A Tale of Two Open Source Cryptography Projects. Bouncy Castle EJBCA
|
|
- Cora Warren
- 6 years ago
- Views:
Transcription
1 A Tale of Two Open Source Cryptography Projects Bouncy Castle and EJBCA
2 BouncyCastle Set of cryptographic libraries used by developers in Java and C#. Deals with provisioning of cryptography services, also support for certificate handling, secure messaging, SSL/TLS, and time stamping. EJBCA PKI Certificate Authority, enterprise java application issuing and managing digital certificates. Uses BouncyCastle library for low level functions.
3 Bouncy Castle Overview Website: Founded in May Now has around 20,000 downloads a month, including 5000 of the full Java distribution. Originally just Java, C# API added in Original Java API around 27,000 lines including test code. Provided support for J2ME, a JCE/JCA provider, and basic X.509 certificate generation. Latest Java release, 1.41, 267,000 lines including test code. Supports same functionality as original release (with a larger number of algorithms) plus PKCS#10, PKCS#12, CMS, S/MIME, OpenPGP, TLS, OCSP, and Attribute Certificates. C# API around 145,000 lines. Supports most of what the Java API does. Strong emphasis on standards compliance and adaptability. Public support facilities include an issue tracker, dev mailing list, and a wiki all available at the website. Commercial support provided at Other resources, such as third party products, or extensions, built on Bouncy Castle, as well as books and articles are listed on the resources pages: Java - C# -
4 EJBCA Overview Website: Founded in November Now has around 1500 downloads every month. Originally built because BouncyCastle included certificate generation API, and J2EE was new cool technology. Originally 1 developer, currently 5 main developers plus contributors. Original code around 6000 lines including test code. Provided support for a basic certificate authority with a command line interface. Latest release, 3.8.0, lines including test code. Supports same functionality as original release plus multiple CAs, web based Admin-GUI, different algorithms, full list of extensions, support for EAC epassport PKI, all common PKI interfaces, enterprise features for high-availability, monitoring and security. Strong emphasis on standards compliance, adaptability and integration in organizations application environment and work-flow. Public support facilities include an issue tracker, dev mailing list, forum, IRC chat and a wiki, all available at the website. Commercial support provided at Resources, such as used third party products, references, howtos and documentation available on website.
5 Bouncy Castle Usage and Development Issues Access to Standards documents The Bouncy Castle core developers try to place a lot of emphasis on standards compliance. However this is hampered to some degree by the costs involved in purchasing standards documents as the project is largely unfunded. Standards Bodies need to publish freely available and thorough compliance tests Having managed to get access to a standard, the next challenge is to produce something that is compatible with other implementations. Most standards are published with few, if any, test vectors, which almost never cover any edge conditions in the document. A considerable amount of time is lost identifying these edge conditions. Access to certification Governments generally require cryptography providers to be certified to some level before they can be used. This is fair enough! However the cost of certification is often so high that it effectively eliminates open source projects from being used as they cannot afford to gain certification.
6 EJBCA Usage and Development Issues Open reference implementations for standards The developers implements available open standards PKI protocols. In some cases it is difficult, or impossible to find open or freely available implementations for interoperability testing. In reality this makes large commercial companies bugs the defacto standard. Some (countries) are making definitions for what is an open standard. EU funding Not easy for small open source vendors to get EU funding, system is targeted for large corporations and commercial benefit. Certification costs are high and certified open source products would give both commercial and public benefit. Interoperability Users and customers requires interoperability with proprietary products, but obtaining that interoperability is expensive and time consuming. Support from vendors is low and support contracts expensive. Interoperability events restricted to closed groups, where open source project could be invited. Public procurement discriminates open source Public procurement in EU governments are often using trademarks discriminating against open source products. This is shown in an OFE study available at
7 Those web sites again! Bouncy Castle Project Site: Commercial Support: EJBCA Project Site: Commercial Support: Questions?
FIPS Certification and the Bouncy Castle Project, or What Do You Mean I Can t Just Do a New Release Tomorrow?
FIPS Certification and the Bouncy Castle Project, or What Do You Mean I Can t Just Do a New Release Tomorrow? A Quick Look at Bouncy Castle Collection of APIs in Java and C# Provides basic cryptography
More informationopen.org Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB
www.oasis open.org Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB www.primekey.se www.ejbca.org www.oasis open.org Background Data loss and key management issues
More informationAeroMACS Public Key Infrastructure (PKI) Users Overview
AeroMACS Public Key Infrastructure (PKI) Users Overview WiMAX Forum Proprietary Copyright 2019 WiMAX Forum. All Rights Reserved. WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum
More informationProbably the best PKI in the world
Probably the best PKI in the world PrimeKey At A Glance Solutions and Professional Services within Applied PrimeKey Group Cryptography with focus on PKI (what's PKI?) PrimeKey Solutions AB Main customers
More informationAn Overview of Secure and Authenticated Remote Access to Central Sites
Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationCDSA Program Update SECURITY. Graham Bird. opengroup.org (650)
CDSA Program Update SECURITY Graham Bird g.bird@opengroup opengroup.org (650) 323 7992 Agenda Product Standards The Open Brand program Diffusion Schedules Q&A Product Standards Product Standards Real World
More informationSSH Communications Tectia SSH
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationDigiCert Products. SSL Certificates
DigiCert Products A leading online trust provider, DigiCert offers multiple products to suit the security needs of enterprises within the finance, healthcare, education, government and Fortune 500 sectors.
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationCeSeCore Common Criteria Certified Open Source Software
CeSeCore Common Criteria Certified Open Source Software Tomas Gustavsson PrimeKey Solutions AB www.ejbca.org www.cesecore.eu Agenda 1. Common Criteria What? Why? 2. CeSeCore Open Source certified Security
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationSecurity for Wireless Handhelds
wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market
More informationSándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary
Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Introduction Private Hungarian IT company since 1984 Custom specific IT system
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationAdding value to your MS customers
Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,
More informationState of Octave. John W. Eaton. OctConf July John W. Eaton GNU Octave 18 July / 14
State of Octave John W. Eaton OctConf 2012 18 July 2012 John W. Eaton (jwe@octave.org) GNU Octave 18 July 2012 1 / 14 Overview More developers than ever More activity by more people than ever The state
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationDigital signatures: How it s done in PDF
Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?
More informationMini-Summit October 26, 2011
Mini-Summit October 26, 2011 Dawn Foster Open Source Community Manager for Intel @geekygirldawn dawn.m.foster@intel.com Tizen T-Shirt Contest Rules Must correctly identify the city and landmark name. This
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationDeltek Touch CRM Release Notes for Ajera CRM, GovWin Capture Management, and Vision
Deltek Touch CRM 1.6.3 March 2016 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may exist. The recipient of
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationThe ehealth platform
Glossary Version 1.0 This document is provided to you free of charge by The ehealth platform Willebroekkaai 38 1000 BRUSSELS All are free to circulate this document with reference to the URL source. Table
More informationPRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9
PRICE LIST TRUST SERVICE PRODUCTS Price List Version 5.9 Berlin, April 2018 Copyright 2018, Bundesdruckerei GmbH Seite 1/9 Qualified Single Signature Cards D-TRUST Card 3.0 EU Signature card according
More informationDigital Signatures Project Summary. August 2, 2013
Digital Signatures Project Summary August 2, 2013 Implement Secure Digital Signatures: Overview Major initiative for UH & UIT for FY 2011/12 Digital Signature Project ($247,500); The Digital Signature
More informationDBsign for HTML Applications Version 4.0 Release Notes
DBsign for HTML Applications Version 4.0 Release Notes Copyright 2010 Version 4.0 Copyright Notice: The Release Notes has a copyright of 2000-2010 by Gradkell Computers, Inc. This work contains proprietary
More informationOracle WebCenter JSR-168 Container
Oracle WebCenter JSR-168 Container Installation Guide Release 10g Release 3 (10.3) October 2008 Installation and Upgrade Guide for Oracle WebCenter JSR-168 Container, Release 10g Release 3 (10.3) Copyright
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationPolycom RealPresence Access Director System
Release Notes 3.1.1 April 2014 3725-78700-001C1 Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1.1. This document
More informationEncryption, Certificates and SSL DAVID COCHRANE PRESENTATION TO BELFAST OWASP CHAPTER OCTOBER 2018
Encryption, Certificates and SSL DAVID COCHRANE PRESENTATION TO BELFAST OWASP CHAPTER OCTOBER 2018 Agenda Basic Theory: encryption and hashing Digital Certificates Tools for Digital Certificates Design
More informationOracle Utilities Mobile Workforce Management
Oracle Utilities Mobile Workforce Management Quick Install Guide Release 2.0.1 E17821-02 July 2010 Oracle Utilities Mobile Workforce Management Quick Install Guide E17821-02 Copyright 2000, 2010, Oracle
More informationDeveloping Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation
Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationBugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
More informationKeyOne. Certification Authority
Certification Description KeyOne public key infrastructure (PKI) solution component that provides certification authority (CA) functions. KeyOne CA provides: Public key infrastructure deployment for governments,
More informationIMPLEMENTING AN HSPD-12 SOLUTION
IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com
More informationDelivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM
Delivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM Trustis Limited Building 273 Greenham Business Park RG19 6HN Agenda Introduction PKI Standards
More informationSignCloud. Remote Digital Signature System
SignCloud Remote Digital Signature System All the information in this document is CONFIDENTIAL and can t be used entirely or in part without a written permission from Bit4id SRL. Contents 1. Executive
More informationMarkLogic Server. Common Criteria Evaluated Configuration Guide. MarkLogic 9 May, Copyright 2019 MarkLogic Corporation. All rights reserved.
Common Criteria Evaluated Configuration Guide 1 MarkLogic 9 May, 2017 Last Revised:9.0-3, September, 2017 Copyright 2019 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationThis paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.
White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.
More informationPolycom RealPresence Access Director System
Release Notes Polycom RealPresence Access Director System 4.0 June 2014 3725-78700-001D Polycom announces the release of the Polycom RealPresence Access Director system, version 4.0. This document provides
More informationThales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen
Thales e-security Security Solutions PosAm, 06th of May 2015 Robert Rüttgen Hardware Security Modules Hardware vs. Software Key Management & Security Deployment Choices For Cryptography Software-based
More informationCM500 High Speed Cable Modem User Manual
User Manual November 2014 202-11472-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationWebSphere 4.0 General Introduction
IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationFriday, March 1, 13. State of Puppet
State of Puppet Puppet Labs: by the numbers Jan 2012 Jan 2013 Employees 55 110 Customer Countries 29 42 Office Space 836 m 2 9,000 ft 2 2,232 m 2 25,000 ft 2 Puppet Labs: A Great Place to Work! Weekly
More informationEU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationQuickStart Guide for Managing Mobile Devices. Version
QuickStart Guide for Managing Mobile Devices Version 10.1.0 copyright 2002-2017 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite
More informationRelease Notes - ZEBRA TC75 Lollipop FIPS Patch on REV A v with NON-GMS
Release Notes - ZEBRA TC75 Lollipop FIPS Patch on REV A v02.10.02 with NON-GMS Introduction FIPS 140-2 Provided Components Developer s Reference Configuring the device for FIPS compliance Component and
More informationOracle Utilities Work and Asset Management Integration to Primavera P6 Enterprise Project Portfolio Management
Release Notes Oracle Utilities Work and Asset Management Integration to Primavera P6 Enterprise Project Portfolio Management Release Notes Oracle Utilities Work and Asset Management v1.9.1 Primavera P6
More informationkeyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4
/ PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationesignature Infrastructure Marketing Model
www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationETSI ESI Electronic Signature Activities
ETSI ESI Electronic Signature Activities Cornerstone for interoperability of Digital Documents in Europe Riccardo Genghini TB ESI Chairperson ETSI 2008. All rights reserved 4th ETSI Security Workshop ETSI
More informationCA IDMS Server. Release Notes. r17
CA IDMS Server Release Notes r17 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationTCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011
TCG Certification Program TNC Certification Program Suite Document Version 1.1 Revision 1 26 September 2011 Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2009-2011 Copyright
More informationmidentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible
KOBIL Mobile, Secure and Flexible KOBIL is the ideal product for the mobile, yet safe transportation of your data and the protection of your digital identity. The perfectly integrated smartcard technology
More informationACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee
ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back
More informationHow to Install Enterprise Certificate Authority on a Windows 2008 Server
AD CS is the backbone of Microsoft s Public Key Infrastructure (PKI) implementation. It will allow you to issue certificates for SSL/TTL user on websites or digitally sign your email. Now let s take a
More informationCitrix XenApp and XenDesktop 7.6 LTSR FIPS Sample Deployments
Citrix XenApp and XenDesktop 7.6 LTSR FIPS 140-2 Sample Deployments Table of contents Introduction... 2 Audience... 2 Security features introduced in XenApp and XenDesktop 7.6 LTSR... 2 FIPS 140-2 with
More informationSHA-1 to SHA-2. Migration Guide
SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationEuropean Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission
European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission Key EU Policy Milestones to deliver C-ITS in Europe by 2019 Cooperative Intelligent Transport Systems A European
More informationComodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance
Centrally Managing Enterprise Security, Trust & Compliance SSL Certificate Management - PKI With an ever-increasing abundance of web-enabled, collaborative and mobile applications, as well as netaccessible
More informationHigh Speed Cable Modem
Model CM1000 User Manual September 2016 202-11620-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register
More informationIBM CICS Transaction Gateway for Multiplatforms V7.1 delivers access to CICS containers and extended systems monitoring capabilities
IBM Europe Announcement ZP07-0457, dated November 6, 2007 IBM CICS Transaction Gateway for Multiplatforms V7.1 delivers access to CICS containers and extended systems monitoring capabilities Description...2
More informationVMware AirWatch Integration with OpenTrust CMS Mobile 2.0
VMware AirWatch Integration with OpenTrust CMS Mobile 2.0 For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationBlackBerry Enterprise Server for Microsoft Exchange
BlackBerry Enterprise Server for Microsoft Exchange Version 3.5 Service Pack 1 Hotfix 2 December 2002 PLEASE READ THE LEGAL NOTICES SET OUT AT THE END OF THIS DOCUMENT. This document provides information
More informationZIMBRA & THE IMPACT OF GDPR
ZIMBRA & THE IMPACT OF GDPR 1 WHAT IS THE GENERAL DATA PROTECTION REGULATION? What Privacy law that applies to personal data of EU residents Privacy It also ensures those holding the information protects
More informationOracle Utilities Smart Grid Gateway
Oracle Utilities Smart Grid Gateway Quick Installation Guide Release 2.0.0 Service Pack 9 E20524_09 May 2013 Updated July 2013 Oracle Utilities Smart Grid Gateway Quick Installation Guide E20524_09 Copyright
More informationCertification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive
Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Asseco Data Systems S.A. Podolska Street 21 81-321 Gdynia, Poland Certum - Powszechne
More informationDFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.
More informationAlliance Key Manager A Solution Brief for Partners & Integrators
Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers
More informationArchiMate 2.0 Standard Courseware. Course Introduction
ArchiMate 2.0 Standard Courseware Unit 0: Course Introduction ArchiMate, The Open Group, and TOGAF are registered trademarks of The Open Group in the United States and other countries. Course Introduction
More informationHigh Speed Cable Modem
Model CM1000 User Manual September 2017 202-11804-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register
More informationE-Government Moldova s Experience and Future Perspectives
E-Government Moldova s Experience and Future Perspectives ALEXANDRU DONOS ProDataLex DEKAT Company LTD // Dushanbe, Tadzhikistan 22-23 June, 2017 By 2020 all public services will be digitized. Government
More informationOracle Enterprise Data Quality for Product Data
Oracle Enterprise Data Quality for Product Data Hardware and Software Specification Release 5.6.2 E24167-01 July 2011 Oracle Enterprise Data Quality for Product Data Hardware and Software Specification
More informationNovell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationOffice 365 External Sharing Webinar November 7, 2017
Office 365 External Sharing Webinar November 7, 2017 Introductions Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com
More informationISSUE BRIEF SC DMV ELECTRONIC TICKET TRANSMISSION MANDATE (November, 2017)
551 Tollgate Road Suite B Elgin, IL 60123-9357 (847) 922-9480 Telephone stever@ecitationcoalition.com Email www.ecitationcoalition.com ISSUE BRIEF SC DMV ELECTRONIC TICKET TRANSMISSION MANDATE (November,
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics
Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationOracle Utilities Meter Data Management Integration to SAP for Meter Data Unification and Synchronization
Oracle Utilities Meter Data Management Integration to SAP for Meter Data Unification and Synchronization Release 11.1 Media Pack Release Notes Oracle Utilities Meter Data Management v2.1.0.0 SAP for Meter
More informationCloud Security. Copyright Ramesh Nagappan. All rights reserved.
Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction
More information