Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event
|
|
- Osborne Byrd
- 6 years ago
- Views:
Transcription
1 Electronic ID in Germany Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event
2 Table of Contents Authentication in Germany Infrastructure (Client, Hardware, Participants) Authentication in Europe TREATS and eidas-middleware Notification German ID Card
3 About Governikus KG Location Governikus GmbH & Co. KG Am Fallturm 9, Bremen Unlimited Partners Unlimited Partner Governikus Bremen GmbH (100,0 % ownership by the Free Hanseatic City of Bremen) Foundation Founded in July 1999 (as bremen online services GmbH & Co. KG) Work Force roughly 130 employees Managing Director Dr. Stephan Klein Limited Partners Freie Hansestadt Bremen: 55,1 % Telekom Deutschland GmbH: 15,0 % Die Sparkasse Bremen: 15,0 % Brekom GmbH (EWE Gruppe): 14,9 % Head of Supervisory Board Dr. Martin Hagen
4 German ID Card Facts (October 2017) Issued electronic IDs More than 18,5 million FORECAST ELECTRONIC ID CARDS GERMANY Service Providers 157 Service Providers (October 2017): ca. 2/3 Public Sector ca. 1/3 Private Sector 18,5 26,5 34,5 42,
5 German eid Infrastructure Requires eid Client And eid Server For Mutual Authentication Figure: Overview of the German eid System / Federal Office for Information Security
6 Decentralized eid Infrastructure Germany Official Documents Card Verifiable Certificates Bundesdruckerei (Federal) D-Trust User / ID Official Client / AusweisApp2 Service Provider eid Server Governikus on behalf of the Federal Ministry of the Interior Different public and private organisations Private Providers (Governikus p.e.) Authentication Certificates and Blacklist Federal Office of Administration
7 AusweisApp2 German eid Client (developed by Governikus on behalf of the Federal Ministry of the Interior): user-friendly, lean, secure and certified Computer and mobile usage with support - Windows, Mac OS X - Android (ios under development / usability tests) Certified Software Development Kit (SDK) / Built-In - Integration in own Applications Certified Software - By Federal Office for Information Security Licenced under EUPL to create own clients, built-ins or other operating systems Smartphone as card reader - To avoid additional hardware Usability tested - Integration in own Applications Approx. 1 Mio. downloads Windows and Mac OS (since November 2014), approx downloads Android (since May 2017)
8 Smartphone (or Tablet) As Card Reader NFC Computer and NFC-Smartphone or NFC-Tablet in the same Wifi The devices have to be connected to the same Wifi NFC
9 Governikus Autent Multifunctional eid Server EU-Middleware POSeIDAS Application of the IT Planning Council Federal Government and Federal States hold the licence SLA silver, bronze und gold available Multiclient capable Multi-authentication possibilities (Certificate-based, Username/Password, ID card) Identity management/ directory service SAML and SOAP acc. totr-3130 Flexible modularisation POSeIDAS limited to SOAP Webservice acc. to TR ID Cards
10 eidas The Perspective Matters Each EU-/EFTA member state is both: sending or receiving member state 1. Sending member state: sends the eid Regarding eidas beeing an sending member state is optional. There is no obligation to notify an ID token 2. Receiving member state: accepts the eid Mandatory as of September 2018 regarding eidas: each country must accept notified ID tokens from other EU-/EFTA countries
11 eidas The Perspective Matters (Example)
12 eidas Middleware in The Netherlands The eidas Middleware, developed by Governikus on behalf of the Federal Ministry of the Interior was successfully deployed in The Netherlands (Demo Portal) (beginning of 2017) and is supplied by Germany as a virtual machine.
13 Motivation for TREATS Federal Ministry of the Interior realised necessary action to get the German infrastructure eidas-ready (2015) Adressed all eid-server manufacturers, call for interest Adressed some relevant service providers to think beyond Asked Governikus KG to coordinate the proposal in the name of Germany Set in addition the Federal Office for Information Security in controlling duty
14 Participants in the TREATS Consortium MTG (media transfer AG) OpenLimit SignCubes GmbH Governikus GmbH & Co. KG (consortial leader) eid server HSH Soft- und Hardware Vertriebs GmbH SiXFORM GmbH Bundesdruckerei GmbH Harz University of Applied Science Anstalt für Kommunale Datenverarbeitung in Bayern (AKDB) Services and Applications Guest / Observer: Federal Ministry of the Interior Federal Office for Information Security Functionality Visibility Mentoring / Observing
15 Goals of TREATS Scope of work in TREATS project Enable existing infrastructure to accept eid token from other EU Member States Provide multiplier effect at once for Germany Lead to an enhanced eid scheme in Germany Enhance selected applications as proof of concept Bring new eidas-enabled infrastructure into production Develop best practice guide for on-boarding process of other service applications
16 Notification of German ID card on How did Germany do this? German-eID/eIDASnotification/eIDAS_notification_node.html;jsessionid=652 4D09940CEDE43D3E644542B14ED7A.1_cid341 Responsible and successfully completed by the Federal Ministry of the Interior and the Federal Office for Information Security Maximum transparency (all documents are publicly available) Politically important / supported by ministerial letters What are the lessons learned? Plenty of work to do! Detailed documentation is essential.
17 Besuchen Sie uns auch in Thanks for your kind attention! Dr. Stephan Klein Tel: Governikus GmbH & Co. KG Am Fallturm Bremen Tel.: Albrechtstraße Berlin Tel.:
NOBLE presentation of the project
NOBLE presentation of the project Klaus Lüttich, Governikus KG edelivery Workshop @ ETSI Security Week 14 June 2017 Objective and Context of NOBLE The OBJECTIVE is to set up an edelivery infrastructure
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More informationDeutsches Maritimes Kompetenz Netz
www.dmkn.de Deutsches Maritimes Kompetenz Netz German Association for Marine Technology, Hamburg November 21st, 2006 Contact: Dr. Michael Bauer, NetSkill AG, Saalmannstraße 7-9, 13403 Berlin, Tel.: 03
More informationeidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?
eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals
More informationThe German IT Security Certification Scheme. Joachim Weber
The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.
More informationAutomated Mobile Security (ESUKOM)
Technical Paper Automated Mobile Security () Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices Network Communications Products engineering
More informationGerman eid based on Extended Access Control v2
German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0
More informationSmart Data and its impact for Germany
Smart Data and its impact for Germany Dr. Alexander Tettenborn i-know, 19.10.2016, Graz www.bmwi.de The German Digital Economy * 221 bn. turnover (ICT sector) 100 bn. turnover (internet economy) 5.6 %
More informationData Privacy Statement for myportal to go
Data Privacy Statement for myportal to go Contents 1. Scope... 2 2. Data Handled by Unify Through myportal to go... 2 3. Disclosure of Your Personal Data... 3 4. Accessing, Correcting and Deleting Your
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More information{ Mobile Printing Send Print Jobs from any Location }
{ Mobile Printing Send Print Jobs from any Location } Web Printer Driver Mobile Apps Mobile Printing Google Cloud Print Email/ Guest Printing Apple AirPrint Wep Upload The Next Step in Office Mobility
More informationSAT for eid [EIRA extension]
SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationNFC. control time RFID. copy protection. Barcode. Security. App. Quick control. NFC eco system ISO Secure Element. Near Field Communication
Quick control Casual users App mobile ticketing NFC Smartphone OPTIMOS Investment protection RFID control time Ticket issuing mobile network Data transfer Ticket purchase existing infrastructure Security
More information@firma, Validation Platform for PKIs
@firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationSri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY
THE JOURNEY OF Sri Lanka TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY Presented by Dr. Ajith Madurapperuma on behalf of the ICTA Email: ajitolanka@gmail.com A PRESENTATION BY The Information Communication
More informationChiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben
Chiffry Secure smartphone communication 09:41 Profil +49124148155122 Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat:
More informationElectronic signature framework
R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents
More informationWhite Paper Implementing mobile electronic identity
Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing
More information1. E Government, where did we start 2. The Federal Government s IT strategy, E Government Deutschland Online
Office of the CIO at the Federal Ministry of the Interior The e government and IT strategy pursued by the Federal Government Tim Schröder Federal Ministry of the Interior 10 November 2006 Agenda 1., where
More informationDesigning XML Security Services for Biodiversity Networks
Designing XML Security Services for Biodiversity Networks Robert Tolksdorf 1, Lutz Suhrbier 2, Ekaterina Langer 3 Freie Universität Berlin, Networked Information Systems Institut für Informatik, Takustraße
More informationesignature Infrastructure Marketing Model
www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of
More informationDas Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ
Das Fraunhofer 1 Enhancing Ukraine`s Competitiveness in RI on the way to the Association to Horizon 2020-2nd Stakeholders Forum of BILAT-UKR*AINA Technology Transfer: Framework Conditions And Good Practices
More informationSecurity analysis of OpenID, followed by a reference implementation of an npabased OpenID provider
Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied
More informationTRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM JACIC Hiroyuki ISHIWATA
TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM 2013.11.8 JACIC Hiroyuki ISHIWATA JACIC Electronic Bidding Core System Development Consortium introduce myself author name:
More informationThe new Service Account For citizens and authorities
The new Service Account For citizens and authorities - 1 - Legal Notices Copyright 2016 of the Ministry of Internal Affairs of the State of Baden-Württemberg and SEITENBAU GmbH, Konstanz All rights reserved,
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationGiesecke+Devrient. Company Presentation
Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical
More informationSTORK Secure Identity Across Borders Linked
STORK Secure Identity Across Borders Linked Projekt STORK Status und Ausblick 2011 BITKOM FA eid 20. Januar 2011 / Berlin Volker Reible / T-Systems Stork is an EU co-funded project INFSO-ICT-PSP-224993
More informationThe Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017
The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 2 The Smart Card Evolution
More informationSino-German Cooperation on Industrie 4.0 中德工业 4.0 合作
Sino-German Cooperation on Industrie 4.0 中德工业 4.0 合作 Imprint Publisher Bundesministerium für Wirtschaft und Energie (BMWi) Öffentlichkeitsarbeit 11019 Berlin, Germany www.bmwi.de Editorial office Deutsche
More informationIFIP World Computer Congress (WCC2010)
IFIP World Computer Congress (WCC2010) Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks Prof. Dr.-Ing. Kai-Oliver Detken DECOIT GmbH, http://www.decoit.de,
More informationThis help covers the ordering, download and installation procedure for Odette Digital Certificates.
This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette
More informationIdentity Management Systems An Overview. IST Event 2004 /
IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management
More informationSecurity Aspects of Trust Services Providers
Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00
More informationJOURNEY TO YOUR CLOUD. Mika Kotro Sales Development EMC Deutschland GmbH. Copyright 2012 EMC Corporation. All rights reserved.
1 JOURNEY TO YOUR CLOUD Mika Kotro Sales Development EMC Deutschland GmbH 2 The Journey To Your Cloud: Infrastructure Private Cloud Is A Logical First Step Enterprise IT Complex Trusted Controlled Expensive
More informationPRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9
PRICE LIST TRUST SERVICE PRODUCTS Price List Version 5.9 Berlin, April 2018 Copyright 2018, Bundesdruckerei GmbH Seite 1/9 Qualified Single Signature Cards D-TRUST Card 3.0 EU Signature card according
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationTechnical Guideline TR eid-server. Part 2: Security Framework for eid-server operations
Technical Guideline TR-03130 eid-server Part 2: Security Framework for eid-server operations Version 2.1.2 October 25, 2017 Document history Version Date Description 0.4 Draft August 20, 2013 Initial External
More informationMind Over Matter: The Pragmatic, Strong, and Smart Approach to Security
Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security SESSION ID: SPO1-T09 Ammar Alkassar CEO Sirrix AG security technologies Saarbrücken, Germany Dr. Kim Nguyen Managing Director D-Trust
More informationIdentität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist
Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration
More informationZB MED. Libraries and the Information Infrastructure in Germany: Nutrition Environment Agriculture. Medicine Health
Libraries and the Information Infrastructure in Germany: standards and recent developments Ulrich Korwitz German National Library of Medicine ZB MED Foto Haus Bonn Medicine Health Nutrition Environment
More informationSponsoring of Continuing Medical Education in Germany
ZEVA meeting Bratislava, 25 September 2014 Sponsoring of in Germany Domen Podnar, Policy Advisor, International Department 1 Physicians self-governance in Germany State Chambers of Physicians - Compulsory
More informationThe ehealth platform
Cookbook How to call the Qermid Tuco web services and the test process Version 1.0 This document is provided to you free of charge by The ehealth platform Willebroekkaai 38 Quai de Willebroeck 38 1000
More informationDigital Austria = egov best practice in d Europe
Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear
More informationGerman Research Strategy in the Area of Civil Security Research
8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security
More informationIntroduction to the Extended Development Platform
Hong Kong 2018 Introduction to the Extended Development Platform Richard Schaefer, Sr. Enterprise Solution Manager BlackBerry Development Platform A collection of enterprise ready tools which enable enterprise
More information2. HDF AAI Meeting -- Demo Slides
2. HDF AAI Meeting -- Demo Slides Steinbuch Centre for Computing Marcus Hardt KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association www.kit.edu Introduction
More informationeid Consulting References
eid Consulting References Selection of References We are renown for running eid, epassport, eborder projects MOI Germany President of Nigeria Royal Oman Police MOI of U..A.E. MOI of Sudan European Commission
More informationInternational Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018
International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide
More informationTechnical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token
Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899
More informationG/On. G/On is available for Windows, MacOS and Linux (selected distributions).
G/On Soliton G/On is a remote access solution which establishes connections between a remote device and application servers inside an organisations network. A secure gateway is used to separate the remote
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationState-of-the-Art Technology in support of Disaster Management. T-Systems. Enabler of connected life and work.
State-of-the-Art Technology in support of Disaster Management. T-Systems. Enabler of connected life and work. Jurry de la Mar. T-Systems International GmbH. Deutsche Telekom. Partner for connected life
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationPromotion. Grow Develop - Attack. Xtra Cash The Unify incentive program for reseller Sales Reps
Promotion Grow Develop - Attack Xtra Cash The Unify incentive program for reseller Sales Reps Welcome to OpenScape Business Rewards The OpenScape Business Rewards Programme provides you with the opportunity
More informationDeliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift
Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3
More informationGermany Candidate for the ITU Council
Germany Candidate for the ITU Council Germany Candidate for the ITU Council International Telecommunication Union is an important forum for global co-operation in the various areas of ICTs. Germany continuously
More informationAusweisApp2 Manual Release
AusweisApp2 Manual Release 1.14.0 Governikus GmbH & Co. KG 20.12.2017 Contents 1 Installation of AusweisApp2 on a Windows operating system 1 1.1 Dialog page Welcome - Step 1 of 5.............................
More information5 th Meeting of the European Heritage Legal Forum. Wolfgang Karl Göhner
5 th Meeting of the European Heritage Legal Forum Influences of EHLF activities on national developments on energy efficiency and construction products: Test case Germany by http://w-goehner.de Tel: ++49
More informationETSI - European CA-Day. November 29th 2012 I Dr. Kim Nguyen, Chief Scientist Security, Managing Director D-Trust
ETSI - European CA-Day November 29th 2012 I Dr. Kim Nguyen, Chief Scientist Security, Managing Director D-Trust Bundesdruckerei Group Bundesdruckerei GmbH BIS Bundesdruckerei International Services GmbH
More informationSUBJECT: PRESTO operating agreement renewal update. Committee of the Whole. Transit Department. Recommendation: Purpose: Page 1 of Report TR-01-17
Page 1 of Report TR-01-17 SUBJECT: PRESTO operating agreement renewal update TO: FROM: Committee of the Whole Transit Department Report Number: TR-01-17 Wards Affected: All File Numbers: 465-12, 770-11
More informationTowards a European e-competence Framework
Towards a European e-competence Framework Projects, trends, multistakeholder activities towards a European ICT sectoral framework, related to the EQF Jutta Breyer Brussels, 24 June 2008 Overview 1. Intro
More informationUtimaco HSM Introduction JIPDEC Seminar June 2017
Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM
More informationCLOUD QUALITY AND CLOUD CERTIFICATION
CLOUD QUALITY AND CLOUD CERTIFICATION 8th EuroCloud Congress Cloud, Trust & Security 25th October 2017 / Brussels, Belgium Ivana Tepčević Project Manager and Lead Auditor, SGS Belgrade AGENDA SGS in brief
More informationeidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017
eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment
More informationTechnical guidelines implementing eidas
Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and
More informationRELATIONSHIP WITH KONICA MINOLTA
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level
More informationINSPIRE and Service Level Management Why it matters and how to implement it
Service Level Agreements for D-Grid INSPIRE and Service Level Management Why it matters and how to implement it Bastian Baranski con terra GmbH Münster, Germany http://www.sla4d-grid.de Motivation Evolution
More informationTrusted Cloud Building Up Trust in Cloud Computing. CeBIT 2017 Hannover
Trusted Cloud Building Up Trust in Cloud Computing CeBIT 2017 Hannover 1 Trusted Cloud reduces obstacles to the use of cloud technologies Reasons of companies in Germany for not using cloud services Source:
More informationFederated authentication for e-infrastructures
Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction
More informationPlease the completed POL to the following address:
Hello [Customer], Symantec is unable to verify the order details you have provided in our currently available public resources. To continue processing your code signing certificate for [Organization],
More informationCross border eservices STORK 2.0
Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project
More informationBetween 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.
Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009
More informationThe appendix to the certificate is part of the certificate and consists of 3 pages.
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its trust service D-TRUST qualified
More informationScottish Wide Area Network (SWAN) update & Partnership Connectivity
Scottish Wide Area Network (SWAN) update & Partnership Connectivity Scotland NHS-HE Forum 27 th October, 2016 Andrew Howe, University of St Andrews Ron MacDonald, National Services Scotland Partnership
More informationThe energy sector reloaded
1 The energy sector reloaded Association of Energy Market Innovators 2 Discourse at bne is very much in line with our approach as a network company. That s because the combination of expertise across sectors,
More informationTHREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017
THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization
More informationWP JRA1: Architectures for an integrated and interoperable AAI
Authentication and Authorisation for Research and Collaboration WP JRA1: Architectures for an integrated and interoperable AAI Christos Kanellopoulos Agenda Structure and administrative matters Objectives
More informationCONTENTS. TESTING INSTRUCTIONS Appendix 1 to the Stakeholder testing plan. Project to establish the National Incomes Register 1(13)
1(13) CONTENTS 1 Start of testing... 4 2 Testing agreement... 4 3 Testing addresses... 5 4 Instructions for generating a test certificate in the certificate service... 5 4.1 Requirements for generating
More informationEnterprise Mobility Management
B L A C K B E R R Y K E E P S Y O U R B U S I N E S S M O V I N G Enterprise Mobility Management Perfectly balancing end-user and corporate needs 800.972.3922 + Enterprise mobility is enabling organizations
More informationEnergy Efficiency Export Initiative a service to promote Energy Efficiency made in Germany
Welcome Energy Efficiency Export Initiative a service to promote Energy Efficiency made in Germany Susanne Lein Head of Coordination Office Energy Efficiency Export Initiative ENERGY EFFICIENCY CONFERENCE
More informationPremium Membership Package [N5, 000]
NigeriaTrainingNetwork [NTN] and NigeriaTrainingCourses [NTC] are platforms that connects students, trainers and companies together. The platform comprises of private, work based, professional individuals,
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationTLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy)
TLS-Federation Dr. Bud P. Bruegger Dr. Detlef HühnleinH Prof. Guido Marinelli Comune di Grosseto (Italy) Secunet (Germany) U.Rome Tor Vergata (Italy) Scope full eid IOP framework for EU MSs any eid technology
More informationNational Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign
This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationCEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam
CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth
More informationCitizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development
Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software
More informationPlacement Administration and Support System (PASS) User Guide. System Version January 2018 (v9)
Placement Administration and Support System (PASS) User Guide System Version 2.0 22 January 2018 (v9) Placement Administration and Support System (PASS) User Guide System Version 2.0 22 January 2018 Contents
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationFederated Authentication for E-Infrastructures
Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended
More informationBSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund
Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0010-2004 for Protection Profile Waste Bin Identification Systems (WBIS-PP) Version 1.04 developed by Deutscher Städte- und Gemeindenbund - Bundesamt
More informationeidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister
eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationE-Energy! Information and Communications Technologies for the Energy Sector
E-Energy! Information and Communications Technologies for the Energy Sector Conference of the European Commission Brussels, 31 January 2008 Dr. Andreas Goerdeler Head of the Division Development of Convergent
More information