and development pool evolves which brings advantage for all participating stakeholders. Open Cloud Initiative (OCI) ( The Open Cloud Initiative (OCI) is a non-profit organization, which has been initiated to advocate open cloud computing. For this purpose it maintains a set of Open Cloud Principles (OCP) and uses them to determine whether a given product or service is compliant and therefore "Open Cloud", both by way of community consensus. OpenID Foundation ( The OpenID Foundation is an international non-profit organization of individuals and companies committed to enabling, promoting and protecting OpenID technologies. Formed in 2007, the foundation serves as a public trust organization representing the open community of developers, vendors, and users. OIDF assists the community by providing needed infrastructure and help in promoting and supporting expanded adoption of OpenID. This entails managing intellectual property and brand marks as well as fostering viral growth and global participation in the proliferation of OpenID. Open Identity Exchange (OIX) ( The Open Identity Exchange (OIX) is a non-profit organization comprised of leaders from identity data-centric industry sectors including the internet (Google, PayPal, etc.), data aggregation (Equifax, Experian, LexisNexis, etc.), and telecommunications (AT&T, Verizon, etc.) driving the expansion of existing services and the deployment of new services. OIX develops and certifies trust frameworks, pre-negotiated sets of business, legal, and technical policies that provide identity service providers and relying parties with mutual assurance that their online transactions are reliable and repeatable. OIX is a global center of excellence for identity in next generation digital transactions delivering domain expertise, joint research commissioned by competitors, and pilot projects to test assumptions in the real world. Open Source Business Alliance (OSBA) ( The Open Source Business Alliance short OSB Alliance is with more than 190 members Germany s largest network of enterprises and organisations, which develop or use open source software.
8 Open Source Integration Initiative (OSII) ( The Open Source Integration Initiative (OSII) brings together a range of open source software applications for use by businesses. It's an initiative by MFG Baden- Württemberg Innovation Agency for ICT and Media and the Open Source Business Alliance (OSB Alliance). The aim of OSII is to create a low-cost modular solution a software stack that meets the needs of many different operating processes. SkIDentity Project ( The SkIDentity Project aims at facilitating the use of electronic identity cards (eid) within existing and emerging cloud computing infrastructures in order to provide trustworthy identities for the cloud. TeleTrusT IT Security Association Germany ( TeleTrusT is a widespread competence network for IT security comprising members from industry, administration, research as well as national and international partner organizations with similar objectives. Trusted Cloud Program ( The Trusted Cloud Program is an initiative of the German Federal Ministry of Economics and Technology in which 36 companies, 27 academic institutions and four further institutions are collaborating in 14 projects in order to develop innovative, secure and compliant technologies for trustworthy Cloud Computing.
An Open ecard Plug-in for accessing the German national Personal Health Record
An Open ecard Plug-in for accessing the German national Personal Health Record Raik Kuhlisch 1 Dirk Petrautzki 2 Johannes Schmölz 3 Ben Kraufmann 1 Florian Thiemer 1 Tobias Wich 3 Detlef Hühnlein 3 Thomas
RECOMMENDATIONS COMMISSION
16.5.2009 Official Journal of the European Union L 122/47 RECOMMENDATIONS COMMISSION COMMISSION RECOMMENDATION of 12 May 2009 on the implementation of privacy and data protection principles in applications
Current Research- Cloud Computing and E-Government
AK IT-Security 1 Current Research- Cloud Computing and E-Government Graz, 12.11.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU Graz Overview»
Identity Management and Cloud Computing in the Automotive Industry First Empirical Results from a Quantitative Survey
Identity Management and Cloud Computing in the Automotive Industry First Empirical Results from a Quantitative Survey Nicolas Fähnrich, Michael Kubach Fraunhofer IAO Open Identity Summit Berlin, Germany,
COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.5.2009 C(2009) 3200 final COMMISSION RECOMMENDATION of 12.5.2009 on the implementation of privacy and data protection principles in applications supported
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Quality Management in Open Source Projects Experiences from the Open ecard Project
Detlef Hühnlein et al. (Eds.): Open Identity Summit 2015, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn 2015 55 Quality Management in Open Source Projects Experiences from the Open
NOK NOK LABS AUTHENTICATION & OTT SERVICES
NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1 NOK NOK LABS The authentication challenge A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME...
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. [email protected]
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA [email protected] 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
Securing Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
NIST-Workshop 10 & 11 April 2013
NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and
Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding
Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the
ISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, [email protected] 2 Infineon Technologies AG, [email protected]
Privacy and security in the cloud
Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015
FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs
Rolf Lindemann, Nok Nok Labs cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Authentication in Context Single Sign-On Modern Authentication Federation
PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum
A. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups
For Discussion on 27 May 2014 Paper EGCCSS-6-3 Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups Purpose To propose the setting up of two Working Groups under
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
APPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
GOVERNANCE AND THE EHR4CR INSTITUTE
GOVERNANCE AND THE EHR4CR INSTITUTE Dipak Kalra EuroRec, University College London Christian Ohmann, European Clinical Research Infrastructure Network (ECRIN) Electronic Health Records for Clinical Research
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
RFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit [email protected] European Commission Directorate
Approaches and challenges for a SSO enabled extranet using Jasig CAS. Florian Holzschuher René Peinl 10.09.2013
Approaches and challenges for a SSO enabled extranet using Jasig CAS Florian Holzschuher René Peinl 10.09.2013 iisys - Institut für Informationssysteme Mission: The institute is a competence centre for
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
Secure Cloud Identity Wallet
1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
The Market for Two-Factor Authentication
The Market for Two-Factor Authentication Current Usage and Trends in the Channel whitepaper % 20% 30% 40% 50% Executive Summary Change can bring both opportunities and threats to any organisation, and
Rules for the Public Administration
Cloud Computing & Healthcare Rules for the Public Administration Daniele Tatti [email protected] @DanieleTatti In the next 12 minutes What is DigitPA European scenario Cloud related activities ehealth
Federal Ministry for Economic Affairs and Energy (BMWi) Germany Unit Digital Technologies http://www.digitale-technologien.de www.bmwi.
Trusted Cloud Initiative Germany Federal Ministry for Economic Affairs and Energy (BMWi) Germany Unit Digital Technologies http://www.digitale-technologien.de www.bmwi.de Cloud Computing Objectives of
Qualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
Security of smart grid communication protocols
Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness
9360/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
Secure Cloud Computing with SkIDentity: A Cloud- Teamroom for the Automotive Industry
Secure Cloud Computing with SkIDentity: A Cloud- Teamroom for the Automotive Industry Michael Kubach, Fraunhofer IAO Nobelstr. 12, 70569 Stuttgart [email protected] Eray Özmü, Universität
Agenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability
IHE epsos Connectahon Pisa, 12 April 2011 The European Commission s s vision for ehealth interoperability Benoit Abeloos Research Program Officer, Interoperability - Standardization European Commission
A trusted identity management system is not only essential for ensuring your customers safety and confidence.
A trusted identity management system is not only essential for ensuring your customers safety and confidence. With the new EU legislation, high protection of personal data has become a pressing need. Side
What is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
Landscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Online/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Electronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta [email protected] Content
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document
MasterPass Authorized Vendor. Introducing Pecunda The MasterPass Modular Wallet
MasterPass Authorized Vendor Introducing Pecunda The MasterPass Modular Wallet Context With the introduction of the MasterPass wallet, MasterCard offers merchants and consumers a new, quick and secure
Cloud Computing: Opportunities in HE. P. Y. Thomas University of Botswana
Cloud Computing: Opportunities in HE P. Y. Thomas University of Botswana Presentation Outline What is cloud computing? Online data storage: a feature of cloud computing Personal digital workspace as well
8970/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Cyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
(DRAFT)( 2 ) MOTION FOR A RESOLUTION
05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](
INTRODUCTION AND HISTORY
INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
DIGITAL IDENTITY ACROSS
DIGITAL IDENTITY ACROSS BORDERS: OPENING A BANK ACCOUNT IN ANOTHER EU COUNTRY PROJECT REPORT EDITED BY LIVIA RALPH FEBRUARY 2016 1 Contributors: 2 Executive Summary C ustomers of Norwegian banks have a
Multi-factor Authentication
Multi-factor Authentication Current Usage and Trends whitepaper Executive Summary In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has
Asia Pacific the Future of Cloud Computing
Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why
Securing the E-Health Cloud
Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords
