Session 1.6a: PRESENTATION

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

A strategy for a Secure Information Society –
1 European Interoperability Framework for pan-European eGovernment Services Paulo Lopes European Commission, Directorate General Information Society Presentation.
Erkki Liikanen Member of the European Commission, Enterprise Policy and Information Society IDEA Conference on eDemocracy, Stockholm 29 June 2001 e Government.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Setting Processes for Electronic Signature 1 The ”W-SPES Project” and the “Leuven Report on the Electronic Signatures Directive” – Putting the Project.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
August 2004 Providing Industry-wide Security and Identity Management Solutions.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
1 Bridge/Gateway CA Project Status Gzim OCAKOGLU European Commission – DG ENTR / IDABC Reykjavik – 27 May 2005.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Page 1 Issues in and perspectives on electronic authentication of health professionals Pascal POITEVIN Marketing and Communication manager GIP-CPS e-Health.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
The Leading Information Centre Conference on Interoperable European ID Haikko, Finland 3-5 April 2002.
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
The TERENA Academic CA Repository. eIRG Meeting. Dublin, 16/04/2004 Diego R. Lopez – TF-AACE  Task Force on Authentication and.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
National Smartcard Project Work Package 8 – Security Issues Report.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
The Porvoo Group Tapio Aaltonen Director, CA-services, co- chair Porvoo Group Population Register Centre Finland.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Legislation and Market Forces: PKI Drivers for the U. S. Mortgage Industry November 27, 2006 R. J. Schlecht Director, Industry Technology – Security &
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Jimmy C. Tseng Assistant Professor of Electronic Commerce
Dr Aniyan Varghese eGovernment Unit eGovernment Unit Directorate General Information Society Dr Aniyan Varghese eGovernment.
/ 8 FEIDHE Electronic Identification in Finnish Higher Education Janne Kanner FEIDHE Electronic Identification in Finnish Higher Education.
Presentation to the EUPAN Riga, March 2015 ISA 2 A Programme for Interoperability Solutions for European public Administrations, businesses and citizens.
Some Technical Issues in PKI Deployment David Chadwick
EESSI - project Advisory Committee meeting 22 October 2010 DG Employment, Social Affairs and Equal Opportunities1.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Conference Pan-European eGovernment services for citizens & enterprises E.3 Services for enterprises Development and improvement of Information Systems.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
ISSS 2001, Hradec Králové, Czech Republic, 26/3/01 IDA for e-Europe & e-Government Dawn Galletly DG Enterprise/D5 European Commission.
Bulding blocks of e- government Ingmar Pappel. Bulding blocks of e-government  Personal Code  Digital Identity  Digital signature  X-Road  Organizations.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
TeleTrusT Initiatives for PKI Solutions
Module 8: Securing Network Traffic by Using IPSec and Certificates
Organized by governmental sector (National Institute of information )
Public Key Infrastructure (PKI)
Formats for long term signatures
European Commission Initiatives for eGovernment
E-government Working Group
جايگاه گواهی ديجيتالی در ايران
Public Key Infrastructure from the Most Trusted Name in e-Security
Wolfgang Knüppel Eurostat Unit A2
CCFICS 18th session Surfers Paradise 4 March 2010
Session 1.5a New ways to organise the activities in the European Institutions and on the Member States administrations, as a consequence of e-Government.
HIMSS National Conference New Orleans Convention Center
Module 8: Securing Network Traffic by Using IPSec and Certificates
Laur Mägi Department of Information Systems and Document Management
WG 1.5 b Summary Statement: Qualitative e-Government-services and effective front-office are conditioned by a good back-office Presentation of Emmanuel.
Albeado - Enabling Smart Energy
Doug Bellows – Inteliquent 3/18/2019
Tim Polk, NIST PKI Program Manager March 2000
Presentation transcript:

Session 1.6a: PRESENTATION Security requirements Security actions        Legislative and Policy issues A comprehensive multipillar approach of security in EU. Electronic Identification & Authentication - Electronic signature Electronic identification for citizens to be used throughout EU. Policy on the interoperability of Member States’ PKIs To apply the outcome of EESSI and eEurope TBs1 & 2 Risk awareness and risk warning Spread use of best practice; Evaluation and certification EU Policy on security products evaluation and certification. Technology

Session 1.6a: Outcome of the discussion (I) ·Security should not be an stopper to the deployment of electronic services. The proportionality principle should be applied.   ·Agreement on a universal certificate (certificate of identity) may boost the deployment of electronic services and achieve a critical mass and consequently increase the number of citizens as end users. As a result from this the Administration may have the ability to influence developments of new information society services, particularly B2C e-commerce. ·To keep on working with a pragmatic approach in the interoperability and harmonisation of PKIs, certificates (attributes, optional fields), revocation lists, directories and procedures, certification statement policies, etc, between Member States and European Institutions.

Session 1.6a: Outcome of the discussion (II)   ·  The insterest of the Bridge CA study included in IDA HAM WP is reinforced. ·  To feed IDA (PCI & HAM) with the results of EESSI, and TBs Public Identity and Identification and Authentication. Also to encourage Member states to use these results. ·  To follow with interoperability experiences (IDA PKICUG and e-mail) and issue guidelines from the conclusions. ·  Certificates using smart cards and software certificates; flexibility between these two options depending on the requirements of the service. ·  CERTs: There is a real need for an inventory of CERT functions and information managed and also exchange of information between them. To encourage the use of security best practices in the development of e-services projects (e.g. ISO/IEC IS 17799).