7 OCTOBER Doc. CoRD 093. WEBEDI Electronic data interchange project at Hungarian CSO

Size: px
Start display at page:

Download "7 OCTOBER Doc. CoRD 093. WEBEDI Electronic data interchange project at Hungarian CSO"

Transcription

1 COLLECTION OF RAW DATA TASK FORCE MEETING N 6 7 OCTOBER 2002 Doc. CoRD 093 WEBEDI Electronic data interchange project at Hungarian CSO For information

2 Hungarian Central Statistical Office Electronic Data Interchange 7 th October 2002 WEBEDI Electronic Data Interchange project in the co-operation of HCSO and MATÁV-AXELERO 2

3 HCSO Statistical treats ADEL General Data Editing System Data recording, correction Raw data load GESA Survey Control System Blank questionnaires (XML/XSL) Maintenance Specification of the controls EDISC e-respondents XML Acknowledgement questionnaires with data pre-fill data of e- respondents via VPN Acknowledgement by MATÁV- AXELERO Blank questionnaires (HTML / JavaScript) via VPN webedi Personalised questionnaires Questionnaires filled in County offices paper questionnaires with data Personal contacts Client B a s i c features The questionnaires are defined in XML/XSL. All questionnaires are handled by the same XSL program. The specific elements of the questionaires are written in XML with respect to the forthcoming IQML standards. The electronic questionnaires are impersonalised by the data of the GESA system. It is part of the translation ( to HTML and Javascript ) happening within MATAV s e-commerce system. A client sees and handles a specific HTML form similar to the original paper questionaire. During data entry validation rules prevent the client to report syntactically and logically false data. The rules are limited to simple checks like numeric, obligatory, control sum, etc. Incoming data are converted to RDRMES format before the transmission to HCSO. RDRMES is received by EDISC, a message handling system. Output from EDISC is in questionaire specific format for the Oracle Loader. 3

4 B a s i c f e a tu r e s (continuation) Electronic responses loaded into the appropriate relational tables identical to those used with the the paper based ones. The tables belong to the Oracle data base of the ADEL application. Questionnaires filled-in fully, partly or left empty can be saved both on the client and the server side. Saved ( stored ) questionnaires can be (up-) loaded and continued. The authentication and data integrity can be guaranteed by electronic signature. The certification of the signature is delivered by MATÁV on active card basis. Data security is provided on the Internet by the standard HTTPS protocol, while the communication between the Internet provider (MATÁV) and the HCSO is established via a leased line and secured by using asymmetric keys. 4

5 Hungarian Central Statistical Office Electronic Data Interchange 7 th October

6 WEBEDI Electronic Data Interchange project in the co-operation of HCSO and MATÁV-AXELERO B a s i c f e a tu r e s (continuation) Electronic responses loaded into the appropriate relational tables identical to those used with the the paper based ones. The tables belong to the Oracle data base of the ADEL application. Questionnaires filled-in fully, partly or left empty can be saved both on the client and the server side. Saved ( stored ) questionnaires can be (up-) loaded and continued. The authentication and data integrity can be guaranteed by electronic signature. The certification of the signature is delivered by MATÁV on active card basis. Data security is provided on the Internet by the standard HTTPS protocol, while the communication between the Internet provider (MATÁV) and the HCSO is established via a leased line and secured by using asymmetric keys. 6

7 7

8 8

9 9

10 10

11 11

12 12

13 13

14 14

15 15

16 16

17 What is missing Better integration with the paper based collection of data Real off-line functions Better assistance in automatic filling in Making the Internet surface more comfortable Help desk, support KSHXML Data Interchange via Internet project at HCSO 17

18 ASZ: Client/Data Provider System ASP System TIR: Conrol System KSZ: Questionnaire Editor System (META-data driven) ASZ System ASP System ASZ: AB: Client/Data Provider AB s Render Office 18

19 ASP System ASZ System CA: Certification Authority CLR: Certificate Revocation List TIR: HCSO Control System ERP: APS s Management System KSZ: Questionnarie Editor System ASZ: Client/Data Provider AB: AB s Render Office MQS: Message Queue System TIR System ASP System TIR System KSZ System ASZ: AB: Client/Data Provider AB s Render Office ADEL: General Data Editing System GESA: Survey Control System 19

20 Thank You for Your attention! 20

28 - Integrated Production & Business Process Model Ildikó Györki and Ildikó Szűcs

28 - Integrated Production & Business Process Model Ildikó Györki and Ildikó Szűcs KARAT: The new integrated data transmission system of the HCSO 28 - Integrated Production & Business Process Model Ildikó Györki and Ildikó Szűcs Topics Background of the development Functions of the KARAT

More information

BizTalk Server Introduction. Marius Rochon Technical Evangelist

BizTalk Server Introduction. Marius Rochon Technical Evangelist BizTalk Server 2000 Introduction Marius Rochon Technical Evangelist mrochon@microsoft.com Agenda BTS in context What does it do? How does it work? 2 BizTalk Initiative To automate business process integration

More information

Integrated Data Processing System (EAR)

Integrated Data Processing System (EAR) Integrated Data Processing System (EAR) Session number: 8 Date: June 1 th 2016 Hajnalka Debreceni Hungarian Central Statistical Office Hajnalka.Debreceni@ksh.hu Outline Methodological aspects Hungarian

More information

(Extract from Web-forms for Intrastat, Eurostat, March 2000)

(Extract from Web-forms for Intrastat, Eurostat, March 2000) (Extract from Web-forms for Intrastat, Eurostat, March 2000) In France, two different systems are being implemented which use web-forms for the collection of Intrastat declarations: "DEB sur le Web" (Intrastat

More information

In version that we have released on October 5, 2015 you will find the following helpful new features:

In version that we have released on October 5, 2015 you will find the following helpful new features: Dear friends of Survey Solutions, In version 5.1.0 that we have released on October 5, 2015 you will find the following helpful new features: Export of commentaries; Export of meta information to DDI format;

More information

File submissions to VINN and KRITA

File submissions to VINN and KRITA Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form

More information

Non conventional attacks Some things your security scanner won t find OWASP 23/05/2011. The OWASP Foundation.

Non conventional attacks Some things your security scanner won t find OWASP 23/05/2011. The OWASP Foundation. Non conventional attacks Some things your security scanner won t find 23/05/2011 Tom Van der Mussele Security Analyst Verizon Business Security Solutions tom.vandermussele@verizonbusiness.com +352691191974

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

Server-based Certificate Validation Protocol

Server-based Certificate Validation Protocol Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional

More information

Enterprise Integration with Workflow Management

Enterprise Integration with Workflow Management Read in Notes Mode Enterprise Integration with Fred A. Cummins November 1,1999 EDS, 1999 1, using message brokers, has emerged as a commonly accepted approach to integration of independently developed

More information

Oracle Exam 1z0-436 Oracle BigMachines CPQ Cloud Service 2016 Implementation Essentials Version: 6.1 [ Total Questions: 77 ]

Oracle Exam 1z0-436 Oracle BigMachines CPQ Cloud Service 2016 Implementation Essentials Version: 6.1 [ Total Questions: 77 ] s@lm@n Oracle Exam 1z0-436 Oracle BigMachines CPQ Cloud Service 2016 Implementation Essentials Version: 6.1 [ Total Questions: 77 ] Question No : 1 How do you restrict a user from a manually adding or

More information

Order Central Requirements 08/04/2009

Order Central Requirements 08/04/2009 Order Central Requirements 08/04/2009 Contents: Contents:... 1 Table of Figures:... 1 Order Central Architecture... 2 Database:... 2 :... 3 Server:... 3 Browsers:... 3 Minimum Recommended Setup:... 4 Optimum

More information

Analysis Tools - XML/HTML Project Reports

Analysis Tools - XML/HTML Project Reports Exclusively within Revolve Enterprise Edition there are tools that create HTML pages. These tools are located under the Analysis Tools selection under the Enterprise option on the menu bar. There are 4

More information

DirectLine for Business AS2 USER GUIDE

DirectLine for Business AS2 USER GUIDE DirectLine for Business AS2 USER GUIDE Contents BMO AS2 Service...1 Introduction... 1 Overview... 1 ICS AS2 Mailbox User... 2 AS2 Mailbox Service Setup...3 Before You Begin... 3 Connectivity Testing...

More information

The Adobe XML Architecture

The Adobe XML Architecture TECHNOLOGY BRIEF The Adobe XML Architecture Introduction As enterprises struggle to balance the need to respond to continually changing business priorities against ever-shrinking budgets, IT managers are

More information

28 MARCH Doc. CoRD 041

28 MARCH Doc. CoRD 041 COLLECTION OF RAW DATA TASK FORCE MEETING Nº 4 28 MARCH 2001 Doc. CoRD 041 A brief outline of existing data collection tools and new developments at Statistics Sweden For information Abstract This paper

More information

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc.

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc. Customizing a Packaged Application for a J2EE Environment: A Case Study Leslie Tierstein TopTier Consulting, Inc. 1 Overview (1) Learning experiences in a J2EE Environment The environment Deployment of

More information

Lotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version :

Lotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version : Lotus 190-836 IBM Lotus Notes Domino 8 Developing Web Applications Download Full Version : http://killexams.com/pass4sure/exam-detail/190-836 A. Create a WebQuerySave agent that writes the message to the

More information

Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT

Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT AGENDA 3. Advanced C# Programming 3.1 Events in ASP.NET 3.2 Programming C# Methods 4. ASP.NET Web Forms 4.1 Page Processing

More information

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access

More information

Message exchange with. Finnish Customs

Message exchange with. Finnish Customs Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish

More information

Alpha College of Engineering and Technology. Question Bank

Alpha College of Engineering and Technology. Question Bank Alpha College of Engineering and Technology Department of Information Technology and Computer Engineering Chapter 1 WEB Technology (2160708) Question Bank 1. Give the full name of the following acronyms.

More information

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0) To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0

More information

The new ISTAT network for capturing interview data: the technological architecture

The new ISTAT network for capturing interview data: the technological architecture The new ISTAT network for capturing interview data: the technological architecture Stefania BERGAMASCO*, Gabriele BUDANO*, Luciana QUATTROCIOCCHI and Antonio TOMA* *ISTAT - Information Technology Division

More information

Qualys Cloud Platform (VM, PC) v8.x Release Notes

Qualys Cloud Platform (VM, PC) v8.x Release Notes Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.

More information

Birkbeck (University of London)

Birkbeck (University of London) Birkbeck (University of London) MSc Examination Department of Computer Science and Information Systems Internet and Web Technologies (COIY063H7) 15 Credits Date of Examination: 13 June 2017 Duration of

More information

Rob Weir, IBM 1 ODF and Web Mashups

Rob Weir, IBM 1 ODF and Web Mashups ODF and Web Mashups Basic techniques Rob Weir, IBM robert_weir@us.ibm.com 2009-11-05 1615 1 ODF and Web Mashups Agenda Why it is hard to use ODF in a web app Two techniques for accessing ODF on the web

More information

ELECTRONIC TAXATION IN HUNGARY. Prof. Iván Futó

ELECTRONIC TAXATION IN HUNGARY. Prof. Iván Futó ELECTRONIC TAXATION IN HUNGARY Prof. Iván Futó Corvinus University of Budapest ifuto@informatika.uni-corvinus.hu April 2007 Eastern European egov Days 1 The electronic services of the Hungarian Tax Office

More information

Data Sheet NCP Secure Enterprise Management

Data Sheet NCP Secure Enterprise Management Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and

More information

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2 Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

Suppliers On-Boarding Manual

Suppliers On-Boarding Manual Supplier Information Performance Management Suppliers On-Boarding Manual en_supplier+onboarding+manual_v1 Page 1 of 16 Contents Introduction... 3 Overview... 3 Registration steps... 4 Section 1: Account

More information

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc. REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas

More information

Introduction to Qualtrics

Introduction to Qualtrics Introduction to Qualtrics INDIANA.INTENSITVE.DIDACTIC.SEMINAR.04.05.2014 SCREENSHOTS FROM QUALTRICS UNIVERSITY Slides are available at mypage.iu.edu/~longdoan/iids2014 GO AHEAD AND DOWNLOAD TO FOLLOW ALONG.

More information

Changes in JHawk 6 1 Changes in JHawk6 Virtual Machinery 2015

Changes in JHawk 6 1 Changes in JHawk6 Virtual Machinery 2015 Changes in JHawk 6 1 Changes in JHawk6 Virtual Machinery 2015 Contents Changes in JHawk6... 3 Line counting... 4 System Level... 4 Compilation Unit Level... 4 Package Level... 4 Class Level... 4 Method

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

FOR INTERNAL APPLICANTS ONLY. Current FSU Employees MUST USE Self Service, Recruiting Activities, Careers, to apply for FSU jobs.

FOR INTERNAL APPLICANTS ONLY. Current FSU Employees MUST USE Self Service, Recruiting Activities, Careers, to apply for FSU jobs. FOR INTERNAL APPLICANTS ONLY Current FSU Employees MUST USE Self Service, Recruiting Activities, Careers, to apply for FSU jobs. This job aid outlines the basic steps to apply for a job at Florida State

More information

X-Road: Protocol for Downloading Configuration

X-Road: Protocol for Downloading Configuration X-Road: Protocol for Downloading Configuration Technical Specification Version: 2.1 23.10.2015 26 pages Doc. ID: PR-GCONF 23.10.2015 1/26 Date Version Description Author 04.09.2015 1.4 Minor fixes Siim

More information

Technical Readiness Requirements

Technical Readiness Requirements Technical Readiness Requirements CITY UNIVERSITY OF NEW YORK ERP PROJECT Author: Document Name: Document Revision Version: 4.2 Andrew H. Waxman IT Systems Manager, CUNYFirst Production Support Document

More information

CompTIA i-net+ Certification Exam Objectives (http://www.comptia.org/certification/i-net/objectives.asp)

CompTIA i-net+ Certification Exam Objectives (http://www.comptia.org/certification/i-net/objectives.asp) CompTIA i-net+ Certification Exam Objectives (http://www.comptia.org/certification/i-net/objectives.asp) The skills and knowledge measured by this exam are derived from an industry-wide and worldwide job

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) www.oasis-open.org Management Interoperability Protocol (KMIP) April 2 nd, 2009 1 Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases 2 The Need for Interoperable

More information

Systems Analysis and Design in a Changing World, Fourth Edition

Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements

More information

SOA S90-20A. SOA Security Lab. Download Full Version :

SOA S90-20A. SOA Security Lab. Download Full Version : SOA S90-20A SOA Security Lab Download Full Version : https://killexams.com/pass4sure/exam-detail/s90-20a protocol. Before invoking Service A, Service Consumer A must request a ticket granting ticket and

More information

Collection of Raw Data

Collection of Raw Data Collection of Raw Data TASK FORCE MEETING N 2 27 March 2000 ITEM 3.3 Doc. CoRD 009 IQML: A presentation for CoRD meeting No. 2 For information IQML Overview Chris Nelson Dimension EDI IQML Goal To improve

More information

FOR MORE PAPERS LOGON TO

FOR MORE PAPERS LOGON TO IT430 - E-Commerce Question No: 1 ( Marks: 1 ) - Please choose one RIP(Routing Information protocol) is used by----------, to build a ------------ table _ bridges, hash _ routers, matrix _ routers, routing

More information

Feature Comparison Checklist

Feature Comparison Checklist Feature Comparison Checklist We invite you to use this checklist to help guide your team in identifying your mobile forms requirements. This checklist also provides an easy way to compare the Formotus

More information

WebSphere Data Interchange 3.2 and MQ Link for SAP R/3

WebSphere Data Interchange 3.2 and MQ Link for SAP R/3 WebSphere Data Interchange 3.2 and MQ Link for SAP R/3 Author: Pete Murphy pete_murphy@uk.ibm.com Written: 24nd May, 2003 Version: 1.0 (draft) Introduction WDI 3.2 is certified in the CA -EDI category.

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Apply for Benefits & Manage My Account

Apply for Benefits & Manage My Account Apply for Benefits & Manage My Account Electronic Document Upload Electronic document uploading provides additional capabilities for managing benefits online. Applicants and clients who have a PEAK account

More information

KEYMAN. Security key and certificate management message. Edition 2016

KEYMAN. Security key and certificate management message. Edition 2016 EANCOM 2002 S4 Security key and certificate management message Edition 2016 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5... 6 6. Example(s)...

More information

Perceptive AP Invoice eform

Perceptive AP Invoice eform Perceptive Release Notes Version: 12.2.x Written by: Product Documentation, R&D Date: August 2016 2015 Perceptive Software. All rights reserved Perceptive Software is a trademark of Lexmark International

More information

ESSnet Project. Automated data collection and reporting in accommodation statistics

ESSnet Project. Automated data collection and reporting in accommodation statistics ESSnet Project Automated data collection and reporting in accommodation statistics Report on modified Work Package 5: The Architecture and applications to handle the XML files received directly from the

More information

INDEX. Drop-down List object, 60, 99, 211 dynamic forms, definition of, 4 dynamic XML forms (.pdf), 80, 89

INDEX. Drop-down List object, 60, 99, 211 dynamic forms, definition of, 4 dynamic XML forms (.pdf), 80, 89 A absolute binding expressions, definition of, 185 absolute URL, 243 accessibility definition of, 47 guidelines for designing accessible forms, 47 Accessibility palette definition of, 16 specifying options

More information

Oracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements.

Oracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements. Oracle Workflow Release Notes Release 2.6.2 May 2002 Part No. A95814-02 This document summarizes the differences between Oracle Workflow Release 2.6.2 in Oracle9i Application Server Release 2 (9.0.2) and

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Agenda. XML Generics. XML for Java Developers G Session 1 - Main Theme Markup Language Technologies (Part I)

Agenda. XML Generics. XML for Java Developers G Session 1 - Main Theme Markup Language Technologies (Part I) XML for Java Developers G22.3033-002 Session 1 - Main Theme Markup Language Technologies (Part I) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 000-378 Title : IBM WebSphere DataPower SOA Appliances, Firmware V3.7.3 Vendors : IBM Version : DEMO

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

ITP 140 Mobile Technologies. Mobile Topics

ITP 140 Mobile Technologies. Mobile Topics ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users

More information

IT2353 Web Technology Important Questions 2 Marks and 16 Marks Unit 1 Part A 1. Differentiate Internet with Intranet. 2. What are HTML tags? 3.

IT2353 Web Technology Important Questions 2 Marks and 16 Marks Unit 1 Part A 1. Differentiate Internet with Intranet. 2. What are HTML tags? 3. IT2353 Web Technology Important Questions 2 Marks and 16 Marks Unit 1 1. Differentiate Internet with Intranet. 2. What are HTML tags? 3. Write a script that inputs text from an HTML form and outputs the

More information

ZEND: Survey on the Examination System

ZEND: Survey on the Examination System ZEND: Survey on the Examination System Sun Bingli, K. Ramesh Babu School of Computing Science and Engineering, VIT University, TamilNadu, India bingli_0202@163.com; Abstract With the development of computer

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Impact Analysis for Software changes in OpenLAB CDS A.01.04

Impact Analysis for Software changes in OpenLAB CDS A.01.04 Impact Analysis for Software changes in OpenLAB CDS A.01.04 Document Information: Filename Product Identifier Product Revision Project Identifier Document Revision Impact_Analysis_OpenLAB_CDS_A0104 OpenLAB

More information

Oracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements.

Oracle Workflow. 1 Certification and System Requirements. 1.1 Oracle Workflow Server Hardware and Software Requirements. Oracle Workflow Release Notes Release 2.6.2 April 2002 Part No. A95814-01 This document summarizes the differences between Oracle Workflow Release 2.6.2 in Oracle9i Application Server Release 2 (9.0.2)

More information

NCP Exclusive Remote Access Management

NCP Exclusive Remote Access Management Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 14 Database Connectivity and Web Technologies

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 14 Database Connectivity and Web Technologies Database Systems: Design, Implementation, and Management Tenth Edition Chapter 14 Database Connectivity and Web Technologies Database Connectivity Mechanisms by which application programs connect and communicate

More information

Questionnaire 4.0 Setup Guide 2006/4/14

Questionnaire 4.0 Setup Guide 2006/4/14 Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute

More information

Construction of Support Tools to Assist an Agent System

Construction of Support Tools to Assist an Agent System Construction of Support Tools to Assist an Agent System Tokihiro Fukatsu 1, Masayuki Hirafuji 1 and Takuji Kiura 1 1: National Agriculture and Food Research Organization, Japan, fserver@zoushoku.narc.affrc.go.jp

More information

XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI

XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI Chapter 18 XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI Fábio Ghignatti Beckenkamp and Wolfgang Pree Abstract: Key words: WebEDI relies on the Internet infrastructure for exchanging documents among

More information

SEB GATEWAY Customer to bank online integration. specification v1.04

SEB GATEWAY Customer to bank online integration. specification v1.04 SEB GATEWAY Customer to bank online integration specification v1.04 Document versions Version Date Comments 1.0 2012-12-06 Initial version of the document 1.01 2013-09-04 Added part about supported qualified

More information

Policy Based Device Access Security Position Paper to Device Access Policy Working Group

Policy Based Device Access Security Position Paper to Device Access Policy Working Group 1 (8) Policy Based Device Access Security Position Paper to Device Access Policy Working Group 2 (8) 1. INTRODUCTION Nokia has implemented a policy-based device access security model for its Web runtime

More information

UKOLN involvement in the ARCO Project. Manjula Patel UKOLN, University of Bath

UKOLN involvement in the ARCO Project. Manjula Patel UKOLN, University of Bath UKOLN involvement in the ARCO Project Manjula Patel UKOLN, University of Bath Overview Work Packages User Requirements Specification ARCO Data Model Types of Requirements Museum User Trials Metadata for

More information

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

Oracle Center. Implementation Guide. Release 11i. November 2000 Part No. A

Oracle  Center. Implementation Guide. Release 11i. November 2000 Part No. A Oracle email Center Implementation Guide Release 11i November 2000 Part No. A86113-03 Oracle email Center Implementation Guide, Release 11i Part No. A86113-03 Copyright 2000, Oracle Corporation. All rights

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Perceptive AP Invoice eform

Perceptive AP Invoice eform Perceptive Release Notes Version: 12.2.x Written by: Product Documentation, R&D Date: October 2016 2014 Perceptive Software. All rights reserved Perceptive Software is a trademark of Lexmark International

More information

Web Technology for Test and Automation Applications

Web Technology for Test and Automation Applications Web Technology for Test and Automation Applications Fanie Coetzer - FSE Demo Operator Technician Engineers Your boss Test Sequencer 3 Goal I know nothing I know what it takes to get started on web applications

More information

Albatross: Seaside Web Applications Scenario Testing Framework

Albatross: Seaside Web Applications Scenario Testing Framework Albatross: Seaside Web Applications Scenario Testing Framework Andrea Brühlmann, abrue@students.unibe.ch Supervised by: Adrian Lienhard Software Composition Group University of Bern, Switzerland September

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

ITP 342 Mobile App Development. APIs

ITP 342 Mobile App Development. APIs ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually

More information

Symmetric Key Services Markup Language Use Cases

Symmetric Key Services Markup Language Use Cases Symmetric Key Services Markup Language Use Cases Document Version 1.1 - February 28, 2007 The OASIS Symmetric Key Services Markup Language (SKSML) is the proposed language/protocol that defines how a client

More information

SUPPLIER REGISTRATION DEFINITION ON EXTERNAL LINK

SUPPLIER REGISTRATION DEFINITION ON EXTERNAL LINK SUPPLIER REGISTRATION DEFINITION ON EXTERNAL LINK When Supplier Registration is accessed from an external link, a screen will appear where you can enter the supplier summary information. On this screen,

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps:// IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 1Z0-134 Title : Oracle WebLogic Server 12c: Advanced Administrator II Version : Demo 1 / 4 1.I am configuring

More information

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider. Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

Copyright

Copyright This video will look at the different components that make up Active Directory Certificate Services and which services you should look at installing these components on. Which components to install where?

More information

ACCESS NetFront TM Browser

ACCESS NetFront TM Browser Security for Access to Device APIs from the Web - W3C Workshop 10-11 December 2008, London ACCESS NetFront TM Browser Marcin Hanclik, R&D, ACCESS CO., LTD. Widgets NetFront Browser Widgets (hereafter NFBW)

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

Performance and security enhancements on the Blaise IS standard stylesheet

Performance and security enhancements on the Blaise IS standard stylesheet Performance and security enhancements on the Blaise IS standard stylesheet Arnaud Wijnant, Edwin de Vet CentERdata, Tilburg University, The Netherlands 1 Abstract CentERdata has several years of experience

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

PKI Trustpool Management

PKI Trustpool Management PKI Trustpool Management Last Updated: October 9, 2012 The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted

More information

Enhancing Your Customer Facing Documents (updated 10/03/2017)

Enhancing Your Customer Facing Documents (updated 10/03/2017) Dolphin Dynamics Enhancing Your Customer Facing Documents (updated 10/03/2017) Copyright 2016 Dolphin Dynamics Ltd. The information contained herein is the property of Dolphin Dynamics Ltd. No part of

More information

IBM Integration Bus v9.0 System Administration: Course Content By Yuvaraj C Panneerselvam

IBM Integration Bus v9.0 System Administration: Course Content By Yuvaraj C Panneerselvam IBM Integration Bus v9.0 System Administration: Course Content By Yuvaraj C Panneerselvam 1. COURSE OVERVIEW As part of this course, you will learn how to administer IBM Integration Bus on distributed

More information

ESRI stylesheet selects a subset of the entire body of the metadata and presents it as if it was in a tabbed dialog.

ESRI stylesheet selects a subset of the entire body of the metadata and presents it as if it was in a tabbed dialog. Creating Metadata using ArcCatalog (ACT) 1. Choosing a metadata editor in ArcCatalog ArcCatalog comes with FGDC metadata editor, which create FGDC-compliant documentation. Metadata in ArcCatalog stored

More information

The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.

The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library. 1 Introduction This document is the technical reference for Signaturgruppens SPS.Client library. The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.

More information

Agenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II)

Agenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II) XML for Java Developers G22.3033-002 Session 6 - Main Theme XML Information Processing (Part II) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

CCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT

CCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT TM ASSURANCE CONTINUITY MAINTENANCE REPORT FOR Aruba Remote Access Points Maintenance Update of Aruba Remote Access Points Maintenance Report Number: CCEVS-VR-VID10766-2017a Date of Activity: September

More information