Interoperability Challenge of Certified Communication Systems via Internet
|
|
- Aron Jefferson
- 5 years ago
- Views:
Transcription
1 Interoperability Challenge of Certified Communication Systems via Internet Marina Buzzi, IIT-CNR, Francesco Gennai, ISTI-CNR, Claudio Petrucci, Agid, egose 2017, 4-7 Sept, ITMO University, St.Petersburg
2 Agenda Introduction Motivation Certified Communication Systems (CCS) Related Work The Model: Generic CCS (GCCS) Idea Logical scheme Main functions Conclusion
3 Motivation Developing the full potential of Information and Communication Technology (ICT) can greatly innovate society in a number of sectors ecommerce, egovernment, ehealth, Lack of interoperability and adherence to international standards heavily impacts on economic growth and competitiveness
4 Certificated Communication Systems (CCS) Several countries have adopted systems to certify communications via Internet CCSs (Certified Communication Systems): Certified Electronic Mail (CEM) systems based on smtp protocol (simple message transfer protocol) Certified systems based on the Hypertext Transfer Protocol (HTTP)
5 CCS Systems European CCS systems rely on different protocols and formats Interoperability is necessary to enable the exchange of messages between users of different domains Certified/Registered Electronic Mail (CEM/REM) systems (SMTP) PEC (Posta Elettronica Certificata, Italy) D (German D ) SI Post (Moja.posta.si Slovenia) AU-DSS (Austrian Document Delivery System) Digital Post in Denmark Sikker Digital Post in Norway Mina meddelanden in Sweden Web-based systems: 1) Universal Postal Union (UPU) developed Postal Registered Electronic Mail Prem 2) PEPPOL (Pan-European Public eprocurement On-Line), for document exchange between Public Administrations, funded by EU
6 Generic CCS model Challenge: to build worldwide interoperability between certified communication systems The Generic CCS model (GCCS): an open solution to redefine closed CCS systems
7 CCS CCS systems certify the source of a message Today this is also possible thanks to standard mechanisms available on the Internet SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting and Conformance), Requirements of certification often address also specific needs internal to countries (governmental) "closed" CCSs are different from each other, although solve exactly the same class of problems
8 CCS identification of the source not of the sender (satisfied by EIDAS specification, eidas electronic IDentification, Authentication and trust Services for electronic transactions) server-user acceptance notification delivery notification server-server notification communications moving between different providers in the same CCS infrastructure
9 Generic CCS Idea: to publish a generic specification for describing CCS systems usable as common rules for immediate interoperability between worldwide Providers To illustrate this model we focus on Certified Systems (CEM)
10 GCCS Model Open, interoperable and scalable solution while minimizing the impact on existing infrastructure To this aim the DNS (Domain Name System) is used to store information for the GCCS functioning common practice to take advantage of the attributes of the TXT record of the DNS SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting and Conformance) specifications Advantage: DNS technology can be used to immediately spread protocol information without the need to define new DNS records, keeping the current DNS structure
11 Related Work Certified systems showed usability problems (use of public/private key, certificates, etc.) In 2001, to simplify user interaction and reduce costs, a centralized approach has been proposed to provide cryptography as a network service (Dean et al.) client must trust the cryptoserver (which keeps users private keys) Garfinkel et al. (2005) surveyed 400 vendors via Amazon most participants did not know secure Segeberg (2009) created plugin for making a certified system easy to interact Bobba et al. (2009) developed a secure mailing list (Secure List Services) providing encryption via proxy
12 Related Work The European Commission supported the creation of a gateway between different Certified Delivery systems Previous actions for reaching cross-border interoperability have mainly focused on bridging existing systems Within this framework the European Telecommunications Standards Institute (ETSI) defined the Technical Specification Registered Electronic Mail (REM) An ETSI Task Force was set up REM Interchange: Interchange between Registered (REM) systems based on different transmission protocols (2011) To assure the conformity to the eidas Regulation, a new document "Rationalized structure for Electronic Signature Standardization" has been published (2015)
13 Related Work A comparison of policies to fuel certified communication between public sector and citizens in the Scandinavian countries has been carried out by Jansen et al (2016) Similar solutions in comparable contexts Three countries applied different degrees of coercion ranging from mandatory (Denmark), to nudging (Norway), to voluntary (Sweden) Member States have the possibility of applying more or less restrictive policies Voluntary base was adopted slowly while the mandatory achieved better results fast very important since digitalization of communication lowers costs and improves efficiency
14 Challenge How to solve CCS interoperability problem without referring to any specific systems in a way that is general enough to redefine any certified communication system
15 Trusted third party Existing Certified Providers deliver systems that rely on a trusted third party unsuitable for cross-border application, limit the interoperability (Jansen et al.) Paulin & Welzer propose a certified system that does not rely on a trusted third party for fair non-repudiation of receipt a protocol splits an encrypted message into a chain of parts, which the recipient gradually acquires, generating proof-of-receipt for each individual part It covers only a part of the problem, since it misses the description of a mechanism for abstracting the specific CEM systems in a general public profile
16 Generic CCS (GCCS) Conceptual openness it specifies a generic model and attribute language to redefine the current CCS functionally equivalent in terms of functions, reliability and degree of security to the original taking advantage of IETF standards Each CEM system could be described by a specific CCS profile It is necessary to create a set of public standard Generic CCS profiles profiles A, B, C, etc. with different levels of security and functions Any provider adopting one of these public profiles can interoperate with any providers adopting the same level of profile without any agreement
17 GCCS A set of properties that CEM systems would satisfy to be incorporated in the GCCS policy are (Tauber): Non-repudiation of origin (NRO) if the protocol offers evidence against the false denial of having originated the message Non-repudiation of receipt (NRR) if the protocol provides evidence against the false denial of having received the message Non-repudiation of submission (NRS) if the protocol provides evidence against the false denial of having submitted the message Non-repudiation of delivery (NRD) if the protocol provides evidence against the false denial of having delivered the message
18 GCCS We propose to define a specification using simple language to define a list of attributed value pairs and by adding the definition of some headers These pairs (attribute, value) are added into TXT records of DNS systems, according to RFC 1464
19 GCCS Taking advantage of Internet "mechanisms (DNSSec, TXT DNS records, etc.) is possible to define a set of generic abstract rules to describe the behavior of each existing CCS system By using the GCCS (Generic Certified Communication System) rules it is possible to define a generic interface to each of the worldwide CCS systems (national/ government) enabling interoperability between them In the case of two generic ISPs, the independent adoption (not coordinated) of a system compliant with a GCCS profile would mean that the communication between users belonging to these providers would be of the CCS type
20 GCCS The GCCS defines the technical rules through which each provider declares (via DNS TXT record) Features, level of security (X.509 certificates, CA, DNSSec, etc.), protocols (SMTP, HTTP), timeouts, etc. Profiles establish a minimum level (of functionality, security, etc.) that a particular provider must support in order for a communication to be considered belonging to this CCS type existing CCS systems may be "mapped" on GCCS systems, through the definition of their own functional and security profile
21 Old CCS CCS DNS Old CCS GCCS Gateway... Old CCS GCCS communication Record MX, TXT National CCS attributes Certificates, public keys CCS Internet GCCS communication Old CCS DNS Record MX, TXT National CCS attributes Certificates, public keys CCS Old CCS CCS GCCS Gateway... Old CCS
22 GCCS New CCS servers conforming to a GCCS profile are able to communicate directly Old CCS servers (governmental) communicate through a GCCS gateway All CCS servers perform DNS Queries and rely on standard Internet Communications The gateway is able to convert formats and notifications between a national CCS and external GCCS In alternative it would be possible to identify a common GCCS profile able to try to incorporate all CEM systems
23 Sender s PEC domain Func,onal schema of PEC 1 message wri,ng, connec,on to the provider 2 user iden,fica,on, formal and security check 4 envelope and sending Receiver s PEC domain 5 origin, integrity, formal and security check 3 Acceptance no,fica,on 7 delivery in the mailbox (electronic address of the receiver) 6 take in charge receipt 8 sent delivery receipt 9 message reading
24 GCCS A policy can be defined with attributes, defining conditions in incoming and outgoing flows some degree of degradation can be accepted according to the organization/user needs and communicated to the end users The profile can incorporate this policy to establish which one of the declared features and functions (TTP, what TTP certifies, time-outs, etc.) are mandatory or optional and what actions the server has to perform in case one of the mandatory features is not present in the destination or originator GCCS system
25 Trusted third party (TTP) In the trusting models a "trusted third party (TTP) certifies the participating parties and ensure compliance with common management and operation policies Certification Authority Technology behind the trusting model of a CA -- consisting of public-key signature algorithms, X509 certificates and other technical specifications -- can work even in the absence of the Certification Authority (TTP), obviously with different results from a semantic point of view (trusting) Technology is a basis on which to optionally activate a system of electronic signatures "trusted" throughout the introduction of a CA In the same way, the GCCS model can run without the need of a TTP in a less trusting fashion
26 Generic CCS system Each provider publishes its working profile (including the security policy) on the DNS (txt record) The GCCS server would be able to: Determine whether a destination domain is a GCCS or standard Internet Identify the provider of a GCCS domain Identify the profile of the GCCS Provider (working attributes of timeouts, message and notification format) Obtain public keys of any other GCCS provider Obtain any addresses needed for operational purpose (e.g., addresses for server-to-server acceptance notifications)
27 Generic CCS system Each CCS must publish its own public key in the DNS The provider must publish their list of managed CCS domains (record TXT) These functions could be certified by TTPs to add stronger security features (NRO, etc.). This assures flexibility in the interoperability of non-homogeneous CCSs, i.e., one belonging to a TTP and one not All Providers belonging to the same TTP realize a CEM system, according to the TTP specification The TTP publishes the working profile (including the security policy) of the CCS system on the DNS (txt record) In this case the attributes published by TTP overwrite those published by the provider
28 Conclusion This study suggests a conceptual model to support and fuel worldwide interoperability of Internet Certified Communication Systems (CCSs) worldwide The proposed model has to be validated two different CCSs have to share their technical specifications in order to define a common profile
29 Questions? Thanks
eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017
eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationElectronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015
Electronic registered delivery services (ERDS) in light of the eidas regulation Warsaw Common Sign Conference 2015 ! 1. e-delivery and the eidas regulation - EU legislative framework - French legislative
More informatione-sens Electronic Simple European Networked Services
e-sens Electronic Simple European Networked Services Herbert Leitold, A-SIT 2 nd SSEDIC International Identity Initiatives Conference (SIIIC) Rome, July 8 th 2013 Presentation Overview esens - LSP Relation
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 19 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources
More informationDMR Interoperability Process DMR Association
DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the
More informationDraft ETSI EN V1.0.0 ( )
Draft EN 319 532-2 V1.0.0 (2018-05) Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Services; Part 2: Semantic contents 2 Draft EN 319 532-2 V1.0.0 (2018-05) Reference
More informationLetter of Understanding (LoU) edelivery alignment between the European Commission and OpenPEPPOL
Letter of Understanding (LoU) edelivery alignment between the European Commission and OpenPEPPOL This Letter of Understanding (LoU) is the result of a series of meetings between the European Commission
More informationSTORK Secure Identity Across Borders Linked
STORK Secure Identity Across Borders Linked Projekt STORK Status und Ausblick 2011 BITKOM FA eid 20. Januar 2011 / Berlin Volker Reible / T-Systems Stork is an EU co-funded project INFSO-ICT-PSP-224993
More informationElectronic and digital signatures in Adobe Sign for government.
Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationElectronic signature framework
R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationedelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016
edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 Version Control Version Date Created by Description V1.2 November 2016 CEF Project & Architecture Office Final
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informatione-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway
e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway esens BCSS call for proposal Objectives Consolidate and align work from the LSPs Create Long Term Sustainability
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationeidas Regulation (EU) 910/2014 eidas implementation State of Play
eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN
More informationSecurity by Any Other Name:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL
ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL Luca Boldrin, Juan Carlos Cruellas, Santino Foti, Paloma Llaneza, Kornél Réti Agenda STF 523 concept and context
More informationImplementation Guide for Delivery Notification in Direct
Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4
More informationesignature Infrastructure Marketing Model
www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of
More informationEuropean Interoperability Framework
European Interoperability Framework - The General Public (GPSCM) - Mike Kulbickas IDABC Directorate-General for Informatics European Commission 1 challenges & recommendations 2 Successful PEGS 3 4 2 5
More informationSend and Receive Exchange Use Case Test Methods
Send and Receive Exchange Use Case Test Methods Release 1 Version 1.0 October 1, 2017 Send and Receive Exchange Test Methods Release 1 Version 1.0 Technology Sponsor [Name] [Email] [Telephone] Signature
More informationCross border eservices STORK 2.0
Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project
More informationComparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition
Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,
More informationSAT for eid [EIRA extension]
SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration
More informationeidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?
eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals
More informationMail Assure. Quick Start Guide
Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up
More informationeidas-node Error Codes
eidas-node Error Codes Version 2.0 Copyright European Commission DIGIT Unit B1 Document history Version Date Modification reason Modified by Origination 08/06/2017 Extracted from the eidas-node Installation,
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security. Technical framework for countering spam
International Telecommunication Union ITU-T X.1241 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2008) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationTechnical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles
TS 102 640-5 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.2 (2011-09)
More informationGuidance for Requirements for qualified trust service providers: trustworthy systems and products
Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there
More informationInteroperability Infrastructure Services
Athens, October 23 rd, 2017 Interoperability Infrastructure Services to enable Secure, Cross-Border, Operational ehealth Services in Europe Dimitrios G. Katehakis, Foundation for Research and Technology
More informationGateway Certification Authority pilot project
Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction
More informationLightweight Infrastructure for Global Heterogeneous Trust management
LIGHT est A Lightweight Infrastructure for Global Heterogeneous Trust Management Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and
More informationEUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block
EUROPEAN COMMISSION DIGIT DG CNECT Connecting Europe Facility SML and SMP CEF edelivery Building Block Version [1.00] Status [Final] European Union, 2018 Reuse of this document is authorised provided the
More informationSEMI 4845 NEW STANDARD:
Background Statement for SEMI Draft Document 4845 NEW STANDARD: Specification for Identification by Digital Certificate Issued from CSB(Certificate Service Body ) for Anti-Counterfeiting Traceability in
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationCEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam
CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationToward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization
Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationSecurity Aspects of Trust Services Providers
Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00
More informationCloud28+ Compliance in Cross Border Business
Cloud28+ Compliance in Cross Border Business SPEAKER: Munir Ismet Head of Cloud, - EMEA, Public Sector, HP Cloud28+ Compliance in Cross Border Business A single European Catalogue of cloud services Munir
More informationThe emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18
The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security
More informationsimply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12
simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 Contents 1 Introduction... 3 2 Basic principles... 3 3 Connection types... 4 3.1 Mail Gateway Integration
More informationFIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode
This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on
More informationeid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility eid building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology March 2016
More informationNew cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017
in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM
More informationInnovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017
Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware
More informationehaction Joint Action to Support the ehealth Network
Stakeholder Engagement - Consultation (22 August 2017) ehaction Joint Action to Support the ehealth Network 3 rd Joint Action to Support the ehealth Network Open Consultation 1 Participants of the 3 rd
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationDirect, DirectTrust, and FHIR: A Value Proposition
Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust
More informationAnti-Spoofing. Inbound SPF Settings
Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging
More informationEU EHEALTH INTEROPERABILITY,
EU EHEALTH INTEROPERABILITY, STANDARDIZATION AND DEPLOYMENT STRATEGY Benoit Abeloos, Standardization and Interoperability DG CNECT, Health and Wellbeing Unit COCIR Workshop on Importance of Interoperability:
More informationOverview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke
Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationTHE PROSPECTS OF QUALITY MANAGEMENT INTERNATIONAL STANDARDS AND APPLICATION IN THE UKRAINIAN AGRO-INDUSTRIAL ENTERPRISES
NATALIA GRABKO Odessa State agrarian University, Odessa, Ukraine THE PROSPECTS OF QUALITY MANAGEMENT INTERNATIONAL STANDARDS AND APPLICATION IN THE UKRAINIAN AGRO-INDUSTRIAL ENTERPRISES Introduction The
More informationDigital Austria = egov best practice in d Europe
Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear
More informationTechnical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture
TS 102 640-1 V2.2.1 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture 2 TS 102 640-1 V2.2.1 (2011-09) Reference RTS/ESI-000071-1
More informationCEN & ETSI standards & eidas Compliance
CEN & ETSI standards & eidas Compliance Nick Pope - Thales Vice Chair, ETSI TC Electronic Signature & Infrastructures Jan Ulrik Kjærsgaard Cryptomathic Editor CEN EN 419 241-2 (Remote Signing) eidas and
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationeidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market
eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market Food Chain in the Digital Single Market 9 November 2016, Brussels Elena Alampi DG
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of
More informationehealth Network Recommendations on Country Guide for ehealth NCP implementation
Recommendations on Country Guide for ehealth NCP implementation The ehealth Network is a voluntary network, set up under article 14 of Directive 2011/24/EU. It provides a platform of Member States' competent
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationEuropean Commission Initiatives in telemedicine Presentation endorsed by the European Commission
European Commission Initiatives in telemedicine Presentation endorsed by the European Commission Nicole Denjoy COCIR Secretary General How does the EU contribute to the large-scale deployment of telemedicine?
More informatione SENS Pilots of eid, esignatures and Trusted Services
e SENS Electronic Simple European Networked Services Trust in the Digital World Madrid, February 26 th, 2015 e SENS Pilots of eid, esignatures and Trusted Services Lefteris Leontaridis, e SENS Piloting
More informationDigital Single Market Strategy for Europe
Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Digital Single Market Strategy
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationInteroperability & Archives in the European Commission
Interoperability & Archives in the European Commission By Natalia ARISTIMUÑO PEREZ Head of Interoperability Unit at Directorate- General for Informatics (DG DIGIT) European Commission High value added
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationSecuring, Protecting, and Managing the Flow of Corporate Communications
Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant
More informationITU-T Y Next generation network evolution phase 1 Overview
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationMUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan
MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond
More informationForward set up. Technical team
Forward set up Technical team 09/04/2015 Summary Introduction... 3 Forward service description... 3 Presentation of our service... 3 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending
More informationDIGITALSIGN - CERTIFICADORA DIGITAL, SA.
DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationSemantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi
Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi SEMIC conference 2013 21 June 2013 Dublin (AgID) Created last year, AgID is a public body that merged three different existing
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationVendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo
Vendor: Cisco Exam Code: 650-153 Exam Name: ESFE Cisco Email Security Field Engineer Specialist Version: Demo Question No : 1 In the C-160's factory default configuration, which interface has ssh enabled
More informationPCI DSS and VNC Connect
VNC Connect security whitepaper PCI DSS and VNC Connect Version 1.2 VNC Connect security whitepaper Contents What is PCI DSS?... 3 How does VNC Connect enable PCI compliance?... 4 Build and maintain a
More informationAuthentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER
Email Authentication GUIDE Frequently Asked QUES T ION S T OGETHER STRONGER EMAIL AUTHENTICATION Marketers that use email for communication and transactional purposes should adopt and use identification
More informationENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS
Vol. 13, No. 2, pp. 52-68 ISSN: 1645-7641 ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL Thomas Lenz. E-Government
More informationDRAFT REVISIONS BR DOMAIN VALIDATION
DRAFT REVISIONS BR 3.2.2.4 DOMAIN VALIDATION (Feb. 15, 2016) Summary of changes The primary purpose of this change is to replace Domain Validation item 7 "Using any other method of confirmation which has
More information1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)
To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0
More informationIntroduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria
Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a
More informationIntroduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria
Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a
More informationAN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers
AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for
More informationeidas-compliant signing of PDF
PDF Days Europe 2018 eidas-compliant signing of PDF Technical implications of eidas conformance in PDF processing Bernd Wild intarsys AG, Member of the Board of A Presentation 2018 by!11 72% of EU individuals
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationPrivacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria
Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informatione-submission Quick Reference Guide for Economic Operators
e-submission Quick Reference Guide for Economic Operators e-submission Quick Guide for Economic Operators Page 1 Last document update: 30/06/2017 Welcome to e-submission. This quick reference guide contains:
More information