Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Size: px
Start display at page:

Download "Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system"

Transcription

1 Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal Office for Information Security, Germany Model-Based Testing Ministry of Interior / Abu Dhabi Police, United Arab Emirates eid Consulting for npkd system Federal Office for Information Security, Germany Open Source eid Simulator

2 eid Consulting for national ID system National Identity Management Commission (NIMC) Implementation of the new eid-card with several applications from public and private sectors Extension of the infrastructure for the nationwide use of the new ID- Card Combining local requirements with international standards (ICAO) Turning requirements into a detailed technical system architecture Extensive expertise in smart card testing Model-based project implementation methodology HJP provided the following Consultancy services: AS-IS assessment Develop system architecture, IT security concept and ID card specifications Gap analysis Provide test services for multi-application Smart ID card (card and application tests), including customized test specification, evaluation of test specifications, implementation of test specifications, performing tests and writing test reports Develop business case for eservices

3 eid Consulting for e-passport system Royal Oman Police (ROP) of the Sultanate of Oman Issuance of 2million e-passports Replacing existing passport production with new e-passport issuance system Integration of existing mainframe applications and egate infrastructure Combining local requirements with international standards (ICAO) Turning requirements into a detailed technical system architecture, used in a professional public tender process Providing guidance in the selection of new technologies Using model-based methodology and tool for vendor evaluation Deployment of PKI infrastructure HJP provided the following Consultancy services for the planning, procurement and approval of the new e-passport issuance system: Field Study to assess the current state of the passport system and feasibility of the project Technical requirements specifications Development of the Request for Proposal (RFP) Evaluation of submitted bids

4 A government agency responsible for IT security and in charge of writing respective test specifications Model-based generation of test specification and test cases Reference implementation of model for PACE protocol based on BSI TR Model-Based Testing More efficient test process and automated test procedures Automated and systematic generation of test specification and test cases Model-enabled communication, documentation and automation More creativity for test engineers Provision of tool for automatic test case generation, automatic test script generation and test script execution Research and evaluation of suitable modelling software Implementation of machine readable models for test cases and reference implementation based on BSI TR (PACE protocol) based on UML Development of a simulator and code generator for reference implementation Development of a test generator which derives test cases in an automated and systematic way

5 Ministry of Interior / Abu Dhabi Police, United Arab Emirates Deliver a solution for the implementation of a National Public Key Directory (NPKD) Enhance the inspection of e- passports at U.A.E. border control by using the digital certificates retrieved from the ICAO PKD eid Consulting for npkd system Combining local requirements with international standards (ICAO) Extensive know-how on PKI and ICAO PKD Many years of experience in conformity and acceptance testing of smart card systems including PKI Expert for PKD training HJP provided the following Consultancy services: Specification of NPKD Solution with Border Control integration Integration of software from two suppliers with existing legacy system Project Management for System Integration Testing of supplied solutions Monitoring of pilot phase and change management Monitoring of roll-out to 400 clients at Border Control

6 A government agency responsible for IT security and in charge of writing respective test specifications Open Source eid Simulator Experience in developing eid simulators Extensive know kow and experience in TR Experience in setting up Open Source communities Open Source eid Simulator based on TR Establish and support of Community Migration of simulator to NFC based device HJP provided the following Consultancy services: Setting up website for Open Source community Implementing eid Simulator based on TR Implementing NFC solution

Public Key Directory: What is the PKD and How to Make Best Use of It

Public Key Directory: What is the PKD and How to Make Best Use of It Public Key Directory: What is the PKD and How to Make Best Use of It Christiane DerMarkar ICAO Programme Officer Public Key Directory ICAO TRIP: Building Trust in Travel Document Security 19/10/2015 Footer

More information

Transaction Security. Advisory Services

Transaction Security. Advisory Services Transaction Security Advisory Services Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

Introduction ICAO PKD

Introduction ICAO PKD Introduction ICAO PKD Higher Travel Security Dr. Hermann Sterzinger Veridos COO October 2015 Border control with epassports Certificates exchanged: CSCA Certificates Document Signer Certificates Certificate

More information

Oberthur Technologies. A Technology Leader

Oberthur Technologies. A Technology Leader Oberthur Technologies A Technology Leader Olivier Prestel, Managing Director Identity Business Unit Oberthur Technologies Identity BU 16 April 2014 1 Agenda Oberthur Technologies: a technology leader A

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community

More information

Best Solutions for Biometrics and eid

Best Solutions for Biometrics and eid Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical

More information

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Company Overview. Iraq: Activities & Experience

Company Overview. Iraq: Activities & Experience Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with

More information

G-Cloud 7 Service Description Document. Third Party Services. Zendesk Licences 1. Zendesk Services (Consulting) 2. Nexus Pro Licences & Services 3

G-Cloud 7 Service Description Document. Third Party Services. Zendesk Licences 1. Zendesk Services (Consulting) 2. Nexus Pro Licences & Services 3 CONTENTS Zendesk Licences 1 Zendesk Services (Consulting) 2 Nexus Pro Licences & Services 3 GlobalTester Licences & Services 4 Service Clarity 5 Copyright Clearvision-CM 2015 0 ZENDESK LICENCES (HOSTED)

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015 Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business

More information

Establishing and Managing the Schengen Masterlist of CSCAs

Establishing and Managing the Schengen Masterlist of CSCAs Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security Richard.Rinkens@ec.europa.eu

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Deputy Chief Executive Netrust Pte Ltd

Deputy Chief Executive Netrust Pte Ltd ICAO Public Key Directory R Rajeshkumar R Rajeshkumar Deputy Chief Executive Netrust Pte Ltd The trust imperative E-Passports are issued by entities that assert trust Trust depends on the requirements

More information

envision, collaborate, intuit

envision, collaborate, intuit CENTILLION TECHNOLOGY SYSTEMS envision, collaborate, intuit COMPANY BROCHURE About Us was founded by a group of talented individuals who believe in the importance of building long term mutually beneficial

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Position Paper European Citizen Card: One Pillar of Interoperable eid Success

Position Paper European Citizen Card: One Pillar of Interoperable eid Success Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.

More information

Security Model in E-government with Biometric based on PKI

Security Model in E-government with Biometric based on PKI Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute

More information

7. End user consultation to understand stakeholders expectation

7. End user consultation to understand stakeholders expectation Terms of Reference for Preparation of DPR for the e district pilot projects for a State (generally two district per State and not more than three districts per State in any case) The emplaned consultant

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

Request for Proposal

Request for Proposal Request for Proposal Management of ADEC Warehousing Activities RFP No. ADEC/2015/1115 Scope of Work Introduction: The Procurement and Contract Management division (P&C) in Abu Dhabi Education Council (ADEC)

More information

www.zu.ac.ae ABOUT ZAYED UNIVERSITY

www.zu.ac.ae ABOUT ZAYED UNIVERSITY www.zu.ac.ae ABOUT ZAYED UNIVERSITY Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae The rapid progress that the United Arab Emirates (UAE)

More information

DORNIER CONSULTING. Management Consulting - Engineering & Services - Project Management for Metropolitan & Mobility Solutions

DORNIER CONSULTING. Management Consulting - Engineering & Services - Project Management for Metropolitan & Mobility Solutions DORNIER CONSULTING Management Consulting - Engineering & Services - Project Management for Metropolitan & Mobility Solutions Mobility / Traffic & Transport Development of mobility solutions for metropolitan

More information

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE A38-WP/11 17/05/13 International Civil Aviation Organization WORKING PAPER ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE Agenda Item 16: Facilitation and Machine Readable Travel Documents PROPOSAL FOR AN ICAO

More information

ASSAM POWER GENERATION CORPORATION LIMITED

ASSAM POWER GENERATION CORPORATION LIMITED ASSAM POWER GENERATION CORPORATION LIMITED Notice Inviting Expression of Interest for Consultancy in connection of Assam Power Sector Investment Program financed by ADB NIT No. NIT/PMU/05 of 2014-15 Director

More information

Full page passport/document reader Regula model 70X4M

Full page passport/document reader Regula model 70X4M Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses

More information

Transaction Security. Test Tools & Simulators

Transaction Security. Test Tools & Simulators Transaction Security Test Tools & Simulators Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

SRISHTI TECHNICAL SERVICES L.L.C

SRISHTI TECHNICAL SERVICES L.L.C SRISHTI TECHNICAL SERVICES L.L.C Coming under SRISHTI Group. is a team of experienced and qualified skilled specialists that provide expertise in Interior fit outs & BIM along with having a full qualified

More information

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize

More information

International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE

International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE PRESS RELEASE 21 June 2005 International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE Around 80 representatives from 18 European countries,

More information

Synergy between Registered Traveler Programs and Visa-Processing for frequent travelers

Synergy between Registered Traveler Programs and Visa-Processing for frequent travelers Synergy between Registered Traveler Programs and Visa-Processing for frequent travelers Chris Shire, Infineon Technologies UK Ltd., London, UK Mayumi Inada, Infineon Technologies Japan K.K., Tokyo, Japan

More information

Approaches to Legacy System Modernization. April 2016

Approaches to Legacy System Modernization. April 2016 Approaches to Legacy System Modernization April 2016 Approaches to Legacy System Modernization Today s Topics Why Legacy Modernization Projects are Complex Components of a Successful Project Best Practices

More information

ICP BRASIL The Brazilian PKI

ICP BRASIL The Brazilian PKI ICP BRASIL The Brazilian PKI PKI as a National Basic Infrastructure for Electronic Identification Projects in Brazil Mauricio Augusto Coelho Director, PKI Department National Institute of Information Technology

More information

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document

More information

Enterprise Integration Strategy

Enterprise Integration Strategy Emirates Identity Authority Enterprise Integration Strategy Partners in Building UAE's Security & Economy Emirates Identity Authority Enterprise Integration Strategy Real wealth lies in sincere and diligent

More information

C1 India. Leader in e-procurement

C1 India. Leader in e-procurement C1 India Leader in e-procurement About us Industry Leader in e-procurement since 2000 Pioneer in providing e-procurement as SaaS Implemented some of world s largest e-procurement systems One of the fastest

More information

TERMS OF REFERENCE (ToR)

TERMS OF REFERENCE (ToR) TERMS OF REFERENCE (ToR) Consultancy services for Monitoring the Implementation of Computerized Integrated Financial Management Information System (IFMIS) of BREB & PBSs for Institutional Strengthening

More information

Journey Towards International Benchmarking: A Story about Private Schools in the United Arab Emirates (UAE)

Journey Towards International Benchmarking: A Story about Private Schools in the United Arab Emirates (UAE) Journey Towards International Benchmarking: A Story about Private Schools in the United Arab Emirates (UAE) Rabaa AlSumaiti- Knowledge & Human Development Authority Dubai- United Arab Emirates Education

More information

European Electronic Identity Practices Country Update of Portugal

European Electronic Identity Practices Country Update of Portugal European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations

More information

Moving to the third generation of electronic passports

Moving to the third generation of electronic passports Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004 Department of Veteran Affairs Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004 Background Smart Cards are a subset of a larger Authentication and Authorization Infrastructure

More information

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory

PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory Procedures for the ICAO Public Key Directory last modification final 1/13 SECTION 1 INTRODUCTION 1.1 As part of the MRTD initiative by ICAO, the Participants will upload to and download from the PKD, their

More information

Security Training International GmbH

Security Training International GmbH Security Training International GmbH www.sti-training.com We Train Your Security STI has decades of experience and competence in the aviation security business and this is reflected in our broad range

More information

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions. Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,

More information

End to End IT Solutions. our purpose. to bring out. the best in. everyone. we work with. our values. Simplicity. Common Sense. Security.

End to End IT Solutions. our purpose. to bring out. the best in. everyone. we work with. our values. Simplicity. Common Sense. Security. Alpha Datacorporate profile working telecommunications radio enterprise audio visual infrastrusture cabling networking telecommunications radio enterprise audio erprise audio visual infrastrusture cabling

More information

The Contactless- NFC Project of ATM Barcelona

The Contactless- NFC Project of ATM Barcelona 1 The Contactless- NFC Project of ATM Barcelona Carme Fabregas Head of IT Systems cfabregas@atm.cat Working Group on NFC ticketing Barcelona, 6-7 September 2012 2 PRELIMINARY CONSIDERATIONS In 2001, a

More information

Security Training International GmbH

Security Training International GmbH Security Training International GmbH www.sti-training.com We Train Your Security STI has decades of experience and competence in the aviation security business and this is reflected in our broad range

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik

More information

Operational and Technical security of Electronic Passports

Operational and Technical security of Electronic Passports European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal

More information

Abu Dhabi, United Arab Emirates COMPANY PROFILE

Abu Dhabi, United Arab Emirates COMPANY PROFILE Abu Dhabi, United Arab Emirates COMPANY PROFILE INDEX Introduction Letter Company Overview Licenses Project Reference List Contacts Subject: Introduction to Dynamic Security Est. Dear Sir, We would like

More information

The Halifax Group is an IT solution provider, offering a single or all of the following professional services to satisfy client requirements.

The Halifax Group is an IT solution provider, offering a single or all of the following professional services to satisfy client requirements. The Halifax Group is a multi-service Information Technology (IT) Management consulting company. Since 1988 we have consistently delivered high quality solutions to our customers in government and several

More information

Challenges and Role of Standards in Building Interoperable e-governance Solutions

Challenges and Role of Standards in Building Interoperable e-governance Solutions 24 Compendium of e-governance Initiatives CHAPTER in India 3 Challenges and Role of Standards in Building Interoperable e-governance Solutions Renu Budhiraja Director e-governance Group, Department of

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT

More information

PKD Board ICAO PKD unclassified B-Tec/36. Regulations for the ICAO Public Key Directory

PKD Board ICAO PKD unclassified B-Tec/36. Regulations for the ICAO Public Key Directory Regulations for the ICAO Public Key Directory last modification final 1/8 SECTION 1 AUTHORITY These Regulations are issued by ICAO on the basis of Paragraph 3 b) of the Memorandum of Understanding (MoU)

More information

Arrowhead - Smart integrated production management

Arrowhead - Smart integrated production management 1 Arrowhead - Smart integrated production management Programvara för konkurrenskraft II - Innovativ mjukvara satt i system Arrowhead Process and energy system automation 4 years project 68 M 79 partners

More information

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services

More information

CHAPTER 9. DEVELOPING IT SY STEM S Bringing IT System s to Life

CHAPTER 9. DEVELOPING IT SY STEM S Bringing IT System s to Life CHAPTER 9 DEVELOPING IT SY STEM S Bringing IT System s to Life 9-2 Introduction Every Organization Is Using Information Technology But IT systems don t magically appear. Organizations spend billions of

More information

A Secure and Open Solution for Seamless Transit Systems

A Secure and Open Solution for Seamless Transit Systems A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing

More information

Al Fajer Commercial Brokerage LLC has been in the forefront in delivering innovative and dynamic ideas to market customer's products.

Al Fajer Commercial Brokerage LLC has been in the forefront in delivering innovative and dynamic ideas to market customer's products. Al Fajer Commercial Brokerage LLC has been in the forefront in delivering innovative and dynamic ideas to market customer's products. The steady growth and confidence in meeting increasingly sophisticated

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Company Profile. Building Automation / Management system: Capabilities: Supply,Testing and Commissioning

Company Profile. Building Automation / Management system: Capabilities: Supply,Testing and Commissioning Company Profile KVN Technical services LLC is based in Dubai (UAE). The company's principal areas of business interests include Building Management System (BMS), Technical project management, Supply installation

More information

REQUEST FOR PROPOSALS For Incident Management System (IMS)- IT System

REQUEST FOR PROPOSALS For Incident Management System (IMS)- IT System Health Authority Abu Dhabi REQUEST FOR PROPOSALS For Incident Management System (IMS)- IT System RFP no.: 15/ G/HAAD/PT/2009 Bid issue date: August 18,2009 Deadline for submission of proposals: September

More information

Payment and Identification Secure solutions

Payment and Identification Secure solutions Payment and Identification Secure solutions ST at a glance STMicroelectronics is a global leader in the semiconductor market serving customers across the spectrum of sense & power, automotive and embedded

More information

BiSPI Conformance Testing

BiSPI Conformance Testing Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt

More information

successstory Security for Diplomacy High Security for Embassy Networks

successstory Security for Diplomacy High Security for Embassy Networks successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways

More information

Managing Change Using Enterprise Architecture

Managing Change Using Enterprise Architecture Managing Change Using Enterprise Architecture Abdallah El Kadi, PMP, CISSP, TOGAF Chief Executive Officer, Shift Technologies Managing Director, Open Group Arabia Email: Abdallah.Kadi@awrostamani.com Website:

More information

CONTINUED COMMITMENT. A Division of MVP Group

CONTINUED COMMITMENT. A Division of MVP Group MVP Tech, established in 2003, is a specialized security and technology systems integrator representing leading products from various U.S, European, South African and Australian product manufacturers.

More information

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid ID WORLD Abu Dhabi 18-19 March 2012 Secure ID in the Digital World Dan Butnaru Product Manager Keynectis End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid Organized

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

Artak Chobanyan AREAS OF EXPERTISE PERSONAL SUMMARY

Artak Chobanyan AREAS OF EXPERTISE PERSONAL SUMMARY AREAS OF EXPERTISE PERSONAL SUMMARY Procurement specialist with good experience in procurement organization, contract management, project management, using international standards and conditions. IT project

More information

Eight key steps which help ensure a successful data migration project: A white paper for inspection management professionals

Eight key steps which help ensure a successful data migration project: A white paper for inspection management professionals Eight key steps which help ensure a successful data migration project: A white paper for inspection management professionals Data migration defined Data migration is the selection, preparation, extraction,

More information

Product Lifecycle Management (PLM) Service Providers. On Leading PLM Solutions

Product Lifecycle Management (PLM) Service Providers. On Leading PLM Solutions Product Lifecycle Management (PLM) Service Providers On Leading PLM Solutions Domain, Technology & Product Specific PLM Consulting Group Your Preferred Technology Consulting Partner Value Proposition One

More information

Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description

Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description Annexure-A (Qualifications & Job Description with Roles & Responsibilities) Job Description Position / Designation Program Manager Level / Rank Principal Consultant Educational Qualifications Experience

More information

Model-based Testing of Automotive Systems

Model-based Testing of Automotive Systems Model-based Testing of Automotive Systems Eckard Bringmann and Andreas Krämer ICST 08 Presented by Julia Rubin on November 21, 2012 Multidisciplinary Business 2 Supply Chain of Components 3 Innovation

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Mineral Exploration Corporation Limited (A Govt. of India Enterprise) A Miniratna PSE. Engagement of ERP Consultant on Contract Basis

Mineral Exploration Corporation Limited (A Govt. of India Enterprise) A Miniratna PSE. Engagement of ERP Consultant on Contract Basis Mineral Exploration Corporation Limited (A Govt. of India Enterprise) A Miniratna PSE Dr.Babasaheb Ambedkar Bhavan, Seminry Hills, NAGPUR 440006 Engagement of ERP Consultant on Contract Basis Mineral Exploration

More information

CA Process Automation for System z 3.1

CA Process Automation for System z 3.1 PRODUCT SHEET CA Process Automation for System z CA Process Automation for System z 3.1 CA Process Automation for System z helps enable enterprise organizations to design, deploy and administer automation

More information

DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. [CBP Dec. No. 16-04]

DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. [CBP Dec. No. 16-04] This document is scheduled to be published in the Federal Register on 02/16/2016 and available online at http://federalregister.gov/a/2016-03030, and on FDsys.gov 9111-14 DEPARTMENT OF HOMELAND SECURITY

More information

THE CITY OF NORTH LAS VEGAS REQUEST FOR INFORMATION FOR ASSET TRACKING & INVENTORY MANAGEMENT RFI# 06-30-09-01 RELEASE DATE: JUNE 30, 2009

THE CITY OF NORTH LAS VEGAS REQUEST FOR INFORMATION FOR ASSET TRACKING & INVENTORY MANAGEMENT RFI# 06-30-09-01 RELEASE DATE: JUNE 30, 2009 THE CITY OF NORTH LAS VEGAS REQUEST FOR INFORMATION FOR ASSET TRACKING & INVENTORY MANAGEMENT RFI# 06-30-09-01 RELEASE DATE: JUNE 30, 2009 RESPONSES TO BE RECEIVED BY JULY 21, 2009 2:00 P.M. RETURN TO

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

2003 Patricia Ensworth Page 1

2003 Patricia Ensworth Page 1 1 1 Sample software development project 2 1.1 Start project 3 1.2 Initiation phase 4 1.2.1 Develop project charter 5 1.2.2 Project charter approved 6 1.3 Planning phase 7 1.3.1 Product activities 8 1.3.1.1

More information

CASE 8: Procurement of public key infrastructure

CASE 8: Procurement of public key infrastructure CASE 8: Procurement of public key infrastructure Uni. Athens / CERES Country / region Netherlands Short description This is the case of an integrated central e-government infrastructure for issuing and

More information

European Electronic Identity Practices

European Electronic Identity Practices European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary

More information

Security Services and Solutions. Full security, from planning through implementation to operation.

Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Seamless end-to-end service provision. T-Systems supports its customers

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

A general overview for the Air and Space Law Master Program (L.L.M)

A general overview for the Air and Space Law Master Program (L.L.M) A general overview for the Air and Space Law Master Program (L.L.M) Dr. Mahmoud Fayyad Faculty of law, University of Sharjeh Presenter Title ICAO / UNOOSA Symposium 15 17 March 2016, Abu Dhabi, United

More information

The International Healthcare Sector Opportunities for Virginia Defense Companies. Virginia Economic Development Partnership

The International Healthcare Sector Opportunities for Virginia Defense Companies. Virginia Economic Development Partnership The International Healthcare Sector Opportunities for Virginia Defense Companies Virginia Economic Development Partnership Summary of Report This report is focused on five international healthcare markets:

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Facts about the new identity card

Facts about the new identity card Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader

More information

Application Services Portfolio

Application Services Portfolio Application Services Portfolio Overview Injazat Application Services offer end-to-end solutions that align Enterprises business objectives with their IT goals. Our solutions focus on implementing, building

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information