Interoperability Challenge of Certified Communication Systems via Internet

Size: px
Start display at page:

Download "Interoperability Challenge of Certified Communication Systems via Internet"

Transcription

1 Interoperability Challenge of Certified Communication Systems via Internet Marina Buzzi, IIT-CNR, Francesco Gennai, ISTI-CNR, Claudio Petrucci, Agid, egose 2017, 4-7 Sept, ITMO University, St.Petersburg

2 Agenda Introduction Motivation Certified Communication Systems (CCS) Related Work The Model: Generic CCS (GCCS) Idea Logical scheme Main functions Conclusion

3 Motivation Developing the full potential of Information and Communication Technology (ICT) can greatly innovate society in a number of sectors ecommerce, egovernment, ehealth, Lack of interoperability and adherence to international standards heavily impacts on economic growth and competitiveness

4 Certificated Communication Systems (CCS) Several countries have adopted systems to certify communications via Internet CCSs (Certified Communication Systems): Certified Electronic Mail (CEM) systems based on smtp protocol (simple message transfer protocol) Certified systems based on the Hypertext Transfer Protocol (HTTP)

5 CCS Systems European CCS systems rely on different protocols and formats Interoperability is necessary to enable the exchange of messages between users of different domains Certified/Registered Electronic Mail (CEM/REM) systems (SMTP) PEC (Posta Elettronica Certificata, Italy) D (German D ) SI Post (Moja.posta.si Slovenia) AU-DSS (Austrian Document Delivery System) Digital Post in Denmark Sikker Digital Post in Norway Mina meddelanden in Sweden Web-based systems: 1) Universal Postal Union (UPU) developed Postal Registered Electronic Mail Prem 2) PEPPOL (Pan-European Public eprocurement On-Line), for document exchange between Public Administrations, funded by EU

6 Generic CCS model Challenge: to build worldwide interoperability between certified communication systems The Generic CCS model (GCCS): an open solution to redefine closed CCS systems

7 CCS CCS systems certify the source of a message Today this is also possible thanks to standard mechanisms available on the Internet SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting and Conformance), Requirements of certification often address also specific needs internal to countries (governmental) "closed" CCSs are different from each other, although solve exactly the same class of problems

8 CCS identification of the source not of the sender (satisfied by EIDAS specification, eidas electronic IDentification, Authentication and trust Services for electronic transactions) server-user acceptance notification delivery notification server-server notification communications moving between different providers in the same CCS infrastructure

9 Generic CCS Idea: to publish a generic specification for describing CCS systems usable as common rules for immediate interoperability between worldwide Providers To illustrate this model we focus on Certified Systems (CEM)

10 GCCS Model Open, interoperable and scalable solution while minimizing the impact on existing infrastructure To this aim the DNS (Domain Name System) is used to store information for the GCCS functioning common practice to take advantage of the attributes of the TXT record of the DNS SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting and Conformance) specifications Advantage: DNS technology can be used to immediately spread protocol information without the need to define new DNS records, keeping the current DNS structure

11 Related Work Certified systems showed usability problems (use of public/private key, certificates, etc.) In 2001, to simplify user interaction and reduce costs, a centralized approach has been proposed to provide cryptography as a network service (Dean et al.) client must trust the cryptoserver (which keeps users private keys) Garfinkel et al. (2005) surveyed 400 vendors via Amazon most participants did not know secure Segeberg (2009) created plugin for making a certified system easy to interact Bobba et al. (2009) developed a secure mailing list (Secure List Services) providing encryption via proxy

12 Related Work The European Commission supported the creation of a gateway between different Certified Delivery systems Previous actions for reaching cross-border interoperability have mainly focused on bridging existing systems Within this framework the European Telecommunications Standards Institute (ETSI) defined the Technical Specification Registered Electronic Mail (REM) An ETSI Task Force was set up REM Interchange: Interchange between Registered (REM) systems based on different transmission protocols (2011) To assure the conformity to the eidas Regulation, a new document "Rationalized structure for Electronic Signature Standardization" has been published (2015)

13 Related Work A comparison of policies to fuel certified communication between public sector and citizens in the Scandinavian countries has been carried out by Jansen et al (2016) Similar solutions in comparable contexts Three countries applied different degrees of coercion ranging from mandatory (Denmark), to nudging (Norway), to voluntary (Sweden) Member States have the possibility of applying more or less restrictive policies Voluntary base was adopted slowly while the mandatory achieved better results fast very important since digitalization of communication lowers costs and improves efficiency

14 Challenge How to solve CCS interoperability problem without referring to any specific systems in a way that is general enough to redefine any certified communication system

15 Trusted third party Existing Certified Providers deliver systems that rely on a trusted third party unsuitable for cross-border application, limit the interoperability (Jansen et al.) Paulin & Welzer propose a certified system that does not rely on a trusted third party for fair non-repudiation of receipt a protocol splits an encrypted message into a chain of parts, which the recipient gradually acquires, generating proof-of-receipt for each individual part It covers only a part of the problem, since it misses the description of a mechanism for abstracting the specific CEM systems in a general public profile

16 Generic CCS (GCCS) Conceptual openness it specifies a generic model and attribute language to redefine the current CCS functionally equivalent in terms of functions, reliability and degree of security to the original taking advantage of IETF standards Each CEM system could be described by a specific CCS profile It is necessary to create a set of public standard Generic CCS profiles profiles A, B, C, etc. with different levels of security and functions Any provider adopting one of these public profiles can interoperate with any providers adopting the same level of profile without any agreement

17 GCCS A set of properties that CEM systems would satisfy to be incorporated in the GCCS policy are (Tauber): Non-repudiation of origin (NRO) if the protocol offers evidence against the false denial of having originated the message Non-repudiation of receipt (NRR) if the protocol provides evidence against the false denial of having received the message Non-repudiation of submission (NRS) if the protocol provides evidence against the false denial of having submitted the message Non-repudiation of delivery (NRD) if the protocol provides evidence against the false denial of having delivered the message

18 GCCS We propose to define a specification using simple language to define a list of attributed value pairs and by adding the definition of some headers These pairs (attribute, value) are added into TXT records of DNS systems, according to RFC 1464

19 GCCS Taking advantage of Internet "mechanisms (DNSSec, TXT DNS records, etc.) is possible to define a set of generic abstract rules to describe the behavior of each existing CCS system By using the GCCS (Generic Certified Communication System) rules it is possible to define a generic interface to each of the worldwide CCS systems (national/ government) enabling interoperability between them In the case of two generic ISPs, the independent adoption (not coordinated) of a system compliant with a GCCS profile would mean that the communication between users belonging to these providers would be of the CCS type

20 GCCS The GCCS defines the technical rules through which each provider declares (via DNS TXT record) Features, level of security (X.509 certificates, CA, DNSSec, etc.), protocols (SMTP, HTTP), timeouts, etc. Profiles establish a minimum level (of functionality, security, etc.) that a particular provider must support in order for a communication to be considered belonging to this CCS type existing CCS systems may be "mapped" on GCCS systems, through the definition of their own functional and security profile

21 Old CCS CCS DNS Old CCS GCCS Gateway... Old CCS GCCS communication Record MX, TXT National CCS attributes Certificates, public keys CCS Internet GCCS communication Old CCS DNS Record MX, TXT National CCS attributes Certificates, public keys CCS Old CCS CCS GCCS Gateway... Old CCS

22 GCCS New CCS servers conforming to a GCCS profile are able to communicate directly Old CCS servers (governmental) communicate through a GCCS gateway All CCS servers perform DNS Queries and rely on standard Internet Communications The gateway is able to convert formats and notifications between a national CCS and external GCCS In alternative it would be possible to identify a common GCCS profile able to try to incorporate all CEM systems

23 Sender s PEC domain Func,onal schema of PEC 1 message wri,ng, connec,on to the provider 2 user iden,fica,on, formal and security check 4 envelope and sending Receiver s PEC domain 5 origin, integrity, formal and security check 3 Acceptance no,fica,on 7 delivery in the mailbox (electronic address of the receiver) 6 take in charge receipt 8 sent delivery receipt 9 message reading

24 GCCS A policy can be defined with attributes, defining conditions in incoming and outgoing flows some degree of degradation can be accepted according to the organization/user needs and communicated to the end users The profile can incorporate this policy to establish which one of the declared features and functions (TTP, what TTP certifies, time-outs, etc.) are mandatory or optional and what actions the server has to perform in case one of the mandatory features is not present in the destination or originator GCCS system

25 Trusted third party (TTP) In the trusting models a "trusted third party (TTP) certifies the participating parties and ensure compliance with common management and operation policies Certification Authority Technology behind the trusting model of a CA -- consisting of public-key signature algorithms, X509 certificates and other technical specifications -- can work even in the absence of the Certification Authority (TTP), obviously with different results from a semantic point of view (trusting) Technology is a basis on which to optionally activate a system of electronic signatures "trusted" throughout the introduction of a CA In the same way, the GCCS model can run without the need of a TTP in a less trusting fashion

26 Generic CCS system Each provider publishes its working profile (including the security policy) on the DNS (txt record) The GCCS server would be able to: Determine whether a destination domain is a GCCS or standard Internet Identify the provider of a GCCS domain Identify the profile of the GCCS Provider (working attributes of timeouts, message and notification format) Obtain public keys of any other GCCS provider Obtain any addresses needed for operational purpose (e.g., addresses for server-to-server acceptance notifications)

27 Generic CCS system Each CCS must publish its own public key in the DNS The provider must publish their list of managed CCS domains (record TXT) These functions could be certified by TTPs to add stronger security features (NRO, etc.). This assures flexibility in the interoperability of non-homogeneous CCSs, i.e., one belonging to a TTP and one not All Providers belonging to the same TTP realize a CEM system, according to the TTP specification The TTP publishes the working profile (including the security policy) of the CCS system on the DNS (txt record) In this case the attributes published by TTP overwrite those published by the provider

28 Conclusion This study suggests a conceptual model to support and fuel worldwide interoperability of Internet Certified Communication Systems (CCSs) worldwide The proposed model has to be validated two different CCSs have to share their technical specifications in order to define a common profile

29 Questions? Thanks

eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017

eidas & e-delivery CE Midsummer Conference The role of policy decisions in the postal & delivery industry, Copenhagen (DK), 12 June 2017 eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment

More information

ASEAN e-authentication Workshop Balwinder Sahota

ASEAN e-authentication Workshop Balwinder Sahota ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation

More information

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015 Electronic registered delivery services (ERDS) in light of the eidas regulation Warsaw Common Sign Conference 2015 ! 1. e-delivery and the eidas regulation - EU legislative framework - French legislative

More information

e-sens Electronic Simple European Networked Services

e-sens Electronic Simple European Networked Services e-sens Electronic Simple European Networked Services Herbert Leitold, A-SIT 2 nd SSEDIC International Identity Initiatives Conference (SIIIC) Rome, July 8 th 2013 Presentation Overview esens - LSP Relation

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 19 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources

More information

DMR Interoperability Process DMR Association

DMR Interoperability Process DMR Association DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the

More information

Draft ETSI EN V1.0.0 ( )

Draft ETSI EN V1.0.0 ( ) Draft EN 319 532-2 V1.0.0 (2018-05) Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Services; Part 2: Semantic contents 2 Draft EN 319 532-2 V1.0.0 (2018-05) Reference

More information

Letter of Understanding (LoU) edelivery alignment between the European Commission and OpenPEPPOL

Letter of Understanding (LoU) edelivery alignment between the European Commission and OpenPEPPOL Letter of Understanding (LoU) edelivery alignment between the European Commission and OpenPEPPOL This Letter of Understanding (LoU) is the result of a series of meetings between the European Commission

More information

STORK Secure Identity Across Borders Linked

STORK Secure Identity Across Borders Linked STORK Secure Identity Across Borders Linked Projekt STORK Status und Ausblick 2011 BITKOM FA eid 20. Januar 2011 / Berlin Volker Reible / T-Systems Stork is an EU co-funded project INFSO-ICT-PSP-224993

More information

Electronic and digital signatures in Adobe Sign for government.

Electronic and digital signatures in Adobe Sign for government. Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 Version Control Version Date Created by Description V1.2 November 2016 CEF Project & Architecture Office Final

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway

e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway esens BCSS call for proposal Objectives Consolidate and align work from the LSPs Create Long Term Sustainability

More information

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1 PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL Luca Boldrin, Juan Carlos Cruellas, Santino Foti, Paloma Llaneza, Kornél Réti Agenda STF 523 concept and context

More information

Implementation Guide for Delivery Notification in Direct

Implementation Guide for Delivery Notification in Direct Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4

More information

esignature Infrastructure Marketing Model

esignature Infrastructure Marketing Model www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of

More information

European Interoperability Framework

European Interoperability Framework European Interoperability Framework - The General Public (GPSCM) - Mike Kulbickas IDABC Directorate-General for Informatics European Commission 1 challenges & recommendations 2 Successful PEGS 3 4 2 5

More information

Send and Receive Exchange Use Case Test Methods

Send and Receive Exchange Use Case Test Methods Send and Receive Exchange Use Case Test Methods Release 1 Version 1.0 October 1, 2017 Send and Receive Exchange Test Methods Release 1 Version 1.0 Technology Sponsor [Name] [Email] [Telephone] Signature

More information

Cross border eservices STORK 2.0

Cross border eservices STORK 2.0 Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

eidas-node Error Codes

eidas-node Error Codes eidas-node Error Codes Version 2.0 Copyright European Commission DIGIT Unit B1 Document history Version Date Modification reason Modified by Origination 08/06/2017 Extracted from the eidas-node Installation,

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security. Technical framework for countering spam

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security. Technical framework for countering  spam International Telecommunication Union ITU-T X.1241 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2008) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles

Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles TS 102 640-5 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.2 (2011-09)

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

Interoperability Infrastructure Services

Interoperability Infrastructure Services Athens, October 23 rd, 2017 Interoperability Infrastructure Services to enable Secure, Cross-Border, Operational ehealth Services in Europe Dimitrios G. Katehakis, Foundation for Research and Technology

More information

Gateway Certification Authority pilot project

Gateway Certification Authority pilot project Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction

More information

Lightweight Infrastructure for Global Heterogeneous Trust management

Lightweight Infrastructure for Global Heterogeneous Trust management LIGHT est A Lightweight Infrastructure for Global Heterogeneous Trust Management Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and

More information

EUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block

EUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block EUROPEAN COMMISSION DIGIT DG CNECT Connecting Europe Facility SML and SMP CEF edelivery Building Block Version [1.00] Status [Final] European Union, 2018 Reuse of this document is authorised provided the

More information

SEMI 4845 NEW STANDARD:

SEMI 4845 NEW STANDARD: Background Statement for SEMI Draft Document 4845 NEW STANDARD: Specification for Identification by Digital Certificate Issued from CSB(Certificate Service Body ) for Anti-Counterfeiting Traceability in

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

Cloud28+ Compliance in Cross Border Business

Cloud28+ Compliance in Cross Border Business Cloud28+ Compliance in Cross Border Business SPEAKER: Munir Ismet Head of Cloud, - EMEA, Public Sector, HP Cloud28+ Compliance in Cross Border Business A single European Catalogue of cloud services Munir

More information

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security

More information

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 Contents 1 Introduction... 3 2 Basic principles... 3 3 Connection types... 4 3.1 Mail Gateway Integration

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics Introduction to the Connecting Europe Facility eid building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology March 2016

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

ehaction Joint Action to Support the ehealth Network

ehaction Joint Action to Support the ehealth Network Stakeholder Engagement - Consultation (22 August 2017) ehaction Joint Action to Support the ehealth Network 3 rd Joint Action to Support the ehealth Network Open Consultation 1 Participants of the 3 rd

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

Anti-Spoofing. Inbound SPF Settings

Anti-Spoofing. Inbound SPF Settings Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging

More information

EU EHEALTH INTEROPERABILITY,

EU EHEALTH INTEROPERABILITY, EU EHEALTH INTEROPERABILITY, STANDARDIZATION AND DEPLOYMENT STRATEGY Benoit Abeloos, Standardization and Interoperability DG CNECT, Health and Wellbeing Unit COCIR Workshop on Importance of Interoperability:

More information

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

THE PROSPECTS OF QUALITY MANAGEMENT INTERNATIONAL STANDARDS AND APPLICATION IN THE UKRAINIAN AGRO-INDUSTRIAL ENTERPRISES

THE PROSPECTS OF QUALITY MANAGEMENT INTERNATIONAL STANDARDS AND APPLICATION IN THE UKRAINIAN AGRO-INDUSTRIAL ENTERPRISES NATALIA GRABKO Odessa State agrarian University, Odessa, Ukraine THE PROSPECTS OF QUALITY MANAGEMENT INTERNATIONAL STANDARDS AND APPLICATION IN THE UKRAINIAN AGRO-INDUSTRIAL ENTERPRISES Introduction The

More information

Digital Austria = egov best practice in d Europe

Digital Austria = egov best practice in d Europe Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear

More information

Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture

Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture TS 102 640-1 V2.2.1 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture 2 TS 102 640-1 V2.2.1 (2011-09) Reference RTS/ESI-000071-1

More information

CEN & ETSI standards & eidas Compliance

CEN & ETSI standards & eidas Compliance CEN & ETSI standards & eidas Compliance Nick Pope - Thales Vice Chair, ETSI TC Electronic Signature & Infrastructures Jan Ulrik Kjærsgaard Cryptomathic Editor CEN EN 419 241-2 (Remote Signing) eidas and

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market

eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market Food Chain in the Digital Single Market 9 November 2016, Brussels Elena Alampi DG

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy

More information

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of

More information

ehealth Network Recommendations on Country Guide for ehealth NCP implementation

ehealth Network Recommendations on Country Guide for ehealth NCP implementation Recommendations on Country Guide for ehealth NCP implementation The ehealth Network is a voluntary network, set up under article 14 of Directive 2011/24/EU. It provides a platform of Member States' competent

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

European Commission Initiatives in telemedicine Presentation endorsed by the European Commission

European Commission Initiatives in telemedicine Presentation endorsed by the European Commission European Commission Initiatives in telemedicine Presentation endorsed by the European Commission Nicole Denjoy COCIR Secretary General How does the EU contribute to the large-scale deployment of telemedicine?

More information

e SENS Pilots of eid, esignatures and Trusted Services

e SENS Pilots of eid, esignatures and Trusted Services e SENS Electronic Simple European Networked Services Trust in the Digital World Madrid, February 26 th, 2015 e SENS Pilots of eid, esignatures and Trusted Services Lefteris Leontaridis, e SENS Piloting

More information

Digital Single Market Strategy for Europe

Digital Single Market Strategy for Europe Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Digital Single Market Strategy

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

Interoperability & Archives in the European Commission

Interoperability & Archives in the European Commission Interoperability & Archives in the European Commission By Natalia ARISTIMUÑO PEREZ Head of Interoperability Unit at Directorate- General for Informatics (DG DIGIT) European Commission High value added

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Securing, Protecting, and Managing the Flow of Corporate Communications

Securing, Protecting, and Managing the Flow of Corporate Communications Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant

More information

ITU-T Y Next generation network evolution phase 1 Overview

ITU-T Y Next generation network evolution phase 1 Overview I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond

More information

Forward set up. Technical team

Forward set up. Technical team Forward set up Technical team 09/04/2015 Summary Introduction... 3 Forward service description... 3 Presentation of our service... 3 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi

Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi SEMIC conference 2013 21 June 2013 Dublin (AgID) Created last year, AgID is a public body that merged three different existing

More information

Electronic ID at work: issues and perspective

Electronic ID at work: issues and perspective Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":

More information

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco  Security Field Engineer Specialist. Version: Demo Vendor: Cisco Exam Code: 650-153 Exam Name: ESFE Cisco Email Security Field Engineer Specialist Version: Demo Question No : 1 In the C-160's factory default configuration, which interface has ssh enabled

More information

PCI DSS and VNC Connect

PCI DSS and VNC Connect VNC Connect security whitepaper PCI DSS and VNC Connect Version 1.2 VNC Connect security whitepaper Contents What is PCI DSS?... 3 How does VNC Connect enable PCI compliance?... 4 Build and maintain a

More information

Authentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER

Authentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER Email Authentication GUIDE Frequently Asked QUES T ION S T OGETHER STRONGER EMAIL AUTHENTICATION Marketers that use email for communication and transactional purposes should adopt and use identification

More information

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS Vol. 13, No. 2, pp. 52-68 ISSN: 1645-7641 ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL Thomas Lenz. E-Government

More information

DRAFT REVISIONS BR DOMAIN VALIDATION

DRAFT REVISIONS BR DOMAIN VALIDATION DRAFT REVISIONS BR 3.2.2.4 DOMAIN VALIDATION (Feb. 15, 2016) Summary of changes The primary purpose of this change is to replace Domain Validation item 7 "Using any other method of confirmation which has

More information

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0) To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for

More information

eidas-compliant signing of PDF

eidas-compliant signing of PDF PDF Days Europe 2018 eidas-compliant signing of PDF Technical implications of eidas conformance in PDF processing Bernd Wild intarsys AG, Member of the Board of A Presentation 2018 by!11 72% of EU individuals

More information

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

e-submission Quick Reference Guide for Economic Operators

e-submission Quick Reference Guide for Economic Operators e-submission Quick Reference Guide for Economic Operators e-submission Quick Guide for Economic Operators Page 1 Last document update: 30/06/2017 Welcome to e-submission. This quick reference guide contains:

More information