eid edocs the next possible steps Interoperability BE-AT-NL-PT
|
|
- Estella Sanders
- 6 years ago
- Views:
Transcription
1 edocs the next possible steps Interoperability BE-AT-NL-PT
2 building a demonstrator to experience in the cross-border reality to identify needs along with processes of the praxis including different styles of administration to contribute to the i2010 agenda
3 content of the presentation block intervention by MS proponents reflection by industry practical demonstration of the state of the play : ed
4 following the roadmap ADAPTING THE INFRASTRUCTURE Authentication Model & Levels Terminology 2008 Common Framework Definition of Equal Treatment of national s Role Management edoc Format Standard(s) EU provisions: Recognition of national s 2010 Federated Management Personal Data Ownership Model Recognitio n of edocs Permanent Document ID 2009 Long Term Archiving Model Long Term Archiving Guidelines MS rules on earchiving
5 potential contribution by demonstrators authentication model & levels definition of common framework personal data ownership model federated management edoc format standard(s) recognition of edocs
6 edocs capabilities To demonstrate technical feasibility To demonstrate practicability To demonstrate legal barriers Belgium Austria Netherlands Portugal
7 edocs capabilities To demonstrate formats and compatibility To demonstrate readiness To demonstrate legal barriers Austria Belgium Netherlands Portugal
8 A DEMONSTRATOR Belgium ANY companies and technologies liberty alliance, infocard,.. Austria
9 Description of and edoc Methods of generation Scope of applicability Methods of verification STANDARD CATEGORY limitations STANDARD CATEGORY FORMAT SIGNATURE VALIDITY limitations egovernment APPLICATION
10 HUMAN MOBILITY (moving into XXXX) Documents needed Identification needed Process compatibility Process interlinking Interoperability Model Standards and Tools
11 HUMAN MOBILITY (foreign study) Documents needed Identification needed Process compatibility Process interlinking Interoperability Model Standards and Tools
12 example BE AT ID-Token is not affected by interoperability Sign agreement Generate transformation from Belgium into Austrian with consent of the citizen HIDDEN PROCESS Application is not affected by interoperability LEGAL AGREEMENTS? TECHNICAL INTEROPERABILTY?
13 example AT BE ID-Token is not affected by interoperability Sign agreement???? Generate BE-SECTORID Generate transformation from Austrian into Belgium with consent of the citizen HIDDEN PROCESS Application is not affected by interoperability LEGAL AGREEMENTS? TECHNICAL INTEROPERABILTY?
14 Goal i2010 To identify obstacles To produce showcases To communicate interoperability To experience levels of security To elaborate and communicate todos
15 focus on very few models AT-model with sectoral PIN PROXY model for easo of implementation
16 POTENTIAL SHOWCASE interoperability at user environment USER IN CONTROL User User environment INTEROP PIN UNIQU E Token Service Service TRANSBORDER member state member state
17 POTENTIAL SHOWCASE interoperability proxy USER IN CONTROL TRANSBORDER User PI N User environme nt TRUSTWORTHY PROXY INTEROP SERVICE Token of PROX Y UNIQ UE member state member state Servic e
18 Starting Points the Microsoft Infocard concept the Liberty Alliance approach mobile phone access technology RFID crypto elements as Dataprotection and Acceptance......
19 edocs and where we srtand XML is emerging as a standard ODT, DOCX :: convergence still an issue esignatures are built in in both ODT and DOCX according to the same principle Useful abstactions are on the way (XHTML) First practical approaches with OFFICE 2007 OpenOffice 2.0
20 example Office 2007 sign a document (official signature) use BE, IT, FI,EE, AT Card
21 Demo Sign an XML Doc MS OFFICE 2007 Bürgerkarte
Digital Austria = egov best practice in d Europe
Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear
More informationInteroperability & Archives in the European Commission
Interoperability & Archives in the European Commission By Natalia ARISTIMUÑO PEREZ Head of Interoperability Unit at Directorate- General for Informatics (DG DIGIT) European Commission High value added
More informationSTORK Secure Identity Across Borders Linked
STORK Secure Identity Across Borders Linked Projekt STORK Status und Ausblick 2011 BITKOM FA eid 20. Januar 2011 / Berlin Volker Reible / T-Systems Stork is an EU co-funded project INFSO-ICT-PSP-224993
More informationData Privacy in the Cloud E-Government Perspective
Data Privacy in the Cloud E-Government Perspective Herbert Leitold; EGIZ, A-SIT International Cloud Symposium 2011, Panel on Data Privacy and the Role Policy Plays in Defining Trust Requirements Ditton
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationSTORK PRESENTATION. STORK Overview STePS workshop, 17 June Herbert Leitold. Stork is an EU co funded project INFSO ICT PSP
STORK PRESENTATION STORK Overview STePS workshop, 17 June 2009 Herbert Leitold Stork is an EU co funded project INFSO ICT PSP 224993 Contents Overview Members and Work Packages Interoperability Models
More informatione SENS Pilots of eid, esignatures and Trusted Services
e SENS Electronic Simple European Networked Services Trust in the Digital World Madrid, February 26 th, 2015 e SENS Pilots of eid, esignatures and Trusted Services Lefteris Leontaridis, e SENS Piloting
More informationElectronic signature framework
R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationMUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan
MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond
More informationGateway Certification Authority pilot project
Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationDeliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift
Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informatione-sens Electronic Simple European Networked Services
e-sens Electronic Simple European Networked Services Herbert Leitold, A-SIT 2 nd SSEDIC International Identity Initiatives Conference (SIIIC) Rome, July 8 th 2013 Presentation Overview esens - LSP Relation
More informationUSC esignature and Interoperability. Daniel Sánchez Martínez University of Murcia
1 Daniel Sánchez Martínez University of Murcia Contents USC Qualified esignature (FERTUI) Electronic Diploma Supplement (eds) STORK2 project 3 USC Qualified esignature (FERTUI) 4 FERTUI - Context University
More informationEuropean Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market
European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market Gérard GALLER Policy Officer European Commission -
More informationWorkshop on Addressing the Barriers to IPv6 Deployment Spanish use case
Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case Cristina Ramos cristinapilar.ramos@correo.gob.es Agenda Agenda IPv6 addressing plan Barriers Conclusions 1 Background Digital Agenda
More informationMedia-break resistant esignatures in egovernment an Austrian experience
Media-break resistant esignatures in egovernment an Austrian experience Herbert Leitold Secure Information Technology Center Austria (A-SIT), Herbert.Leitold@a-sit.at Reinhard Posch Federal Chief Information
More information@firma, Validation Platform for PKIs
@firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the
More informationLiberty Alliance Project
Liberty Alliance Project Federated Identity solutions to real world issues 4 October 2006 Timo Skyttä, Nokia Corporation Director, Internet and Consumer Standardization What is the Liberty Alliance? The
More informationCEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam
CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth
More informationCross border eservices STORK 2.0
Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project
More informationeid Interoperability for PEGS WS-Federation
eid Interoperability for PEGS WS-Federation Workshop Brussels 10 May 2007 Agenda 1 Scope 2 Category 3 Approach and description 4 Relevance for eid Interoperability 5 Pro s and Con s 6 Relationship with
More informationEuropean Interoperability Framework
European Interoperability Framework - The General Public (GPSCM) - Mike Kulbickas IDABC Directorate-General for Informatics European Commission 1 challenges & recommendations 2 Successful PEGS 3 4 2 5
More informationDigital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? Konstantinos Rantos Kavala Institute of Technology, Kavala GR-65404, Greece krantos@teikav.edu.gr Abstract. Digital signatures
More informationRecords Management and Interoperability Initiatives and Experiences in the EU and Estonia
Records Management and Interoperability Initiatives and Experiences in the EU and Estonia September 18, 2012 Liivi Karpištšenko Ministry of Economic Affairs and Communication Kuldar Aas National Archives
More informationesignature Infrastructure Marketing Model
www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of
More informationSTORK PRESENTATION 07/04/2009. Frank LEYMAN. Manager International Relations. Stork is an EU co-funded project INFSO-ICT-PSP
STORK PRESENTATION Frank LEYMAN Manager International Relations 07/04/2009 Stork is an EU co-funded project INFSO-ICT-PSP-224993 egovernment objectives (ICT-PSP call 2007) STORK To simplify administrative
More informationehaction Joint Action to Support the ehealth Network
Stakeholder Engagement - Consultation (22 August 2017) ehaction Joint Action to Support the ehealth Network 3 rd Joint Action to Support the ehealth Network Open Consultation 1 Participants of the 3 rd
More informatione-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway
e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway esens BCSS call for proposal Objectives Consolidate and align work from the LSPs Create Long Term Sustainability
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationMINIMAL-FOOTPRINT MIDDLEWARE FOR THE CREATION OF QUALIFIED SIGNATURES
MINIMAL-FOOTPRINT MIDDLEWARE FOR THE CREATION OF QUALIFIED SIGNATURES Martin Centner, Clemens Orthacker Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology,
More informationApproaching the Challenge of eid Interoperability: An Austrian Perspective
Approaching the Challenge of eid Interoperability: An Austrian Perspective egovernment is a key enabler for efficient public administrations and user-friendly governmental procedures. Electronic identities
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationehealth in Europe: at the convergence of technology, medicine, law and society
ehealth in Europe: at the convergence of technology, medicine, law and society Pēteris Zilgalvis, J.D. Head of Unit, ICT for Health DG Information Society and Media, European Commission IPTS Spring Meeting,
More informationISA: Interoperability Solutions for European public Administrations
ISA: Interoperability Solutions for European public Administrations Working Session on Government Information and Government Libraries Athens, 12 May 2014 Ioannis Sagias Ioannis.sagias@ec.europa.eu What
More informationAnalysis of the Interoperability Possibilities of Implemented Governmental e-services EU15
InterPARES Trust Study Name: Team & Study Number: Research domain: Document Title: Analysis of the Interoperability Possibilities of Implemented Governmental e-services EU15 Control Checklist Status: Final
More informationLeveraging HSPD-12 to Meet E-authentication E
Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy
More informationInternational Standardization of Address Data
International Standardization of Address Data What is the status and who needs it? Nordic Address Meeting 30-05-2012 International standardisation 1 ISA Core Address Proposal Nordic Address Meeting 30-05-2012
More informationThe Mobile Finnish Identity Certificate
The Mobile Finnish Identity Certificate Dr.Tech. Göran Pulkkis and BSc (Eng.) Jonny Karlsson ARCADA Polytechnic Helsinki Finland PRESENTATION OUTLINE Finnish Electronic Identity (FINEID) as a Smartcard
More informationIdentity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition
Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization
More informationEvolution in cross-border interoperability of esignatures and eid. Tarvi Martens SK, Estonia
Evolution in cross-border interoperability of esignatures and eid Tarvi Martens SK, Estonia Let s read the title again! Evolution in cross-border interoperability of esignatures and eid Prerequisites:
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationDevelopment of smart authentication and identification in Asia
Development of smart authentication and identification in Asia Asia PKI Consortium Dr. Wei-Chung Hwang weichung.hwang@gmail.com Nov 16, 2017 Agenda About APKIC Background Current Development New trends
More informationehealth action in the EU
ehealth action in the EU ehealth for smart and inclusive growth 13 February 2014 Jerome Boehm DG SANCO ehealth and Health Technology Assessment General Health Objectives of the EU cooperation on ehealth
More informationIntroduction of the Identity Assurance Framework. Defining the framework and its goals
Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating
More informationInformation memorandum. SUNČANI HVAR d.d.
Information memorandum Version 1.1. May, 2018 01 Information on the processing of personal data of accommodated persons by the Company Introduction Below you will find information on the processing of
More informationENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS
Vol. 13, No. 2, pp. 52-68 ISSN: 1645-7641 ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL Thomas Lenz. E-Government
More informationesign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,
esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 15264-2 April 2005 AGREEMENT ICS 35.240.15 English version Best Practice Manual for card scheme operators exploiting a multi-application card scheme incorporating interoperable IAS services
More informationSecurity Aspects of Trust Services Providers
Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00
More informationSELF SERVICE INTERFACE CODE OF CONNECTION
SELF SERVICE INTERFACE CODE OF CONNECTION Definitions SSI Administration User Identity Management System Identity Provider Service Policy Enforcement Point (or PEP) SAML Security Patch Smart Card Token
More informationETSI TR V1.1.1 ( )
TR 119 400 V1.1.1 (2016-03) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for trust service providers supporting digital signatures and related services
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationReport on ISO/IEC/JTC1/SC27 Activities in Digital Identities
International Telecommunication Union ITU-T Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities Dick Brackney ISO/SC27 Liaison Officer to ITU-T SG17 Standards Program Manager, U.S. Dept of Defense
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationD5.5. Open Source Client Library and Server Tools for Delegations. Document Identification. Final UBISECURE, OIX
D5.5 Open Source Client Library and Server Tools for Delegations Document Identification Date 27.08.2018 Status Final Version Version 1.0 Related WP WP 5 Related Deliverable(s) Lead Authors TUG Dissemination
More informationCooperative ITS Corridor Joint Deployment
Cooperative ITS Corridor Joint Deployment Amsterdam Group CODECS Workshop Roskilde, 15 September 2015 The official start On 10 June 2013, the Ministers of Transport of the Netherlands, Germany and Austria
More informationBarry Lowry Government CIO September Digitising Ireland the Government Chief Information Officer's Perspective
Barry Lowry Government CIO September 2016 Digitising Ireland the Government Chief Information Officer's Perspective We all have a Digital Challenge! Go Digital or Go Home Mark Raskino (Gartner) So who
More informationSemantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi
Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi SEMIC conference 2013 21 June 2013 Dublin (AgID) Created last year, AgID is a public body that merged three different existing
More informationFederated Web Services with Mobile Devices
Federated Web Services with Mobile Devices Rajeev Angal Architect Sun Microsystems Pat Patterson Architect Sun Microsystems Session TS-6673 Copyright 2006, Sun Microsystems, Inc., All rights reserved.
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 15264-1 April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eid system within a smart card infrastructure This CEN Workshop Agreement has been
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationeidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market
eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market Food Chain in the Digital Single Market 9 November 2016, Brussels Elena Alampi DG
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationEuropean Interoperability Reference Architecture (EIRA) overview
European Interoperability Reference Architecture (EIRA) overview Version 0.8.3 beta 09/01/2015 ISA Action 2.1: European Interoperability Architecture Specific Contract N. 54 Framework contract N. DI/07171
More informationIDENTITY MANAGEMENT AND FEDERATION BC.Net Conference April 25, 2006
IDENTITY MANAGEMENT AND FEDERATION BC.Net Conference April 25, 2006 Lauren Wood Senior Technical Program Manager Business Alliances, CTO Office Sun Microsystems Alex Acton Software Specialist Client Solutions
More informationBSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests
BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2
More informationINSPIRE relevant policy developments in the EU's digital economy initiatives
INSPIRE relevant policy developments in the EU's digital economy initiatives Interoperability Solutions and common Frameworks for European public Administrations, businesses and citizens as a means of
More informationWEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices
WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35
More informationInteragency Advisory Board Meeting Agenda, Wednesday, May 23, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content
More informationehealth Ireland Ecosystem members of the ECHAlliance International Ecosystem Network
ehealth Ireland Ecosystem members of the ECHAlliance International Ecosystem Network ECHAlliance International Ecosystem Network Update on potential areas for cooperation Brian O Connor, Chair, European
More informationETSI Electronic Signatures and Infrastructures (ESI) TC
ETSI Electronic Signatures and Infrastructures (ESI) TC Presented by Andrea Caccia, ETSI/ESI liaison to ISO SC27 ( a.caccia @ kworks.it ) ETSI 2011. All rights reserved ETSI TC ESI - Electronic Signatures
More informationTLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy)
TLS-Federation Dr. Bud P. Bruegger Dr. Detlef HühnleinH Prof. Guido Marinelli Comune di Grosseto (Italy) Secunet (Germany) U.Rome Tor Vergata (Italy) Scope full eid IOP framework for EU MSs any eid technology
More informationSummary of the ATN/OSI Doc Security Validation Report
International Civil Aviation Organization WORKING PAPER ACP-WGM16/WP-09 17 May 2010 AERONAUTICAL COMMUNICATIONS PANEL (ACP) 16h MEETING OF WORKING GROUP M Paris, France 17-19 May 2010 Agenda Item 3a: ATN/OSI
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationIBM Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2.
IBM 000-003 Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 http://killexams.com/exam-detail/000-003 A. IBM will provide legal, accounting, or auditing advice. B. Customers
More informationIdentity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID
Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium
More informationPolicy and regulatory framework: what are the next challenges to tackle?
Policy and regulatory framework: what are the next challenges to tackle? Alberto Pototschnig Director GIE Annual Conference Venice, TITRE 23 May 2013 Achieving the Internal Gas Market by 2014 (and beyond)
More informationHarmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT
Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising
More informationRethinking Semantic Interoperability through Collaboration
E-GOV 2011 10 th Conference on Electronic Government Delft, August 28 September 2, 2011 Rue Froissart 36, Brussels - 1040, Belgium Rethinking Semantic Interoperability through Collaboration Stijn Goedertier
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationOnline Banking Wire Transfer Enrollment
Online Banking Wire Transfer Enrollment Revised 9/2016 Page 1 Overview Wire Transfers (also referred to as Wire Transfer Payments) are a trusted instrument for transferring funds quickly and conveniently
More informationCEF Telecom policy background. DG CONNECT, 12 September 2017
CEF Telecom policy background DG CONNECT, 12 September 2017 Connecting Europe Facility (CEF) 2014 to 2020 CEF TRANSPORT 24.05bn TELECOM Broadband 170 m Digital Service Infrastructures 970 m * Infrastructure
More informationAssuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09
Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance
More informationAn Overview on ehealth Co-operation in the Baltic States. Gediminas Cerniauskas Lithuania
An Overview on ehealth Co-operation in the Baltic States Gediminas Cerniauskas Lithuania ehealth co-operation in the Baltic States: overview Small countries Limited healthcare resources Fragmentary and
More informationMemorandum of Agreement
Memorandum of Agreement I. Parties This agreement is entered into between the Disaster Management Electronic Government Initiative (DM Egov) in the Department of Homeland Security (DHS), and the Emergency
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationInteroperability, Why and How?
ISA: Interoperability Solutions for European public Administrations Interoperability, Why and How? EUPAN 7 th Quality Conference "Towards Responsible Public Administration" Vilnius 3-4 October 2013 Margarida
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationUELMA Exploring Authentication Options Nov 4, 2011
UELMA Exploring Authentication Options Nov 4, 2011 A U T H E N T I C A T I O N M E T H O D S P R E L I M I N A R Y R E P O R T B R A D L E E C H A N G X C E N T I A L G R O U P B R A D @ X C E N T I A
More informationRegulating Telemedicine: the
Regulating Telemedicine: the EU perspective ETSI ehealth workshop On telemedicine 6-7 May 2014 Céline Deswarte, Policy officer Unit Health and Well-Being European Commission i Table of Contents t 1) Legal
More informationFederated Identity Management and Network Virtualization
Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation
More informationResponse to the. ESMA Consultation Paper:
Response to the ESMA Consultation Paper: Draft technical standards on access to data and aggregation and comparison of data across TR under Article 81 of EMIR Delivered to ESMA by Tahoe Blue Ltd January
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationISA 2 Programme ARISTIMUÑO PEREZ. By Natalia. (DG DIGIT) European Commission. Head of Interoperability Unit at Directorate- General for Informatics
ISA 2 Programme By Natalia ARISTIMUÑO PEREZ Head of Interoperability Unit at Directorate- General for Informatics (DG DIGIT) European Commission Stockholm, 24 th August 2017 TABLE OF CONTENTS General view
More informationQuasi-mergers in Telecommunications
Quasi-mergers in Telecommunications Jordi Gual - IESE Business School and la Caixa Sandra Jódar-Rosell Toulouse School of Economics and la Caixa Emerging Competition Issues in Regulated Network Industries
More information