IST Priority - No 507217 Venue:Bolzano eMayor Clustering Event Author(s):A. Kaliontzoglou, I. Stamatiou, P. Hengeveld Organisations: Expertnet S.A., Deloitte.

Slides:



Advertisements
Similar presentations
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Advertisements

© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Page 1 Issues in and perspectives on electronic authentication of health professionals Pascal POITEVIN Marketing and Communication manager GIP-CPS e-Health.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 March 4th, 2005 eMayor Clustering Event Secure communication and collaboration framework for the judicial co-operation environment.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Municipalities around Europe and their need for Secure eGovernment Solutions Electronic and Secure Municipal Administration for European Citizens Venue:Bolzano.
Applying the ISO RM-ODP Standard in e-Government B. Meneklis 1, A. Kaliontzoglou 2,3, D. Polemi 1, C. Douligeris 1 1 University of Piraeus, Department.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
EMayor Confidential ProprietaryIST Priority - No Venue:Bolzano Author(s): Nineta Polemi ( ) Organisations: University of Pireus.
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Strengthening the Strategic Cooperation between the EU and Western Balkan Region in the field of ICT Research Regional ICT R&D priorities, Jelena Pantelic,
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
THE ROLE OF CIVIL REGISTRY TO ACTIVATE THE ELECTRONIC AUTHENTICATION
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
EGov Interop'05 - Feb 23-24, Geneva (Switzerland) OBSERVATORY ON INTEROPERABLE eGOVERNMENT SERVICES eGov-Interop'05 Annual Conference February.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy Authors: C. Lambrinoudakis,
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
EGovernment Services in Poland Today & in The Future Dariusz Bogucki Ph.D, IDA II, National Co-ordinator National Registers Department, Ministry of Internal.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Cryptography, Authentication and Digital Signatures
What is e-government? E-Government refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust Models Presentation Trust Models. Trust Models Presentation Vishwas Patil, TIFR.2/100 Trust Models: Introduction  What is Trust ?  assured reliance.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Electronic Information System for Civil Registration and Administrative Services European eGovernment Conference July, Como, Italy Toma Bussarov.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
University of Piraeus Research Centre (UPRC) Assistant Professor Nineta Polemi “PREVENTION, PREPAREDENESS AND CONSEQUENCE MANAGEMENT OF.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Smart Data infrastructure
Training for developers of X-Road interfaces
eMayor at a Glance – Standards
Goals Introduce the Windows Server 2003 family of operating systems
Public Key Infrastructure from the Most Trusted Name in e-Security
HIMSS National Conference New Orleans Convention Center
eGovernment - The technological potential
Dashboard eHealth services: actual mockup
eGovernment - The technological potential
The e-government Conference main issues
Implementing paperless management at local level
Presentation transcript:

IST Priority - No Venue:Bolzano eMayor Clustering Event Author(s):A. Kaliontzoglou, I. Stamatiou, P. Hengeveld Organisations: Expertnet S.A., Deloitte Date: 04/03/2005 Electronic and Secure Municipal Administration for European Citizens eMayor The eMayor approach to Secure IT for Governmental organisations

IST Priority - No Our Target Group: the SMGO   Small-sized Government Organisations cover a geographic area serving several thousands of citizens, it may be located in rural or isolated areas. Example: a municipality on an island.   Medium-sized Government Organisations that cover a geographic area serving approximately between and citizens, that are normally located in urban or metropolitan areas. Examples: larger municipalities or chambers of commerce under public law.   Common characteristics: They interact frequently with citizens and/or businesses, to offer paper- based and electronic services utilizing a limited number of available resources (employees and funds). They interact with each other, in local or cross-border transactions, to exchange information on behalf of citizens, businesses or the organisation itself.  Interoperability, Security and Trust, Costs Training  Main concerns: Interoperability, Security and Trust, Costs Training

IST Priority - No Objectives of eMayor  Build an open, secure, interoperable and cost effective eGovernment platform, addressing the needs of small and medium sized public organizations  Perform a trial and assessment of the platform with basic e-government scenarios that involve in-country and cross-country interactions  Make use of European and worldwide standards and deploy as much as possible open source software.

IST Priority - No What does the eMayor platform do?  The platform provides a secure channel within and across borders between e-services in different municipalities  It enables a citizen residing in municipality A to have documents or services from a municipality B with a process/throughput time that is extremely minimilised compared to the present actual situation in European countries.

IST Priority - No How does the eMayor platform realize this reduction in throughput time? BolzanoCitizen Bolzano Bolzano Civil Servant Aachen Aachen Civil Servant 1a 1b 1c 1d

IST Priority - No What channels are we talking about in eMayor ……

IST Priority - No … And what security mechanisms are we talking about for these channels?  Security mechanisms Authentication (all channels) Confidentiality (channels 1 & 3) Integrity (all channels) Non-repudiation (channels 1, 2 & 3) Availability (all channels, various degrees) Authorization & access control (channels 1,2,3 & 4)  Are realized with the following technologies: SSL/TLS & IPSec for authentication, confidentiality & integrity on channel level XML digital signatures, Time Stamps & PKI validation data for authentication, integrity & non-repudiation on message level XML encryption for confidentiality on message level XACML for authorization & access control X509 & smart cards for credentials & credentials storage OSCP/CRLs for credentials validation Firewall for network perimeter security

IST Priority - No The full eMayor architecture includes a Policy enforcement handler

IST Priority - No The size and scope of the eMayor Trial  Use is made of 4 databases with information stored on copies of original systems of the 4 participating cities: Bolzano, Siena, Aachen and Seville  3 different scenario’s, including some transborder communication, will be tested  On average 50 citizens in every city participates in the eMayor trials. To this one should add the involvement of public administrators, IT-staff and IT support organisations of the cities. Internet eMayor MoSeville eMayor MoBolzano eMayor MoSiena eMayor MoAachen