Project acronym: TraSer. Duration: 36 months. System Architecture

Size: px
Start display at page:

Download "Project acronym: TraSer. Duration: 36 months. System Architecture"

Transcription

1 Project acronym: Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: Sixth Framework Programme IST Call 5 Fp IST-5 ICT for Networked Businesses Priority 2 Specific Targeted Research Project Duration: 36 months System Architecture Document Date : 28 th of August 2007 Organisation and authors Abstract : RUG: Fred van Blommestein, TNO: Bram van der Waaij and Erik Langius HUT: Teppo Tossavainen SZTAKI: Marcell Szathmári : This document describes the system architecture: the components, their functions and the protocols of communication between the components. RUG: University of Groningen TNO: Netherlands Organization for Applied Scientific Research HUT: Helsinki University of Technology SZTAKI: Computer and Automation Research Institute, Hungarian Academy of Sciences

2 Table of Contents 1. Introduction Traser architectural overview rmation representation Registering events ing and reporting CACHING and BUFFERING interoperation with non-traser environments Confidentiality and transfer of information custody Standards future developments References INTRODUCTION In this document the architecture of the infrastructure (software and protocols) is elaborated. 2. TRASER ARCHITECTURAL OVERVIEW Storage Storage Figure 1. system A system consists of the following components: Items: Objects that carry a unique identification number Other objects Reading devices that can read Item Identifications s that allow users to register item related events with or without reading devices s that store item related events s that may query or subscribe to item related information 2

3 Objects may be tangible (a box) or intangible (a purchase order). Objects are of a certain type. Objects have properties. The Object type describes the kind of properties (Property Types). Properties are directed, tagged associations with other objects or with data types. Data types conform to the Data Type system of ISO (UN/CEFACT Core Components) [1]. Data types are represented in XML following the UN/CEFACT XML Naming and Design Rules 2.0 [2]. Items are Objects that have a unique, world wide identification number as a special property. Other properties are assigned to Items by means of Events. Events are registered by s or generated by s. s and s are roles of applications participating in the network. The identification of an Item consists of a URI and a number, unique within the scope of that URI. Identifications may be affixed to the item in the form of a machine readable label: a bar code, an RFID tag or otherwise. Is a Object Item Has Refers to Relates to Has Property or is represented by Event ID@URI Is a DataType Figure 2. Data model Basically, the identification has the format ID@URI. The representation may however differ per label or storage format. The ID and the URI may be stored as different data elements. The ID@URI is the key to information on the Item. The URI must be resolvable and must support defined protocols to store and retrieve that information. Reading devices read the identification of labels or tags of Items. They may also read or add other information and transmit that to the that is to register the recorded information as Event. For the communication between Labels or Tags and Reading devices, and between Reading Devices and s relies on standard protocols, such as ISO Events happen to Items. Events are of an Event Type. The Event Type describes the Properties that may be assigned by the Event to an Item. s upload Events that are recorded, with the Event Timestamp, the Event Type, the responsible organisation and any additional data on the Event as defined by its Type to the, identified by the URI. Events may be triggered by reading tags or labels, but may also happen apart from the Item, e.g. when an Item is sold. s store Item+Event related information. Events are stored, not changed or deleted during the time there information is needed. s may support a retention period, after which outdated information may be cleaned up. protocols do not support active deletion by s. Items are identified by their ID@URI and Events by their timestamp. That information may be retrieved by s, or it may actively be distributed to s that have subscribed to the information. Events may affect other Items as well. Based on rules to be stored on the, other events may be created and uploaded to the applicable servers, see chapter 4. It is at the discretion of the what Event Types it supports and stores per Item Type. s may also restrict the s they serve, but as the objective of 3

4 is to establish an open environment, s should be as tolerant as acceptable in their support to s. s may retrieve Item related information from s by querying them or by subscribing on periodic or event triggered reports. 1.0 allows only predefined queries with the restriction that an Item ID@URI always must be used as a key. Free queries and selection of items by other properties is foreseen in a later version. The concept allows traversing Item related graphs or lattices. Item Item Internet Figure 3. Overall configuration 3. INFORMATION REPRESENTATION Item related information is represented as XML structures in queries and reports. X as a query language allows to filter Event Types and Properties based on arbitrary criteria. limits the selection of Items to the knowledge of their ID@URIs. So it is possible to pose the query Give the colour of item 123@traser.org, but it is not possible to ask Give me the identification numbers of all blue items. In 1.0 queries are predefined. On the semantic web information elements are all regarded as Resources that have URIs. Even values of data types carry a URI. The information is represented as a graph or lattice. One may traverse such graph to retrieve the needed information. This principle resembles the principle in many aspects. Items all have ID@URIs and information can be retrieved by traversing the graph of Items that refer to each other by means of their properties. information is transferred as XML messages. XML has a hierarchical structure. The root of XML messages is an Item or a set of Items, identified by their ID@URI. The set contains all items that are related to an event or that are the response to a query. The structure basically lists the properties of the Items and the properties of other objects. When the property of an Item is another Item, the properties of the other Item are listed in a new tree. To illustrate the structure the following example is given. Note that the precise XML representation may be different in practise, only the overall structure is illustrated. 4

5 <update> <item type= rollcage id= > <event type= stuff id= > <weight unit= kg >5</weight> <location> <address>tracking Lane 1</address> <city>budapest</city> </location> <contains> <item id= /> <item id= /> <item id= /> </contains> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >1</weight> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >1.5</weight> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >2.5</weight> </event> </item> </update> In this example weight is represented by a data type and location is an object without an ID@URI. Properties of Items, contained in the rollcage are represented on top level. XML messages are constructed conform the UN/CEFACT Naming and Design Rules [2]. 4. REGISTERING EVENTS All events to be registered in a data store have the ID@URI of an Item and a timestamp as their key. Events may be triggered by the scanning of a barcode or the reading of an RFID tag, but may also happen when the Item is subject to some administrative or commercial transaction. Depending on the character of the Item and on the application area many kinds of different events may need to be defined. In the pilots a few will be used, related to the asset management and Supply chain control application areas. Examples may be Check out, Check in, Load, Unload, Store, Ship, etc. In the future Event Types will be stored in the UN/CEFACT Core Component Library. Each pre-defined event will have its data structure defined that will be represented as an XML schema. 5

6 An event on one item may trigger events on other items. If, for example, a roll cage is shipped, as a consequence all boxes inside the roll cage are shipped as well. There are two ways to handle such occasion: the status of the boxes may be updated or at query time they are calculated based on them being packed in the roll cage. supports both. Per application it is to be decided whether updates are propagated to related Items or not. The trade-off to be made is between update- and query efficiency. 6

7 Rule Base Item Item 2 1 Internet Figure 4. Propagated uploads 5. QUERYING AND REPORTING nodes may query a on information about Items. In 1.0 no generic query language will be supported, but the queries will be predefined, based on the application requirements. Queries will be expressed in the generic query language X. Responses will be formatted as XML messages conform UN/CEFACT Naming and Design Rules. processing may involve composing new or derived queries by the that are submitted to other servers. E.g. a query that is requesting the weight of the boxes that are contained in a roll cage may imply that the that holds information on the roll cage queries the servers that hold information about the boxes. Rule Base Roll Cage Box 1 2 Internet Figure 5. Propagated queries clients may also subscribe to Item information. rmation delivery may be event based or periodic. Key to subscriptions is always a ID@URI or a list of ID@URIs. 7

8 6. CACHING AND BUFFERING Due to technical limitations (e.g. the availability of an Internet connection) and performance reasons, upload propagation need not always to be performed directly after the original event was uploaded. At several places in the network uploads may temporarily be buffered: - in the transponder, until the transponder (that may have sensors for e.g. temperature) is read by a reading device - in the reading device, until an Internet connection is available to connect to an - in the, until performance allows propagation of the upload. When querying, it is indicated whether it is acceptable for the query client to receive not total up-to-date information. If information at all times need to be up-to-date, the server node, before answering the query, is to request other servers that are likely to produce updates to empty their buffer. These other servers are selected based on relations the item has with other items. E.g. if a box was stuffed in a roll cage, when querying the status of the box, the server of the roll cage is queried as well. Conversely, servers that have received information because of propagated queries may cache the results to improve performance. They may distribute cached information if allowed by the query client. By means of buffering and caching and the indication of service levels in the queries, a trade off can be established between performance and information accuracy and actuality. 8

9 7. INTEROPERATION WITH NON-TRASER ENVIRONMENTS As not all industrial users obey principles (yet), an Item identification scheme may be different from E.g. the identification may be represented as a Serial Shipping Container Code (SSCC) instead. In such case a translation must be made to the ID@URI. For such cases the architecture offers three options: - clients may store information on all non items in a default server with a fixed URI - Based on certain parameters (e.g. the SSCC prefix or the ISO allocation class), stored in local client settings, a URI may be chosen by the upload client - The upload client may access a look-up service, that responds with an URI based on the existing ID plus possible extra characteristics (such as the Item Type) will support protocols to use ID@URI look-up services. The URI stored in a client or looked-up through a service needs not be the final URI where the Item information is stored. The update and query traffic may further be redirected based on criteria at the node. Such redirection however should be invisible for the clients. Another special case is when multiple (but different) ID@URIs are affixed to the item, or when an Item label is replaced with one with a different ID@URI. This may be needed when the IDs are pre-allocated to or pre-printed on the label. In this case all URIs should ultimately point or redirect to the URI where the Item information is stored (see also chapter 6). 8. CONFIDENTIALITY AND TRANSFER OF INFORMATION CUSTODY Not everyone is entitled to upload or query information of Items. Each information category of each Item has an owner. The owner decides who may query and who may upload parts of the information belonging to that category. The concept is however based on an open environment and is jeopardised if upload restrictions are too strict. It should for instance not be necessary for a carrier to register with each of the information owners in order to scan the Items he carries. Item rmation ownership and rights Internet Figure 6. rmation Confidentiality 9

10 Updates of information ownership and user rights is registered as a special kind of events. Change of information ownership may imply that storage services are transferred to a new node. The new owner of the information is also responsible for rendering these services and he may decide to employ another service. It is also possible that the former owner is not authorised any longer to retrieve certain Item related information. Wholesalers for instance sometimes do not wish manufacturers to know who are the final customers. Yet the URI of the first information owner in the chain may be affixed to the Item as a barcode or in an RFID tag. therefore includes a redirect mechanism. In case information storage is transferred to a new server, a link will be established on the old server. rmation upload and retrieval is not performed directly, first the server is interrogated whether he still holds the applicable information. This mechanism is illustrated in figure 6. Principles are: The identity of clients and nodes should be verified by means of signatures and certificates The er is agnostic about information confidentiality requirements, the protocol must always be the same. URI transfers may be cached: the second upload or query is directed to the right node immediately The types of information should be coded (technical, logistic, usage) does not support: The case when downstream parties (e.g. customers) should not know the identity of the URI holder The case when manufacturers refuse to transfer ownership (or have bad or illegal intentions) 10

11 Manufacturer (URI1) Wholesaler (URI2) Retailer (URI3) Carrier I have transport related info on Product with ID 123@URI1 Send it to URI2 I have transport related info on Product with ID 123@URI1 Send it to URI3 I have transport related info on Product with ID 123@URI1 OK Product with ID 123 was on at X OK Figure 7. rmation ownership When some party in the chain drops out without redirecting its URI or without updating the redirects upstream, the chain is broken and information on the Item cannot be retrieved or updated any longer. This problem can not be resolved technically, but should be covered contractually. 9. STANDARDS The various architectural components conform to international standards: Data identification in barcoding (FACT Data Identifiers and GS1 Application Identifiers) Data identification in RFID (ISO 15961, 15962, 15963) ISO (Core Components) IETF RFC 2396 Uniform Resource Identifiers XML Schema X UN/CEFACT XML Naming and Design Rules UN/CEFACT Core Component Library UN/CEFACT Core Component Message Assembly 10. FUTURE DEVELOPMENTS In developments after 1.0 the following extensions to the architecture are foreseen: Free query formulation Dynamic updating of Item and Event types Queries on item information selected by other criteria than ID@URI Explicit support of mobile communication systems and geographical information systems 11

12 Reporting of history and statistics 11. REFERENCES [1] ISO (UN/CEFACT Core Components). [2] UN/CEFACT XML Naming and Design Rules

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

3GPP TS V ( )

3GPP TS V ( ) TS 24.341 V12.6.0 (2014-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Support of SMS over IP networks; Stage 3 (Release 12) The

More information

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2)

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) Functional requirements and design specification for an ONIX-PL license expression drafting system 1. Introduction This document specifies a

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

AUTACK. Secure authentication and acknowledgement message. Edition 2012

AUTACK. Secure authentication and acknowledgement message. Edition 2012 Secure authentication and acknowledgement message Edition 2012 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout... 6 6. Example(s)...

More information

Common Reference Data Management for TIPS

Common Reference Data Management for TIPS for TIPS s V0.1.0 Author 4CB Version 0.1.0 Date 16/01/2018 All rights reserved. INTRODUCTION... 4 READER S GUIDE... 4 1. GENERAL FEATURES OF CRDM... 5 1.1. INTRODUCTION TO THE CRDM SERVICE... 5 1.2. ACCESS

More information

AutomationDirect.com Order Import Feature

AutomationDirect.com Order Import Feature AutomationDirect.com Order Import Feature This document describes the requirements to upload a CSV or XML format order file from your system into our AutomationDirect.com E-commerce system to create an

More information

WP doc5 - Test Programme

WP doc5 - Test Programme European Commission DG Enterprise IDA PKI European IDA Bridge and Gateway CA Pilot Certipost n.v./s.a. Muntcentrum 1 B-1000 Brussels Disclaimer Belgium p. 1 / 29 Disclaimer The views expressed in this

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

IPv6 Address Allocation and Assignment Policy

IPv6 Address Allocation and Assignment Policy IPv6 Address Allocation and Assignment Policy How to read this draft document: This document relates to a project to improve the readability of RIPE policy documents. If approved, it will replace ripe-512,

More information

STAR Naming and Design Rules. Version 1.0

STAR Naming and Design Rules. Version 1.0 Version 1.0 March 2007 Revision History Revision Date Version Initial Version March 13, 2007 1.0 Table of Contents 1. Introduction...1 1.1 Purpose...1 1.2 Objective... 1 1.3 Scope...1 1.4 Prerequisites...1

More information

Data Subject Access Request Form

Data Subject Access Request Form Please read the Guidance Notes which accompany this form before completing the form. Please complete the form in block capitals. Please submit your completed request form as a secure email attachment to

More information

Omni-ID Service Bureau Reference Guide

Omni-ID Service Bureau Reference Guide Omni-ID Service Bureau Reference Guide Based on a Standard Label format Omni-ID office locations: US UK China India Germany D002093-03 TABLE OF CONTENTS INTRODUCTION... 3 LABEL MATERIAL OPTIONS... 3 CHIP

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

Web Services Registry Web Service Interface Specification

Web Services Registry Web Service Interface Specification Nationwide Health Information Network (NHIN) Web Services Registry Web Service Interface V 2.0 1/29/2010 Page 1 of 11 Contributors Name NHIO Represented Organization Craig Miller NHIN-C Vangent Neel Phadke

More information

3GPP TS V ( )

3GPP TS V ( ) 3GPP TS 24.379 V13.1.1 (2016-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Networks and Terminals; Mission Critical Push To Talk (MCPTT) call control;

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface

ISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface INTERNATIONAL STANDARD ISO/IEC 29179 First edition 2012-02-01 Information technology Mobile item identification and management Mobile AIDC application programming interface Technologies de l'information

More information

AUTACK. Secure authentication and acknowledgement message. Edition 2016

AUTACK. Secure authentication and acknowledgement message. Edition 2016 EANCOM 2002 S4 Secure authentication and acknowledgement message Edition 2016 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout...

More information

Royal Mail Mailmark Participant Terms & Conditions

Royal Mail Mailmark Participant Terms & Conditions Royal Mail Mailmark Participant Terms & Conditions Who these Royal Mail Mailmark Participant Terms & Conditions apply to: Royal Mail Group Ltd, a company incorporated in England and Wales (number 4138203)

More information

EPC e-mandates e-operating Model. Detailed Specification

EPC e-mandates e-operating Model. Detailed Specification Doc: EPC208-08 9 April 2013 Version 1.2 Approved EPC EPC e-mandates e-operating Model Detailed Specification Abstract Document Reference Issue This is the Detailed Specification for the development of

More information

ISO/IEC Information technology Software asset management. Part 2: Software identification tag

ISO/IEC Information technology Software asset management. Part 2: Software identification tag INTERNATIONAL STANDARD ISO/IEC 19770-2 Second edition 2015-10-01 Corrected version 2017-02 Information technology Software asset management Part 2: Software identification tag Technologies de l information

More information

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section

More information

Document A: The relationship between VISI, COINS and IDM

Document A: The relationship between VISI, COINS and IDM Document A: The relationship between VISI, COINS and IDM Contents 1. Introduction... 1 2. VISI concepts... 1 3. COINS... 3 4. IDM - Information Delivery Manual... 5 Process Map... 6 Exchange requirement...

More information

European Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 2: Definitions

European Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 2: Definitions European Component Oriented Architecture (ECOA ) Collaboration Programme: Part 2: Definitions BAE Ref No: IAWG-ECOA-TR-012 Dassault Ref No: DGT 144487-D Issue: 4 Prepared by BAE Systems (Operations) Limited

More information

UN/CEFACT SIMPLE, TRANSPARENT AND EFFECTIVE PROCESSES

UN/CEFACT SIMPLE, TRANSPARENT AND EFFECTIVE PROCESSES UN/CEFACT SIMPLE, TRANSPARENT AND EFFECTIVE PROCESSES FOR GLOBAL BUSINESS DRAFT BUSINESS REQUIREMENTS SPECIFICATION (BRS) Vessel domain Business domain: Fisheries Business process: Electronic data exchange

More information

Using Common Media Manifest with Interoperable Media Format (IMF)

Using Common Media Manifest with Interoperable Media Format (IMF) Using Common Media Manifest with Interoperable Media Format (IMF) Motion Picture Laboratories, Inc. 1 CONTENTS 1 Introduction... 4 1.1 Background... 4 1.2 Document Organization... 4 1.3 Document Naming

More information

INFORMATION ON THE PROCESSING OF PERSONAL DATA. (to be inserted in the link at the bottom of the page "privacy policy")

INFORMATION ON THE PROCESSING OF PERSONAL DATA. (to be inserted in the link at the bottom of the page privacy policy) INFORMATION ON THE PROCESSING OF PERSONAL DATA (to be inserted in the link at the bottom of the page "privacy policy") Pra'delle Torri S.r.l. Holiday Centre with head office at Viale Altanea 201 - Pra'

More information

2013 edition (version 1.1)

2013 edition (version 1.1) 2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:

More information

CATI Scenario and Architecture

CATI Scenario and Architecture CATI Charging and Accounting Technology for the Internet SNF SPP Projects 5003-054559/1 and 5003-054560/1 CATI Scenario and Architecture Gabriel Dermler IBM Research Division, Zürich Laboratories Workpackage

More information

Notifications for the Payment API

Notifications for the Payment API Notifications for the Payment API Legal Disclaimer This document and the information contained herein (collectively, the "Information") is provided to you (both the individual receiving this document and

More information

TRADELENS. Data Sharing Specification. Version General Availability

TRADELENS. Data Sharing Specification. Version General Availability Introduction This document describes the data sharing model that TradeLens implements. It describes the data that various participants provide to the platform, how that data are shared with others, and

More information

Business to Consumer Markets on the Semantic Web

Business to Consumer Markets on the Semantic Web Workshop on Metadata for Security (W-MS) International Federated Conferences (OTM '03) Business to Consumer Markets on the Semantic Web Prof. Dr.-Ing. Robert Tolksdorf, Dipl.-Kfm. Christian Bizer Freie

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

Rules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12

Rules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12 Rules for Operators Version 6 / 2011-05-13 Version 6, 13 May 2011 Page 1/12 TABLE OF CONTENTS 1. Introduction... 3 2. Application for certification and FAMI-QS associate membership... 3 3. Assessment of

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00 F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...

More information

Beginning To Define ebxml Initial Draft

Beginning To Define ebxml Initial Draft Beginning To Define ebxml Initial Draft File Name Version BeginningToDefineebXML 1 Abstract This document provides a visual representation of how the ebxml Architecture could work. As ebxml evolves, this

More information

HOW PERSISTENT CHAT SERVER WORKS

HOW PERSISTENT CHAT SERVER WORKS HOW PERSISTENT CHAT SERVER WORKS LYNC SERVER 2013 Lync Server 2013, Persistent Chat Server enables you to participate in multiparty, topic-based conversations that persist over time. Persistent Chat Server

More information

Using Common Media Manifest with Interoperable Media Format (IMF)

Using Common Media Manifest with Interoperable Media Format (IMF) Using with Interoperable Media Format (IMF) Motion Picture Laboratories, Inc. 1 CONTENTS 1 Introduction... 4 1.1 Background... 4 1.2 Document Naming and Conventions... 4 1.3 Normative References... 5 2

More information

RFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065

RFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Procedure 3: Certification Body Approval for Chain of Custody Standard Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Version 4, Jan 2018 1 1.0 Purpose This document

More information

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using Traffic Mirroring, Release 4.0.x 1 Overview 2 Configuring Traffic Mirroring

More information

HarePoint HelpDesk for SharePoint. User Guide

HarePoint HelpDesk for SharePoint. User Guide HarePoint HelpDesk for SharePoint For SharePoint Server 2016, SharePoint Server 2013, SharePoint Foundation 2013, SharePoint Server 2010, SharePoint Foundation 2010 User Guide Product version: 16.2.0.0

More information

COMMIUS Project Newsletter COMMIUS COMMUNITY-BASED INTEROPERABILITY UTILITY FOR SMES

COMMIUS Project Newsletter COMMIUS COMMUNITY-BASED INTEROPERABILITY UTILITY FOR SMES Project Newsletter COMMUNITY-BASED INTEROPERABILITY UTILITY FOR SMES Issue n.4 January 2011 This issue s contents: Project News The Process Layer Dear Community member, You are receiving this newsletter

More information

SCP Embraer Supplier Guide

SCP Embraer Supplier Guide SCP Embraer Supplier Guide Revised 1 Contents Introduction... 5 Getting Started... 5 How to Log In to SCP... 5 Steps to Complete First Time Login... 6 Steps to Log-in to SCP... 7 General Navigation and

More information

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved. Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information

More information

OnlineNIC PRIVACY Policy

OnlineNIC PRIVACY Policy OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.

More information

Interoperability and transparency The European context

Interoperability and transparency The European context JOINING UP GOVERNMENTS EUROPEAN COMMISSION Interoperability and transparency The European context ITAPA 2011, Bratislava Francisco García Morán Director General for Informatics Background 2 3 Every European

More information

FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents

FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users Contents 1. What does the new regulation relate to?... 3 1.1. What will change?... 3 1.2.

More information

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using RDRs, Release 4.1.x 1 Overview 2 Configuring Behavioral Targeting Support:

More information

SECTION III: SEED AND REFERENCE DATA

SECTION III: SEED AND REFERENCE DATA SECTION III: SEED AND REFERENCE DATA ECP1-ESS-FESSv3.82-3-SECTION III SEED.doc Page 1 of 57 DOCUMENT HISTORY Document History Edi. Rev. Date Description Action (*) Sections 0 01 26/08/2004 Creation I All

More information

Novel System Architectures for Semantic Based Sensor Networks Integraion

Novel System Architectures for Semantic Based Sensor Networks Integraion Novel System Architectures for Semantic Based Sensor Networks Integraion Z O R A N B A B O V I C, Z B A B O V I C @ E T F. R S V E L J K O M I L U T N O V I C, V M @ E T F. R S T H E S C H O O L O F T

More information

Interface Certification for a RMA Interface

Interface Certification for a RMA Interface Title Page Interface Certification for a RMA Interface CGI RMA Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier... 3 1.2 Product Information... 3 1.3 Operational

More information

Certificate Software Asset Management Essentials Syllabus. Version 2.0

Certificate Software Asset Management Essentials Syllabus. Version 2.0 Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials

More information

edelivery SMP Profile Test Assertions Description

edelivery SMP Profile Test Assertions Description EUROPEAN COMMISSION DIGIT Connecting Europe Facility edelivery SMP Profile Test Assertions Description European Union, 2018 Reuse of this document is authorised provided the is acknowledged. The Commission's

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

PEFC Certification System Netherlands - Certification Procedures

PEFC Certification System Netherlands - Certification Procedures PCSN SCHEME DOCUMENT PCSN IV Issue 2 10-03-2017 PEFC Certification System Netherlands - Certification Procedures PEFC Netherlands Kokermolen 11 3994 DG Houten The Netherlands Tel: +31 30 693 0040 Fax:

More information

The search being performed may take a significant time so a forking proxy must send a 100 Trying response.

The search being performed may take a significant time so a forking proxy must send a 100 Trying response. SIP Response Codes Article Number: 178 Rating: Unrated Last Updated: Wed, Nov 15, 2017 at 2:31 PM SIP Response Codes 1xx Provisional Responses 100 Trying Extended The search being performed may take a

More information

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim Computer Networks Introduction to Network Dr. Adel Gaafar Abd Elrahim A Communications Model Source generates data to be transmitted Transmitter Converts data into transmittable signals Transmission System

More information

RESOLV EDI CONTROL. User Guide Version 9.2 for HANA PRESENTED BY ACHIEVE IT SOLUTIONS

RESOLV EDI CONTROL. User Guide Version 9.2 for HANA PRESENTED BY ACHIEVE IT SOLUTIONS RESOLV EDI CONTROL User Guide Version 9.2 for HANA PRESENTED BY ACHIEVE IT SOLUTIONS Copyright 2011-2016 by Achieve IT Solutions These materials are subject to change without notice. These materials are

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology

ISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology INTERNATIONAL STANDARD ISO/IEC 21000-21 First edition 2013-07-01 Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology Technologies de l'information Cadre multimédia (MPEG-21)

More information

Description of the TÜV NORD CERT certification procedure GMP+ FC (Feed Certification scheme) of GMP+ International B.V. (NL)

Description of the TÜV NORD CERT certification procedure GMP+ FC (Feed Certification scheme) of GMP+ International B.V. (NL) Certific ation Table of contents 1 CERTIFICATION PROCEDURE... 3 1.1 Audit Preparation... 3 1.2 Establishment of readiness for certification... 3 1.3 Temporary approval... 3 1.4 Audit Stage 2 Certification

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

OPC XML-DA Client Driver PTC Inc. All Rights Reserved.

OPC XML-DA Client Driver PTC Inc. All Rights Reserved. 2018 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 Project Architecture 5 Setup 6 Channel Properties General 6 Channel Properties Write Optimizations 7 Channel Properties

More information

Inclusions. Your Package Inclusions & Conditions.

Inclusions. Your Package Inclusions & Conditions. Inclusions Your Package Inclusions & Conditions SHOPPING CART WEBSITE You have purchased a fully functional website that has been built using the Woo Commerce Cart plugin on the Word Press platform. Word

More information

IT Supplier Portal Help Manual

IT Supplier Portal Help Manual IT 1/9 Contenido de este manual Introduction.... 2 How the portal works... 3 If you enter for the first time:... 4 Warning of new document available:... 4 Establish a download reservation.... 6 View article

More information

Accreditation & Certification Supplier Guide

Accreditation & Certification Supplier Guide Accreditation & Certification Supplier Guide Network Connectivity Products and Services Connected Health Version 1.0 Table of Contents 1 PREFACE... 3 1.1 AUDIENCE...3 1.2 PURPOSE...3 1.3 SCOPE...3 2 CONNECTED

More information

Public Key Infrastructures. Andreas Hülsing

Public Key Infrastructures. Andreas Hülsing Public Key Infrastructures Andreas Hülsing How to share Keys with PGP Attach to mail Use Key Server Still need to verify key validity! 28-5-2014 PAGE 1 PGP Keyserver Synchronization Graph http://www.rediris.es/keyserver/graph.html

More information

Privacy Policy of

Privacy Policy of Privacy Policy of www.bitminutes.com This Application collects some Personal Data from its Users. Owner and Data Controller BitMinutes Inc Owner contact email: privacy@bitminutes.com Types of Data collected

More information

Guidelines for Certification Symbol and Standard Mark Guidelines Valid from: 15/12/2014 Distribution: Internal & External

Guidelines for Certification Symbol and Standard Mark Guidelines Valid from: 15/12/2014 Distribution: Internal & External Guidelines for Certification Symbol and Standard Mark Guidelines Valid from: 15/12/2014 Distribution: Internal & External PREPARED BY: Head (MSCD) APPROVED BY: C.E.O PAGE : 1 OF 10 Table of Content 1.

More information

Chapter 1: Introduction

Chapter 1: Introduction EE4272: Computer Networks Chapter 1: Introduction Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. 1) Data Communications: Deals with the transmission of signals in a reliable & efficient manner. Topics:

More information

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 First Published: 2017-11-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems,

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0 Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Response to the. ESMA Consultation Paper:

Response to the. ESMA Consultation Paper: Response to the ESMA Consultation Paper: Draft technical standards on access to data and aggregation and comparison of data across TR under Article 81 of EMIR Delivered to ESMA by Tahoe Blue Ltd January

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

Special Topics. Module 14: "Directory-based Cache Coherence" Lecture 33: "SCI Protocol" Directory-based Cache Coherence: Sequent NUMA-Q.

Special Topics. Module 14: Directory-based Cache Coherence Lecture 33: SCI Protocol Directory-based Cache Coherence: Sequent NUMA-Q. Directory-based Cache Coherence: Special Topics Sequent NUMA-Q SCI protocol Directory overhead Cache overhead Handling read miss Handling write miss Handling writebacks Roll-out protocol Snoop interaction

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag INTERNATIONAL STANDARD ISO/IEC 19770-2 First edition 2009-11-15 Information technology Software asset management Part 2: Software identification tag Technologies de l'information Gestion de biens de logiciel

More information

Internet Engineering Task Force (IETF) Obsoletes: 7302 September 2016 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Obsoletes: 7302 September 2016 Category: Informational ISSN: Internet Engineering Task Force (IETF) P. Lemieux Request for Comments: 7972 Sandflow Consulting LLC Obsoletes: 7302 September 2016 Category: Informational ISSN: 2070-1721 Entertainment Identifier Registry

More information

BCS Practitioner Certificate in Information Risk Management Syllabus

BCS Practitioner Certificate in Information Risk Management Syllabus BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Affixing the ISAN. Possibilities Technical specifications

Affixing the ISAN. Possibilities Technical specifications Affixing the ISAN Possibilities Technical specifications 1 The ISAN Identifier ISO 15706 Root Episode Version ISAN 1234-5678-9101-0004-X-0000-00A1-Y Check Serie Episode Work Version 1234-5678-9101-0000-E-0000-0000-A

More information

Case Study: idworx!... electronic WAWF and UID submittals reduces time and errors.

Case Study: idworx!... electronic WAWF and UID submittals reduces time and errors. Case Study: idworx!... electronic WAWF and UID submittals reduces time and errors. Case Study Introduction A leading global supplier of systems and services to the Aerospace and Defense industry needed

More information

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining

More information

National Aeronautics and Space and Administration Space Administration. cfe Release 6.6

National Aeronautics and Space and Administration Space Administration. cfe Release 6.6 National Aeronautics and Space and Administration Space Administration cfe Release 6.6 1 1 A Summary of cfe 6.6 All qualification testing and documentation is now complete and the release has been tagged

More information

Telenor MDM v x Zero Touch Enrollment

Telenor MDM v x Zero Touch Enrollment Telenor MDM v.5.38.0x Zero Touch Enrollment Telenor Mobile Device Management Document information Date: 22.11.2018 Version: 5.38.0x EN Version-history Version Date Comments Edited by 1.0 22.11.2018 Format

More information

Intelligence Community and Department of Defense Content Discovery & Retrieval Integrated Project Team (CDR IPT)

Intelligence Community and Department of Defense Content Discovery & Retrieval Integrated Project Team (CDR IPT) Intelligence Community and Department of Defense Content Discovery & Retrieval Integrated Project Team (CDR IPT) IC/DoD REST Encoding Specification for CDR Brokered Search v1.1 12 May 2011 REVISION/HISTORY

More information

Intelligent Products. BIT Research Centre Aalto University, School of Science and Technology, Finland

Intelligent Products. BIT Research Centre Aalto University, School of Science and Technology, Finland Intelligent Products Kary Främling BIT Research Centre Aalto University, School of Science and Technology, Finland Tracking with ID@URI Manufacturer Set ID@URI Transp.comp. A ID@URI Transp.comp. B Transp.comp.

More information

Request for Comments: ISSN: S. Cantor Shibboleth Consortium August 2018

Request for Comments: ISSN: S. Cantor Shibboleth Consortium August 2018 Independent Submission Request for Comments: 8409 Category: Informational ISSN: 2070-1721 I. Young, Ed. Independent L. Johansson SUNET S. Cantor Shibboleth Consortium August 2018 Abstract The Entity Category

More information

Setting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1

Setting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1 Up a Cisco Unified Communications Manager SIP Trunk Integration This chapter provides instructions for setting up a Cisco Unified Communications Manager SIP trunk integration with Cisco Unity Connection.

More information

Creating User Manageable Security Zones

Creating User Manageable Security Zones Creating User Manageable Security Zones The Boeing SCADAnet Technology Craig Dupler, Boeing Eric Byres, Byres Security Inc. Three Important Things for Security 1. Simplicity 2. Bite-size e Pieces 3. Clear

More information