FedICT. Carte d identité électronique (BELPIC) egovernment. Architecture et stratégie. E-government. Simplification administrative
|
|
- Abner May
- 8 years ago
- Views:
Transcription
1 Carte d identité électronique () FedICT egovernment Ir. Olivier LIBON. Forum Telecom Liège, 27 Mars 2003 E-government Architecture et stratégie Simplification administrative Citoyens Entreprises Fonctionnaires Front-Office: Principe de la collection unique des données Portail Fédéral & FedMAN UME (Unified Messaging Engine) Back-Office: Principe des Sources Authentiques Banque carrefour des entreprises Registre National (FedPKI) PORTAIL UME BCE COMMUNICATION APPLICATION INTEGRATION Etat des projets clés (*) Etat des projets clés FEDMAN 1st phase FedMAN rounded off 16 Network Access Points 2nd phase planned January 2003 UME UME v2 delivered Stress testing : December 2002 Production: January 2003 CBE CBE in production on 2nd January 2003 Transition periode enterprise numbers Portal Static portal First version finished Open limited audience (FedMAN) : 18 November 2002 Release big audience: 27 November 2002 Transactional portal: Due Dilligence rounded off Design and development phase launched Delivery : March 2003 (*) The mentioned data are estimations of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors.
2 : BELgian electronic Personal Identity Card Belgian ELectronic Personal Identity Card concept But Aspects visuels Donner à chaque citoyen belge une carte d identité électronique lui permettant de: s authentifier (preuve d identité) signer électroniquement (outil de signature) identification visuelle du porteur D un point de vue visuel: identique à la carte d identité actuelle : le nom de famille les deux premier Prénoms la première lettre du troisième prénom la nationalité le lieu et la date de naissance le sexe les dates de début et fin de validité le numéro de carte la photo la signature le numéro de registre national l adresse (jusque 31/12/2003) le lieu de délivrance la signature de l autorité Aspects électroniques Autentification Identification électronique du porteur D un point de vue électronique: la puce contient la même information que ce qui est imprimé sur la carte à l exception de: la signature du porteur qui est remplacée par une paire de clés & certificats (d autentification et de signature) la signature de l autorité est remplacée par une chaîne de certificats électroniques le protections visuelles qui sont remplacées par des protections électroniques crytpographiques (temporairement) pas de clé d encryption pas de portefeuille électronique pas d informations biométriques conforme à la directive européenne 1999/93/EC Applications: site web, bibliothèque, park à containers,
3 VRK Meikäläinen Matti Bull VRK Meikäläinen Matti Bull Signature X.509 v3 certificate CM - Card Manufacturer Production Process Distribution Process (5) (5) (4) CM/CP/CI (4) CM/CP/CI (10a2) (6) (8) (10a2) (6) (8) (10a1) (3) National Register (9) (7) (10a1) (3) Rijksregister (9) (7) Municipality Gemeente (1) The municipalities De (10b) De Gemeenten (1) (10b) Face to face identification PIN & PUK1-code Face to face identification PIN & PUK1-code (2) (12) (11) (2) (12) (11) (13) (13) Personlization Process CA - ificate Authority
4 FedPKI EIC and PKI PKI is a transparent frameworkof services, products and facilities to facilitate securization, i.e. the crucial keystonefor e- government FedPKI = PKI for civil servants and machines involved in the distribution of the electronic identity card Part project Same PKI as for citizen (simple migration from civil servants card to electronic identity card) Free use and free verification of identity certificate for relations with authorities Possibility of separate use of identity and attribute certificates Private key for digital signature securized with PIN Use of open technical standards Card Specifications Chip specifications Standard - ISO/IEC 7816 Format & Physical Characteristics Bank Card (ID1) Standard Contacts & Signals RST,GND,CLK,Vpp,Vcc, I/O Standard Commands & Query Language (APDU) Chip characteristics: Cryptoflex JavaCard 32K CPU (processor): 16 bit Micro-controller Crypto-processor: 1100 bit Crypto-Engine (RSA computation) 112 bit Crypto-Accelerator (DES computation) ROM (OS): 136 kb (GEOS Java Virtual Machine) EEPROM (Applic + Data): 32 KB (Cristal Applet) RAM (memory): 5 KB I/O Crypto ROM (DES,RSA) (Operating System) CPU EEPROM (File System= applications + data) RAM (Memory) GEOS JVM CRISTAL Applet ID data, Keys, s. Data specifications Technical specifications BelPIC Card Key Auth Key Sign Key Auth Sign CA Root Directory Structure (PKCS#15) Dir (BelPIC): certificates & keys (PIN code protected) standard format (to be used by generic applications) ID Microsoft CryptoAPI ( Windows) PKCS#11 ( UNIX/Linux & MacOS) ID Dir (ID): contains full identity information ADR first name, last name, etc. address PIC picture proprietary format (to be used by dedicated applications only) Keys and certificates private and public keyca : 2048 bits private and public key citizen: 1024 bits Signatures put via RSA with SHA-1 all certificates are conform to X.509 v3
5 Role, Common KeyPair Object Signing Role, Common KeyPair Object Signing CA hierarchy CA hierarchy GlobalSign GlobalSign Belgium Self- Signed Belgium RootSigned Belgium Self- Signed Common KeyPair Belgium RootSigned Administration CA Citizen CA Government CA Interface Signing Auth. SSL Server, Administration CA Citizen CA Government CA Role, Interface Signing Auth. SSL Server, Object Signing CA hierarchy ificate specifications Belgium Self- Signed Administration CA Citizen CA Government CA Interface Signing Auth. GlobalSign Belgium RootSigned SSL Server, Belgium Root CA Citizen Citizen CA CA Auth Sign Crypt Citizen s certificates & keys Authentication ificate & key pair (1024 bits) provide strong authentication (access control) web site authentication single sign-on (login) Signature ificate & key pair (1024 bits) provide non repudiation (electronic signature equivalent to handwritten signature) Document Signing Form Signing (Encryption ificate & key pair) foreseen at a later stage private key backup/archiving MiddleWare specifications Windows Generic Applics MS-CSP (Microsoft interface) PIN (pin logic library) DLL (C-reader DLL) Non Win Generic Applics PKCS#11 (ificate& Keys Management) BelPIC Specific Applics PKCS#15 OpenSC (Generic SC Interface) PC/SC (Generic SC ReaderInterface) Driver (Specific SC Reader Interface) Card & Reader Software Card MiddleWare PKCS#15 ID specific applications Card is accessed as a simple file system No key management possible (no PIN) for belgian police, post, banks, etc PKCS#11 Generic applications Only keys & s available via PKCS#11 API allows authentication (& signature) for Netscape, Linux, Unix, etc MS-CSP Windows applications Only keys & certs available via MSCryptoAPI allows authentication (& signature) for Microsoft Explorer, Outlook, etc Reader Driver/Firmware most part is generic (orange part) small part is specific (green part) PROJECT I/O
6 Legal framework Project Electronic signature (9 July 2001) Implementation of the European Directive 1999/93/EC Law on National Register and identity cards Simplification of the procedure to gain access to the information data from the National Register and to use the identification number Introduction electronic identity card Two parallel projects : infrastructure central : NRN decentral : cities and municipalities electronic identity card production, personalization, initialization and distribution of electronic identity card Delivery of certification services Involvement Fedict : Project reporting CA part To coordinate and elaborate applications using the EIC Control consistency with the federal portal environment Planning (*) A card and then? KICK OFF Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep : development, testing infrastructure GO/NO GO 2 : analyse, testing, card production 3 : analyse, testing certification services 4 : start pilot 11 municipalities (Borsbeek, Leuven, Tongeren, Jabbeke, Geraardsbergen, Lasne, Seneffe, Seraing, Marche-en- Famenne, Rochefort, Sint-Pieters-Woluwe) (*) This planning is an estimation of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors. 3 18/03 4 On the short term : e-government Examples : Tax declaration Vehicle registration (DIV) On the long term : extra possibilities such as financial sector (banks) health sector (SIS) transport (tickets, parking, ) e-security (SSO, login, ) Ultimate aim: the identity card is the only card in the wallet of the Belgian citizens.
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
More informationOECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationThe Belgian e-id: hacker vs developer
OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationEXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
More informationRVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationDraft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
More informationSmart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
More informationStandardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI
More informationUsing PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
More informationIdentity Management and eid Integration
Identity Management and eid Integration Luc Wijns > Principal Architect > Security Ambassador & CISSP > Sun Microsystems Agenda Sun Identity Management Integration of the eid Card > Authentication & Signature
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationSecure Messaging Challenge Technical Demonstration
Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure
More informationE-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
More informationWeb Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
More informationPage 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
More informationThailand Business visa Application for citizens of Hong Kong living in Manitoba
Thailand Business visa Application for citizens of Hong Kong living in Manitoba Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationGlobal eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationEuropean Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
More informationCongo Republic Tourist visa Application
Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa
More informationSupporting Smart Cards in UEFI
presented by Supporting Smart Cards in UEFI UEFI PlugFest March 18-22, 2013 Presented by Jean Lusetti (Gemalto) Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Who is Gemalto?
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationSmart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
More informationSecurity Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
More informationMoving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
More informationCRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
More informationLinux A multi-purpose executive support for civil avionics applications?
August 2004 Serge GOIFFON Pierre GAUFILLET AIRBUS France Linux A multi-purpose executive support for civil avionics applications? Civil avionics software context Main characteristics Required dependability
More informationThe Ultimate Authentication Technology
"USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology The Digital Identity Paradigm Network security and
More informationFEITIAN PKI Authentication Token. epass2003 with FIPS 140-2 Cer tification
FEITIAN PKI Authentication Token epass2003 with FIPS 140-2 Cer tification Document Digital Signature Email signature and encryption Windows Smart Card Logon Remote VPN Access Secure Online Transaction
More informationASA 8.x: Renew and Install the SSL Certificate with ASDM
ASA 8.x: Renew and Install the SSL Certificate with ASDM Document ID: 107956 Contents Introduction Prerequisites Requirements Components Used Conventions Procedure Verify Troubleshoot How to copy SSL certificates
More informationPROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
More informationCongo Republic Tourist visa Application for citizens of Paraguay living in Alberta
Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time
More information1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A
www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module
More informationPKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
More informationDemocratic Republic of the Congo Tourist visa Application
Democratic Republic of the Congo Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Democratic
More informationGabon Tourist visa Application for citizens of Canada living in Alberta
Gabon Tourist visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
More informationEgypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
More informationPage 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file
1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer
More informationBenin Business visa Application
Benin Business visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Benin business visa checklist Filled
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationCertificate of Incorporation Certificat de constitution
Request ID: 014752622 Province of Ontario Date Report Produced: 2012/10/30 Demande n : Province de ('Ontario Document produit le: Transaction ID: 0491 1 1 718 Ministry of Government Services Time Report
More informationIQS Identity and Access Management
IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination
More informationSecure Enterprise Applications enabled by SETECS Security Infrastructure Products
Secure Enterprise Applications enabled by Security Infrastructure 1. Secure E mail/secure Web (SSL) 2. Secure Web Services: Identity Management, Single Sign On, and Web Authorization 3. Public Key Infrastructure
More informationHow To Get A Kongo Republic Tourist Visa
Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationJBoss Enterprise Middleware. The foundation of your open source middleware reference architecture
JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Red Hat open source solution stack changes the economics of IT infrastructure Offers proprietary replacements
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More information24x7 Help Desk Services Questions & Answers for RFP 40016_21030705
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 1. What % of the call volume that was listed in the RFP was related to LMS (BB and Moodle) support? See Table 5 2. What is the number
More informationOffice of the Secretary of State
General Office Overview Assembly Government Affairs, February 25, 2011 Office of the Secretary of State Commercial Recordings Securities Notary Division Elections State Business License Domestic Partnership/Athletes
More informationSTUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011)
Institut d Administration des Entreprises SOCRATES/ERASMUS APPLICATION DEADLINE : 20th November 2010 OTHER (Autre) STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire
More informationHow To Create A Global Signer For The Internet Of Everything
Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the
More informationFRANCE (FRANCE) : Trusted List
ANCE (ANCE) : Trusted List Tsl Id: ID0001 Valid until nextupdate value: 2015-12-28T23:00:00Z TSL signed on: 2015-06-30T09:08:50Z PDF generated on: Tue Jun 30 11:10:36 CEST 2015 ANCE (ANCE) - Trusted List
More information2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc
July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationSolaris 10 Documentation README
Solaris 10 Documentation README Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0550 10 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa
More informationListe d'adresses URL
Liste de sites Internet concernés dans l' étude Le 25/02/2014 Information à propos de contrefacon.fr Le site Internet https://www.contrefacon.fr/ permet de vérifier dans une base de donnée de plus d' 1
More information2 RENSEIGNEMENTS CONCERNANT L ASSURÉ SI CELUI-CI N EST PAS LE REQUÉRANT INFORMATION CONCERNING THE INSURED PERSON IF OTHER THAN THE APPLICANT
SÉCURITÉ SOCIALE SOCIAL SECURITY ACCORD DU 9 FÉVRIER 1979 ENTRE LA FRANCE ET LE CANADA AGREEMENT OF FEBRUARY 9, 1979 BETWEEN FRANCE AND CANADA Formulaire FORM SE 401-06 INSTRUCTION D UNE DEMANDE DE PENSION
More informationEffective use of Digital Identities and ID cards in a Government Environment
Effective use of Digital Identities and ID cards in a Government Environment Bavo De Ridder Principal Information Security Consultant Competence Leader IAM Erik R. van Zuuren Principal Information Security
More informationApplication Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
More informationSophos (Schweiz) AG May 2012
Sophos (Schweiz) AG May 2012 Agenda 08:30 Accueil 08:45 Sécurité complète et programme de partenariat 09:15 Update & Roadmap produits, avec une démonstration live du Sophos UTM V9 10:00 Pause café 10:15
More informationTechnical Service Bulletin
Technical Service Bulletin FILE CONTROL CREATED DATE MODIFIED DATE FOLDER OpenDrive 02/05/2005 662-02-25008 Rev. : A Installation Licence SCO sur PC de remplacement English version follows. Lors du changement
More informationCameroon Visitor visa Application for citizens of Canada living in Alberta
Cameroon Visitor visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
More informationWindows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
More informationGabon Business visa Application for citizens of Canada living in Alberta
Gabon Business visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationTanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma. DNS The Domain Name System
Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma DNS The Domain Name System RFC 1034 Network Working Group P. Mockapetris Request for Comments: 1034 ISI Obsoletes: RFCs 882, 883, 973 November
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationEnabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
More information1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks Va avec 6526491
Les brevets CELL 14 décembre 2006 1 ARCHITECTURE GENERALE 1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks 6526491 2-6526491 25-févr-03 Memory protection system
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationStep-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
More informationCameroon Tourist visa Application for citizens of Tahiti living in Alberta
Cameroon Tourist visa Application for citizens of Tahiti living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
More informationIntel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
More informationThe OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
More informationEnhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
More informationSCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM
SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM APPLICATION FORM / FORMULAIRE DE CANDIDATURE Applications close 4 November 2015/ Date de clôture de l appel à candidatures 4 e novembre
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationCameroon Tourist visa Application for citizens of Maldives living in Alberta
Cameroon Tourist visa Application for citizens of Maldives living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for
More informationFMCS SINGLE SIGN ON Overview and Installation Guide. November 2014. SSO-MNL-v3.0
FMCS SINGLE SIGN ON Overview and Installation Guide November 2014 SSO-MNL-v3.0 CONTENTS Introduction... 3 About Single Sign On... 3 Application Architecture... 4 Implementation Checklist... 5 Component...
More informationSymantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015
2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics
More informationCS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
More informationThe State as a Platform and France Connect
The State as a Platform and France Connect or, a new approach to the design of digital public services https://references.modernisation.gouv.fr/appel-public-%c3%a0-commentaires-epfc Service Architecture
More informationASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure
More informationWiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationCABINET 9 th February 2006. Report of the Director of Partnerships and Customer Services
CABINET 9 th February 2006 Report of the Director of Partnerships and Customer Services ITEM 11 CRM DEVELOPMENT Purpose of the Report To seek approval to the replacement for the Council s Customer Relationship
More informationThe new French regulation on gaming: Anything new in terms of payment?
[Prénom Nwww.ulys.net The new French regulation on gaming: Anything new in terms of payment? Etienne Wery Attorney at law at Brussels and Paris Bars Senior lecturer at university etienne.wery@ulys.net
More informationIntegrate 'Oracle Forms', 'Oracle Reports', 'Oracle
Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle Discoverer' with Oracle Single Sign On', 'Oracle Internet Directory' and 'Virtual Private Database' for the Luxembourg communities. How to make sure
More informationopennms reporting generation tool
opennms reporting generation tool Juan Pedro Escalona DevOps Southampton, UK - 2014 Juan Pedro Escalona DevOps / Systems Administrator with over 6 years experience administering different OS, network systems
More informationStudy on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile
Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More information