7 OCTOBER Doc. CoRD 093. WEBEDI Electronic data interchange project at Hungarian CSO
|
|
- Erik King
- 5 years ago
- Views:
Transcription
1 COLLECTION OF RAW DATA TASK FORCE MEETING N 6 7 OCTOBER 2002 Doc. CoRD 093 WEBEDI Electronic data interchange project at Hungarian CSO For information
2 Hungarian Central Statistical Office Electronic Data Interchange 7 th October 2002 WEBEDI Electronic Data Interchange project in the co-operation of HCSO and MATÁV-AXELERO 2
3 HCSO Statistical treats ADEL General Data Editing System Data recording, correction Raw data load GESA Survey Control System Blank questionnaires (XML/XSL) Maintenance Specification of the controls EDISC e-respondents XML Acknowledgement questionnaires with data pre-fill data of e- respondents via VPN Acknowledgement by MATÁV- AXELERO Blank questionnaires (HTML / JavaScript) via VPN webedi Personalised questionnaires Questionnaires filled in County offices paper questionnaires with data Personal contacts Client B a s i c features The questionnaires are defined in XML/XSL. All questionnaires are handled by the same XSL program. The specific elements of the questionaires are written in XML with respect to the forthcoming IQML standards. The electronic questionnaires are impersonalised by the data of the GESA system. It is part of the translation ( to HTML and Javascript ) happening within MATAV s e-commerce system. A client sees and handles a specific HTML form similar to the original paper questionaire. During data entry validation rules prevent the client to report syntactically and logically false data. The rules are limited to simple checks like numeric, obligatory, control sum, etc. Incoming data are converted to RDRMES format before the transmission to HCSO. RDRMES is received by EDISC, a message handling system. Output from EDISC is in questionaire specific format for the Oracle Loader. 3
4 B a s i c f e a tu r e s (continuation) Electronic responses loaded into the appropriate relational tables identical to those used with the the paper based ones. The tables belong to the Oracle data base of the ADEL application. Questionnaires filled-in fully, partly or left empty can be saved both on the client and the server side. Saved ( stored ) questionnaires can be (up-) loaded and continued. The authentication and data integrity can be guaranteed by electronic signature. The certification of the signature is delivered by MATÁV on active card basis. Data security is provided on the Internet by the standard HTTPS protocol, while the communication between the Internet provider (MATÁV) and the HCSO is established via a leased line and secured by using asymmetric keys. 4
5 Hungarian Central Statistical Office Electronic Data Interchange 7 th October
6 WEBEDI Electronic Data Interchange project in the co-operation of HCSO and MATÁV-AXELERO B a s i c f e a tu r e s (continuation) Electronic responses loaded into the appropriate relational tables identical to those used with the the paper based ones. The tables belong to the Oracle data base of the ADEL application. Questionnaires filled-in fully, partly or left empty can be saved both on the client and the server side. Saved ( stored ) questionnaires can be (up-) loaded and continued. The authentication and data integrity can be guaranteed by electronic signature. The certification of the signature is delivered by MATÁV on active card basis. Data security is provided on the Internet by the standard HTTPS protocol, while the communication between the Internet provider (MATÁV) and the HCSO is established via a leased line and secured by using asymmetric keys. 6
7 7
8 8
9 9
10 10
11 11
12 12
13 13
14 14
15 15
16 16
17 What is missing Better integration with the paper based collection of data Real off-line functions Better assistance in automatic filling in Making the Internet surface more comfortable Help desk, support KSHXML Data Interchange via Internet project at HCSO 17
18 ASZ: Client/Data Provider System ASP System TIR: Conrol System KSZ: Questionnaire Editor System (META-data driven) ASZ System ASP System ASZ: AB: Client/Data Provider AB s Render Office 18
19 ASP System ASZ System CA: Certification Authority CLR: Certificate Revocation List TIR: HCSO Control System ERP: APS s Management System KSZ: Questionnarie Editor System ASZ: Client/Data Provider AB: AB s Render Office MQS: Message Queue System TIR System ASP System TIR System KSZ System ASZ: AB: Client/Data Provider AB s Render Office ADEL: General Data Editing System GESA: Survey Control System 19
20 Thank You for Your attention! 20
28 - Integrated Production & Business Process Model Ildikó Györki and Ildikó Szűcs
KARAT: The new integrated data transmission system of the HCSO 28 - Integrated Production & Business Process Model Ildikó Györki and Ildikó Szűcs Topics Background of the development Functions of the KARAT
More informationBizTalk Server Introduction. Marius Rochon Technical Evangelist
BizTalk Server 2000 Introduction Marius Rochon Technical Evangelist mrochon@microsoft.com Agenda BTS in context What does it do? How does it work? 2 BizTalk Initiative To automate business process integration
More informationIntegrated Data Processing System (EAR)
Integrated Data Processing System (EAR) Session number: 8 Date: June 1 th 2016 Hajnalka Debreceni Hungarian Central Statistical Office Hajnalka.Debreceni@ksh.hu Outline Methodological aspects Hungarian
More information(Extract from Web-forms for Intrastat, Eurostat, March 2000)
(Extract from Web-forms for Intrastat, Eurostat, March 2000) In France, two different systems are being implemented which use web-forms for the collection of Intrastat declarations: "DEB sur le Web" (Intrastat
More informationIn version that we have released on October 5, 2015 you will find the following helpful new features:
Dear friends of Survey Solutions, In version 5.1.0 that we have released on October 5, 2015 you will find the following helpful new features: Export of commentaries; Export of meta information to DDI format;
More informationFile submissions to VINN and KRITA
Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form
More informationNon conventional attacks Some things your security scanner won t find OWASP 23/05/2011. The OWASP Foundation.
Non conventional attacks Some things your security scanner won t find 23/05/2011 Tom Van der Mussele Security Analyst Verizon Business Security Solutions tom.vandermussele@verizonbusiness.com +352691191974
More informationHow to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL
More informationServer-based Certificate Validation Protocol
Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional
More informationEnterprise Integration with Workflow Management
Read in Notes Mode Enterprise Integration with Fred A. Cummins November 1,1999 EDS, 1999 1, using message brokers, has emerged as a commonly accepted approach to integration of independently developed
More informationOracle Exam 1z0-436 Oracle BigMachines CPQ Cloud Service 2016 Implementation Essentials Version: 6.1 [ Total Questions: 77 ]
s@lm@n Oracle Exam 1z0-436 Oracle BigMachines CPQ Cloud Service 2016 Implementation Essentials Version: 6.1 [ Total Questions: 77 ] Question No : 1 How do you restrict a user from a manually adding or
More informationOrder Central Requirements 08/04/2009
Order Central Requirements 08/04/2009 Contents: Contents:... 1 Table of Figures:... 1 Order Central Architecture... 2 Database:... 2 :... 3 Server:... 3 Browsers:... 3 Minimum Recommended Setup:... 4 Optimum
More informationAnalysis Tools - XML/HTML Project Reports
Exclusively within Revolve Enterprise Edition there are tools that create HTML pages. These tools are located under the Analysis Tools selection under the Enterprise option on the menu bar. There are 4
More informationDirectLine for Business AS2 USER GUIDE
DirectLine for Business AS2 USER GUIDE Contents BMO AS2 Service...1 Introduction... 1 Overview... 1 ICS AS2 Mailbox User... 2 AS2 Mailbox Service Setup...3 Before You Begin... 3 Connectivity Testing...
More informationThe Adobe XML Architecture
TECHNOLOGY BRIEF The Adobe XML Architecture Introduction As enterprises struggle to balance the need to respond to continually changing business priorities against ever-shrinking budgets, IT managers are
More information28 MARCH Doc. CoRD 041
COLLECTION OF RAW DATA TASK FORCE MEETING Nº 4 28 MARCH 2001 Doc. CoRD 041 A brief outline of existing data collection tools and new developments at Statistics Sweden For information Abstract This paper
More informationCustomizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc.
Customizing a Packaged Application for a J2EE Environment: A Case Study Leslie Tierstein TopTier Consulting, Inc. 1 Overview (1) Learning experiences in a J2EE Environment The environment Deployment of
More informationLotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version :
Lotus 190-836 IBM Lotus Notes Domino 8 Developing Web Applications Download Full Version : http://killexams.com/pass4sure/exam-detail/190-836 A. Create a WebQuerySave agent that writes the message to the
More informationDynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT
Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT AGENDA 3. Advanced C# Programming 3.1 Events in ASP.NET 3.2 Programming C# Methods 4. ASP.NET Web Forms 4.1 Page Processing
More informationSTRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide
STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access
More informationMessage exchange with. Finnish Customs
Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish
More informationAlpha College of Engineering and Technology. Question Bank
Alpha College of Engineering and Technology Department of Information Technology and Computer Engineering Chapter 1 WEB Technology (2160708) Question Bank 1. Give the full name of the following acronyms.
More information1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)
To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0
More informationThe new ISTAT network for capturing interview data: the technological architecture
The new ISTAT network for capturing interview data: the technological architecture Stefania BERGAMASCO*, Gabriele BUDANO*, Luciana QUATTROCIOCCHI and Antonio TOMA* *ISTAT - Information Technology Division
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationBirkbeck (University of London)
Birkbeck (University of London) MSc Examination Department of Computer Science and Information Systems Internet and Web Technologies (COIY063H7) 15 Credits Date of Examination: 13 June 2017 Duration of
More informationRob Weir, IBM 1 ODF and Web Mashups
ODF and Web Mashups Basic techniques Rob Weir, IBM robert_weir@us.ibm.com 2009-11-05 1615 1 ODF and Web Mashups Agenda Why it is hard to use ODF in a web app Two techniques for accessing ODF on the web
More informationELECTRONIC TAXATION IN HUNGARY. Prof. Iván Futó
ELECTRONIC TAXATION IN HUNGARY Prof. Iván Futó Corvinus University of Budapest ifuto@informatika.uni-corvinus.hu April 2007 Eastern European egov Days 1 The electronic services of the Hungarian Tax Office
More informationData Sheet NCP Secure Enterprise Management
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and
More informationMitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2
Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel
More informationSuppliers On-Boarding Manual
Supplier Information Performance Management Suppliers On-Boarding Manual en_supplier+onboarding+manual_v1 Page 1 of 16 Contents Introduction... 3 Overview... 3 Registration steps... 4 Section 1: Account
More informationREMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.
REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas
More informationIntroduction to Qualtrics
Introduction to Qualtrics INDIANA.INTENSITVE.DIDACTIC.SEMINAR.04.05.2014 SCREENSHOTS FROM QUALTRICS UNIVERSITY Slides are available at mypage.iu.edu/~longdoan/iids2014 GO AHEAD AND DOWNLOAD TO FOLLOW ALONG.
More informationChanges in JHawk 6 1 Changes in JHawk6 Virtual Machinery 2015
Changes in JHawk 6 1 Changes in JHawk6 Virtual Machinery 2015 Contents Changes in JHawk6... 3 Line counting... 4 System Level... 4 Compilation Unit Level... 4 Package Level... 4 Class Level... 4 Method
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationFOR INTERNAL APPLICANTS ONLY. Current FSU Employees MUST USE Self Service, Recruiting Activities, Careers, to apply for FSU jobs.
FOR INTERNAL APPLICANTS ONLY Current FSU Employees MUST USE Self Service, Recruiting Activities, Careers, to apply for FSU jobs. This job aid outlines the basic steps to apply for a job at Florida State
More informationX-Road: Protocol for Downloading Configuration
X-Road: Protocol for Downloading Configuration Technical Specification Version: 2.1 23.10.2015 26 pages Doc. ID: PR-GCONF 23.10.2015 1/26 Date Version Description Author 04.09.2015 1.4 Minor fixes Siim
More informationTechnical Readiness Requirements
Technical Readiness Requirements CITY UNIVERSITY OF NEW YORK ERP PROJECT Author: Document Name: Document Revision Version: 4.2 Andrew H. Waxman IT Systems Manager, CUNYFirst Production Support Document
More informationCompTIA i-net+ Certification Exam Objectives (http://www.comptia.org/certification/i-net/objectives.asp)
CompTIA i-net+ Certification Exam Objectives (http://www.comptia.org/certification/i-net/objectives.asp) The skills and knowledge measured by this exam are derived from an industry-wide and worldwide job
More informationKey Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) April 2 nd, 2009 1 Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases 2 The Need for Interoperable
More informationSystems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements
More informationSOA S90-20A. SOA Security Lab. Download Full Version :
SOA S90-20A SOA Security Lab Download Full Version : https://killexams.com/pass4sure/exam-detail/s90-20a protocol. Before invoking Service A, Service Consumer A must request a ticket granting ticket and
More informationCollection of Raw Data
Collection of Raw Data TASK FORCE MEETING N 2 27 March 2000 ITEM 3.3 Doc. CoRD 009 IQML: A presentation for CoRD meeting No. 2 For information IQML Overview Chris Nelson Dimension EDI IQML Goal To improve
More informationFOR MORE PAPERS LOGON TO
IT430 - E-Commerce Question No: 1 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by----------, to build a ------------ table _ bridges, hash _ routers, matrix _ routers, routing
More informationFeature Comparison Checklist
Feature Comparison Checklist We invite you to use this checklist to help guide your team in identifying your mobile forms requirements. This checklist also provides an easy way to compare the Formotus
More informationWebSphere Data Interchange 3.2 and MQ Link for SAP R/3
WebSphere Data Interchange 3.2 and MQ Link for SAP R/3 Author: Pete Murphy pete_murphy@uk.ibm.com Written: 24nd May, 2003 Version: 1.0 (draft) Introduction WDI 3.2 is certified in the CA -EDI category.
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationApply for Benefits & Manage My Account
Apply for Benefits & Manage My Account Electronic Document Upload Electronic document uploading provides additional capabilities for managing benefits online. Applicants and clients who have a PEAK account
More informationKEYMAN. Security key and certificate management message. Edition 2016
EANCOM 2002 S4 Security key and certificate management message Edition 2016 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5... 6 6. Example(s)...
More informationPerceptive AP Invoice eform
Perceptive Release Notes Version: 12.2.x Written by: Product Documentation, R&D Date: August 2016 2015 Perceptive Software. All rights reserved Perceptive Software is a trademark of Lexmark International
More informationESSnet Project. Automated data collection and reporting in accommodation statistics
ESSnet Project Automated data collection and reporting in accommodation statistics Report on modified Work Package 5: The Architecture and applications to handle the XML files received directly from the
More informationINDEX. Drop-down List object, 60, 99, 211 dynamic forms, definition of, 4 dynamic XML forms (.pdf), 80, 89
A absolute binding expressions, definition of, 185 absolute URL, 243 accessibility definition of, 47 guidelines for designing accessible forms, 47 Accessibility palette definition of, 16 specifying options
More informationOracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements.
Oracle Workflow Release Notes Release 2.6.2 May 2002 Part No. A95814-02 This document summarizes the differences between Oracle Workflow Release 2.6.2 in Oracle9i Application Server Release 2 (9.0.2) and
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationAgenda. XML Generics. XML for Java Developers G Session 1 - Main Theme Markup Language Technologies (Part I)
XML for Java Developers G22.3033-002 Session 1 - Main Theme Markup Language Technologies (Part I) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 000-378 Title : IBM WebSphere DataPower SOA Appliances, Firmware V3.7.3 Vendors : IBM Version : DEMO
More information13. Databases on the Web
13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface
More informationITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
More informationIT2353 Web Technology Important Questions 2 Marks and 16 Marks Unit 1 Part A 1. Differentiate Internet with Intranet. 2. What are HTML tags? 3.
IT2353 Web Technology Important Questions 2 Marks and 16 Marks Unit 1 1. Differentiate Internet with Intranet. 2. What are HTML tags? 3. Write a script that inputs text from an HTML form and outputs the
More informationZEND: Survey on the Examination System
ZEND: Survey on the Examination System Sun Bingli, K. Ramesh Babu School of Computing Science and Engineering, VIT University, TamilNadu, India bingli_0202@163.com; Abstract With the development of computer
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationImpact Analysis for Software changes in OpenLAB CDS A.01.04
Impact Analysis for Software changes in OpenLAB CDS A.01.04 Document Information: Filename Product Identifier Product Revision Project Identifier Document Revision Impact_Analysis_OpenLAB_CDS_A0104 OpenLAB
More informationOracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements.
Oracle Workflow Release Notes Release 2.6.2 April 2002 Part No. A95814-01 This document summarizes the differences between Oracle Workflow Release 2.6.2 in Oracle9i Application Server Release 2 (9.0.2)
More informationNCP Exclusive Remote Access Management
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and
More informationDatabase Systems: Design, Implementation, and Management Tenth Edition. Chapter 14 Database Connectivity and Web Technologies
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 14 Database Connectivity and Web Technologies Database Connectivity Mechanisms by which application programs connect and communicate
More informationQuestionnaire 4.0 Setup Guide 2006/4/14
Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute
More informationConstruction of Support Tools to Assist an Agent System
Construction of Support Tools to Assist an Agent System Tokihiro Fukatsu 1, Masayuki Hirafuji 1 and Takuji Kiura 1 1: National Agriculture and Food Research Organization, Japan, fserver@zoushoku.narc.affrc.go.jp
More informationXML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI
Chapter 18 XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI Fábio Ghignatti Beckenkamp and Wolfgang Pree Abstract: Key words: WebEDI relies on the Internet infrastructure for exchanging documents among
More informationSEB GATEWAY Customer to bank online integration. specification v1.04
SEB GATEWAY Customer to bank online integration specification v1.04 Document versions Version Date Comments 1.0 2012-12-06 Initial version of the document 1.01 2013-09-04 Added part about supported qualified
More informationPolicy Based Device Access Security Position Paper to Device Access Policy Working Group
1 (8) Policy Based Device Access Security Position Paper to Device Access Policy Working Group 2 (8) 1. INTRODUCTION Nokia has implemented a policy-based device access security model for its Web runtime
More informationUKOLN involvement in the ARCO Project. Manjula Patel UKOLN, University of Bath
UKOLN involvement in the ARCO Project Manjula Patel UKOLN, University of Bath Overview Work Packages User Requirements Specification ARCO Data Model Types of Requirements Museum User Trials Metadata for
More informationCS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued
CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationOracle Center. Implementation Guide. Release 11i. November 2000 Part No. A
Oracle email Center Implementation Guide Release 11i November 2000 Part No. A86113-03 Oracle email Center Implementation Guide, Release 11i Part No. A86113-03 Copyright 2000, Oracle Corporation. All rights
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationPerceptive AP Invoice eform
Perceptive Release Notes Version: 12.2.x Written by: Product Documentation, R&D Date: October 2016 2014 Perceptive Software. All rights reserved Perceptive Software is a trademark of Lexmark International
More informationWeb Technology for Test and Automation Applications
Web Technology for Test and Automation Applications Fanie Coetzer - FSE Demo Operator Technician Engineers Your boss Test Sequencer 3 Goal I know nothing I know what it takes to get started on web applications
More informationAlbatross: Seaside Web Applications Scenario Testing Framework
Albatross: Seaside Web Applications Scenario Testing Framework Andrea Brühlmann, abrue@students.unibe.ch Supervised by: Adrian Lienhard Software Composition Group University of Bern, Switzerland September
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationITP 342 Mobile App Development. APIs
ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually
More informationSymmetric Key Services Markup Language Use Cases
Symmetric Key Services Markup Language Use Cases Document Version 1.1 - February 28, 2007 The OASIS Symmetric Key Services Markup Language (SKSML) is the proposed language/protocol that defines how a client
More informationSUPPLIER REGISTRATION DEFINITION ON EXTERNAL LINK
SUPPLIER REGISTRATION DEFINITION ON EXTERNAL LINK When Supplier Registration is accessed from an external link, a screen will appear where you can enter the supplier summary information. On this screen,
More informationegov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO
egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip
More informationIT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://
IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 1Z0-134 Title : Oracle WebLogic Server 12c: Advanced Administrator II Version : Demo 1 / 4 1.I am configuring
More informationLocal area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.
Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.
More informationThe Match On Card Technology
Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification
More informationCopyright
This video will look at the different components that make up Active Directory Certificate Services and which services you should look at installing these components on. Which components to install where?
More informationACCESS NetFront TM Browser
Security for Access to Device APIs from the Web - W3C Workshop 10-11 December 2008, London ACCESS NetFront TM Browser Marcin Hanclik, R&D, ACCESS CO., LTD. Widgets NetFront Browser Widgets (hereafter NFBW)
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the
More informationPerformance and security enhancements on the Blaise IS standard stylesheet
Performance and security enhancements on the Blaise IS standard stylesheet Arnaud Wijnant, Edwin de Vet CentERdata, Tilburg University, The Netherlands 1 Abstract CentERdata has several years of experience
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationPKI Trustpool Management
PKI Trustpool Management Last Updated: October 9, 2012 The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted
More informationEnhancing Your Customer Facing Documents (updated 10/03/2017)
Dolphin Dynamics Enhancing Your Customer Facing Documents (updated 10/03/2017) Copyright 2016 Dolphin Dynamics Ltd. The information contained herein is the property of Dolphin Dynamics Ltd. No part of
More informationIBM Integration Bus v9.0 System Administration: Course Content By Yuvaraj C Panneerselvam
IBM Integration Bus v9.0 System Administration: Course Content By Yuvaraj C Panneerselvam 1. COURSE OVERVIEW As part of this course, you will learn how to administer IBM Integration Bus on distributed
More informationESRI stylesheet selects a subset of the entire body of the metadata and presents it as if it was in a tabbed dialog.
Creating Metadata using ArcCatalog (ACT) 1. Choosing a metadata editor in ArcCatalog ArcCatalog comes with FGDC metadata editor, which create FGDC-compliant documentation. Metadata in ArcCatalog stored
More informationThe SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.
1 Introduction This document is the technical reference for Signaturgruppens SPS.Client library. The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.
More informationAgenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II)
XML for Java Developers G22.3033-002 Session 6 - Main Theme XML Information Processing (Part II) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
More informationCryptographic Protocols 1
Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange
More informationCCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT
TM ASSURANCE CONTINUITY MAINTENANCE REPORT FOR Aruba Remote Access Points Maintenance Update of Aruba Remote Access Points Maintenance Report Number: CCEVS-VR-VID10766-2017a Date of Activity: September
More information