Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
CSCI 6962: Server-side Design and Programming
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
IETF - LTANS, March 2004P. Sylvester, Edelweb & A. Jerman Blazic, SETCCE Introduction The following slides were prepared as a result of analysis and discussion.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Digital Signatures and Digital Certificates Monil Adhikari.
The Singapore Treaty on the Law of Trademarks Kiev March Noëlle Moutout Assistant Legal Officer.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Notary Services (Tobias Gondrom on behalf of ) Andreas U. Schmidt Fraunhofer Institute fo Secure Telecooperation (SIT) Darmstadt, Germany.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Unit 3 Section 6.4: Internet Security
Secure Sockets Layer (SSL)
TAG Presentation 18th May 2004 Paul Butler
Digital Signatures and Forms
Pooja programmer,cse department
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Dashboard eHealth services: actual mockup
CDK: Chapter 7 TvS: Chapter 9
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
National Trust Platform
Presentation transcript:

Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom

Notary Services Notary service: –An electronic service that supports a human notary to provide his/her services on electronic based processes and documents. An electronic notary service cannot function without the trust earned by the human behind it and the fact that the human notary has absolute control over the machine

Notary Services: use cases 1.record transactions: –The notary service has to record private transactions, e.g., transfers of ownership. (documentation) 2.record events: –The notary service has to document and proof that a certain event has happened. (Authentication, verify preconditions, record) 3.certification of copy documents: (transformation) –attest that one document contains the same information as another and the validity of all contained digital signatures 4.administering of oaths: –documented electronically instead of applying the seal of a notary on a piece of paper. E.g. the client can visit the office of a notary (maybe even only virtually), take an oath and the notary can record that with an electronic document, like a digital signed document. 5.attestation and certification of documents and events: –attest and certify the correctness and existence of a document and all contained signatures - take part in the creation and signing of the document and ensure the integrity of the environment

Notary Services: technical Function calls: –submit data –retrieve data –delete (???) data (if the notary services is authorized to allow deletion at a given point in time) Users: –request a specific service –receive an attestation All requests to a notary service MUST (???) be authenticated workflow to enable the human notary to fulfill and supervise its work

Notary Services: technical 4.2 Provide services –well documented and MUST create reports (authenticity can be verified by initial client and any other interested party) –Depending on the kind of service online interaction between the participants ??? 4.3 Support Demonstration of Service Integrity and Trust –MUST be able to demonstrate that the clients and users can trust it. (evaluation records by other trusted parties (e.g. government authorities), identity of members of notary office MUST be easily accessible). MUST be obvious if systems have been tampered with or manipulated. 4.4 Operation –must be under the complete and unconditional control of the notary office. It MUST be impossible to manipulate the system without the human notaries noticing it. 4.5 Data confidentiality –MUST allow to respect the confidentiality requirement of a particular procedure –information deployed outside the direct supervision of the notary office it is MANDATORY to encrypt the information with maximum security. If encryption becomes weak all information has to be re-encrypted with better algorithms. –all communications with a notary service MUST be encrypted. (e.g. SSL) 5. Operational Considerations –work efficiently even for large amounts of data objects and requests.

Notary Service Slides from Andreas Slides from John

Notary Services: Open Discussion