FedICT. Carte d identité électronique (BELPIC) egovernment. Architecture et stratégie. E-government. Simplification administrative
|
|
|
- Abner May
- 10 years ago
- Views:
Transcription
1 Carte d identité électronique () FedICT egovernment Ir. Olivier LIBON. Forum Telecom Liège, 27 Mars 2003 E-government Architecture et stratégie Simplification administrative Citoyens Entreprises Fonctionnaires Front-Office: Principe de la collection unique des données Portail Fédéral & FedMAN UME (Unified Messaging Engine) Back-Office: Principe des Sources Authentiques Banque carrefour des entreprises Registre National (FedPKI) PORTAIL UME BCE COMMUNICATION APPLICATION INTEGRATION Etat des projets clés (*) Etat des projets clés FEDMAN 1st phase FedMAN rounded off 16 Network Access Points 2nd phase planned January 2003 UME UME v2 delivered Stress testing : December 2002 Production: January 2003 CBE CBE in production on 2nd January 2003 Transition periode enterprise numbers Portal Static portal First version finished Open limited audience (FedMAN) : 18 November 2002 Release big audience: 27 November 2002 Transactional portal: Due Dilligence rounded off Design and development phase launched Delivery : March 2003 (*) The mentioned data are estimations of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors.
2 : BELgian electronic Personal Identity Card Belgian ELectronic Personal Identity Card concept But Aspects visuels Donner à chaque citoyen belge une carte d identité électronique lui permettant de: s authentifier (preuve d identité) signer électroniquement (outil de signature) identification visuelle du porteur D un point de vue visuel: identique à la carte d identité actuelle : le nom de famille les deux premier Prénoms la première lettre du troisième prénom la nationalité le lieu et la date de naissance le sexe les dates de début et fin de validité le numéro de carte la photo la signature le numéro de registre national l adresse (jusque 31/12/2003) le lieu de délivrance la signature de l autorité Aspects électroniques Autentification Identification électronique du porteur D un point de vue électronique: la puce contient la même information que ce qui est imprimé sur la carte à l exception de: la signature du porteur qui est remplacée par une paire de clés & certificats (d autentification et de signature) la signature de l autorité est remplacée par une chaîne de certificats électroniques le protections visuelles qui sont remplacées par des protections électroniques crytpographiques (temporairement) pas de clé d encryption pas de portefeuille électronique pas d informations biométriques conforme à la directive européenne 1999/93/EC Applications: site web, bibliothèque, park à containers,
3 VRK Meikäläinen Matti Bull VRK Meikäläinen Matti Bull Signature X.509 v3 certificate CM - Card Manufacturer Production Process Distribution Process (5) (5) (4) CM/CP/CI (4) CM/CP/CI (10a2) (6) (8) (10a2) (6) (8) (10a1) (3) National Register (9) (7) (10a1) (3) Rijksregister (9) (7) Municipality Gemeente (1) The municipalities De (10b) De Gemeenten (1) (10b) Face to face identification PIN & PUK1-code Face to face identification PIN & PUK1-code (2) (12) (11) (2) (12) (11) (13) (13) Personlization Process CA - ificate Authority
4 FedPKI EIC and PKI PKI is a transparent frameworkof services, products and facilities to facilitate securization, i.e. the crucial keystonefor e- government FedPKI = PKI for civil servants and machines involved in the distribution of the electronic identity card Part project Same PKI as for citizen (simple migration from civil servants card to electronic identity card) Free use and free verification of identity certificate for relations with authorities Possibility of separate use of identity and attribute certificates Private key for digital signature securized with PIN Use of open technical standards Card Specifications Chip specifications Standard - ISO/IEC 7816 Format & Physical Characteristics Bank Card (ID1) Standard Contacts & Signals RST,GND,CLK,Vpp,Vcc, I/O Standard Commands & Query Language (APDU) Chip characteristics: Cryptoflex JavaCard 32K CPU (processor): 16 bit Micro-controller Crypto-processor: 1100 bit Crypto-Engine (RSA computation) 112 bit Crypto-Accelerator (DES computation) ROM (OS): 136 kb (GEOS Java Virtual Machine) EEPROM (Applic + Data): 32 KB (Cristal Applet) RAM (memory): 5 KB I/O Crypto ROM (DES,RSA) (Operating System) CPU EEPROM (File System= applications + data) RAM (Memory) GEOS JVM CRISTAL Applet ID data, Keys, s. Data specifications Technical specifications BelPIC Card Key Auth Key Sign Key Auth Sign CA Root Directory Structure (PKCS#15) Dir (BelPIC): certificates & keys (PIN code protected) standard format (to be used by generic applications) ID Microsoft CryptoAPI ( Windows) PKCS#11 ( UNIX/Linux & MacOS) ID Dir (ID): contains full identity information ADR first name, last name, etc. address PIC picture proprietary format (to be used by dedicated applications only) Keys and certificates private and public keyca : 2048 bits private and public key citizen: 1024 bits Signatures put via RSA with SHA-1 all certificates are conform to X.509 v3
5 Role, Common KeyPair Object Signing Role, Common KeyPair Object Signing CA hierarchy CA hierarchy GlobalSign GlobalSign Belgium Self- Signed Belgium RootSigned Belgium Self- Signed Common KeyPair Belgium RootSigned Administration CA Citizen CA Government CA Interface Signing Auth. SSL Server, Administration CA Citizen CA Government CA Role, Interface Signing Auth. SSL Server, Object Signing CA hierarchy ificate specifications Belgium Self- Signed Administration CA Citizen CA Government CA Interface Signing Auth. GlobalSign Belgium RootSigned SSL Server, Belgium Root CA Citizen Citizen CA CA Auth Sign Crypt Citizen s certificates & keys Authentication ificate & key pair (1024 bits) provide strong authentication (access control) web site authentication single sign-on (login) Signature ificate & key pair (1024 bits) provide non repudiation (electronic signature equivalent to handwritten signature) Document Signing Form Signing (Encryption ificate & key pair) foreseen at a later stage private key backup/archiving MiddleWare specifications Windows Generic Applics MS-CSP (Microsoft interface) PIN (pin logic library) DLL (C-reader DLL) Non Win Generic Applics PKCS#11 (ificate& Keys Management) BelPIC Specific Applics PKCS#15 OpenSC (Generic SC Interface) PC/SC (Generic SC ReaderInterface) Driver (Specific SC Reader Interface) Card & Reader Software Card MiddleWare PKCS#15 ID specific applications Card is accessed as a simple file system No key management possible (no PIN) for belgian police, post, banks, etc PKCS#11 Generic applications Only keys & s available via PKCS#11 API allows authentication (& signature) for Netscape, Linux, Unix, etc MS-CSP Windows applications Only keys & certs available via MSCryptoAPI allows authentication (& signature) for Microsoft Explorer, Outlook, etc Reader Driver/Firmware most part is generic (orange part) small part is specific (green part) PROJECT I/O
6 Legal framework Project Electronic signature (9 July 2001) Implementation of the European Directive 1999/93/EC Law on National Register and identity cards Simplification of the procedure to gain access to the information data from the National Register and to use the identification number Introduction electronic identity card Two parallel projects : infrastructure central : NRN decentral : cities and municipalities electronic identity card production, personalization, initialization and distribution of electronic identity card Delivery of certification services Involvement Fedict : Project reporting CA part To coordinate and elaborate applications using the EIC Control consistency with the federal portal environment Planning (*) A card and then? KICK OFF Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep : development, testing infrastructure GO/NO GO 2 : analyse, testing, card production 3 : analyse, testing certification services 4 : start pilot 11 municipalities (Borsbeek, Leuven, Tongeren, Jabbeke, Geraardsbergen, Lasne, Seneffe, Seraing, Marche-en- Famenne, Rochefort, Sint-Pieters-Woluwe) (*) This planning is an estimation of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors. 3 18/03 4 On the short term : e-government Examples : Tax declaration Vehicle registration (DIV) On the long term : extra possibilities such as financial sector (banks) health sector (SIS) transport (tickets, parking, ) e-security (SSO, login, ) Ultimate aim: the identity card is the only card in the wallet of the Belgian citizens.
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
OECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
The Belgian e-id: hacker vs developer
OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Draft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise [email protected] 703-264-5103 1 Agenda A View of Apples PKI
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
Identity Management and eid Integration
Identity Management and eid Integration Luc Wijns > Principal Architect > Security Ambassador & CISSP > Sun Microsystems Agenda Sun Identity Management Integration of the eid Card > Authentication & Signature
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
Secure Messaging Challenge Technical Demonstration
Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure
E-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
Thailand Business visa Application for citizens of Hong Kong living in Manitoba
Thailand Business visa Application for citizens of Hong Kong living in Manitoba Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
Congo Republic Tourist visa Application
Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa
Supporting Smart Cards in UEFI
presented by Supporting Smart Cards in UEFI UEFI PlugFest March 18-22, 2013 Presented by Jean Lusetti (Gemalto) Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Who is Gemalto?
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
Linux A multi-purpose executive support for civil avionics applications?
August 2004 Serge GOIFFON Pierre GAUFILLET AIRBUS France Linux A multi-purpose executive support for civil avionics applications? Civil avionics software context Main characteristics Required dependability
FEITIAN PKI Authentication Token. epass2003 with FIPS 140-2 Cer tification
FEITIAN PKI Authentication Token epass2003 with FIPS 140-2 Cer tification Document Digital Signature Email signature and encryption Windows Smart Card Logon Remote VPN Access Secure Online Transaction
ASA 8.x: Renew and Install the SSL Certificate with ASDM
ASA 8.x: Renew and Install the SSL Certificate with ASDM Document ID: 107956 Contents Introduction Prerequisites Requirements Components Used Conventions Procedure Verify Troubleshoot How to copy SSL certificates
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta
Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time
1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A
www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module
PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
Democratic Republic of the Congo Tourist visa Application
Democratic Republic of the Congo Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Democratic
Gabon Tourist visa Application for citizens of Canada living in Alberta
Gabon Tourist visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
Egypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file
1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Department of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA [email protected] General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
Certificate of Incorporation Certificat de constitution
Request ID: 014752622 Province of Ontario Date Report Produced: 2012/10/30 Demande n : Province de ('Ontario Document produit le: Transaction ID: 0491 1 1 718 Ministry of Government Services Time Report
How To Get A Kongo Republic Tourist Visa
Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
JBoss Enterprise Middleware. The foundation of your open source middleware reference architecture
JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Red Hat open source solution stack changes the economics of IT infrastructure Offers proprietary replacements
Computing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex [email protected] www.wright.edu/cats/ Last Modified
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 1. What % of the call volume that was listed in the RFP was related to LMS (BB and Moodle) support? See Table 5 2. What is the number
Office of the Secretary of State
General Office Overview Assembly Government Affairs, February 25, 2011 Office of the Secretary of State Commercial Recordings Securities Notary Division Elections State Business License Domestic Partnership/Athletes
STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011)
Institut d Administration des Entreprises SOCRATES/ERASMUS APPLICATION DEADLINE : 20th November 2010 OTHER (Autre) STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire
How To Create A Global Signer For The Internet Of Everything
Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the
FRANCE (FRANCE) : Trusted List
ANCE (ANCE) : Trusted List Tsl Id: ID0001 Valid until nextupdate value: 2015-12-28T23:00:00Z TSL signed on: 2015-06-30T09:08:50Z PDF generated on: Tue Jun 30 11:10:36 CEST 2015 ANCE (ANCE) - Trusted List
2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc
July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Solaris 10 Documentation README
Solaris 10 Documentation README Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0550 10 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa
Liste d'adresses URL
Liste de sites Internet concernés dans l' étude Le 25/02/2014 Information à propos de contrefacon.fr Le site Internet https://www.contrefacon.fr/ permet de vérifier dans une base de donnée de plus d' 1
2 RENSEIGNEMENTS CONCERNANT L ASSURÉ SI CELUI-CI N EST PAS LE REQUÉRANT INFORMATION CONCERNING THE INSURED PERSON IF OTHER THAN THE APPLICANT
SÉCURITÉ SOCIALE SOCIAL SECURITY ACCORD DU 9 FÉVRIER 1979 ENTRE LA FRANCE ET LE CANADA AGREEMENT OF FEBRUARY 9, 1979 BETWEEN FRANCE AND CANADA Formulaire FORM SE 401-06 INSTRUCTION D UNE DEMANDE DE PENSION
Effective use of Digital Identities and ID cards in a Government Environment
Effective use of Digital Identities and ID cards in a Government Environment Bavo De Ridder Principal Information Security Consultant Competence Leader IAM Erik R. van Zuuren Principal Information Security
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Sophos (Schweiz) AG May 2012
Sophos (Schweiz) AG May 2012 Agenda 08:30 Accueil 08:45 Sécurité complète et programme de partenariat 09:15 Update & Roadmap produits, avec une démonstration live du Sophos UTM V9 10:00 Pause café 10:15
Technical Service Bulletin
Technical Service Bulletin FILE CONTROL CREATED DATE MODIFIED DATE FOLDER OpenDrive 02/05/2005 662-02-25008 Rev. : A Installation Licence SCO sur PC de remplacement English version follows. Lors du changement
Cameroon Visitor visa Application for citizens of Canada living in Alberta
Cameroon Visitor visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma. DNS The Domain Name System
Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma DNS The Domain Name System RFC 1034 Network Working Group P. Mockapetris Request for Comments: 1034 ISI Obsoletes: RFCs 882, 883, 973 November
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks Va avec 6526491
Les brevets CELL 14 décembre 2006 1 ARCHITECTURE GENERALE 1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks 6526491 2-6526491 25-févr-03 Memory protection system
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Cameroon Tourist visa Application for citizens of Tahiti living in Alberta
Cameroon Tourist visa Application for citizens of Tahiti living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM
SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM APPLICATION FORM / FORMULAIRE DE CANDIDATURE Applications close 4 November 2015/ Date de clôture de l appel à candidatures 4 e novembre
Ashley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
Cameroon Tourist visa Application for citizens of Maldives living in Alberta
Cameroon Tourist visa Application for citizens of Maldives living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015
2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics
CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
The State as a Platform and France Connect
The State as a Platform and France Connect or, a new approach to the design of digital public services https://references.modernisation.gouv.fr/appel-public-%c3%a0-commentaires-epfc Service Architecture
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
The new French regulation on gaming: Anything new in terms of payment?
[Prénom Nwww.ulys.net The new French regulation on gaming: Anything new in terms of payment? Etienne Wery Attorney at law at Brussels and Paris Bars Senior lecturer at university [email protected]
Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle
Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle Discoverer' with Oracle Single Sign On', 'Oracle Internet Directory' and 'Virtual Private Database' for the Luxembourg communities. How to make sure
opennms reporting generation tool
opennms reporting generation tool Juan Pedro Escalona DevOps Southampton, UK - 2014 Juan Pedro Escalona DevOps / Systems Administrator with over 6 years experience administering different OS, network systems
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
