© 1998 CSC. All rights reserved. 1 CSC Danmark International Operations Computer Sciences Corporation IOPNTS IOPNTS Overview of Telematic Systems October.

Slides:



Advertisements
Similar presentations
EU Presidency Conference Effective policies for the development of competencies of youth in Europe Warsaw, November 2011 Improving basic skills in.
Advertisements

Chapter 7 System Models.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 7 System Design Techniques.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
1 Requirements and needs of East and South East Asian countries in the context of EAM Ingrid Belčáková, Faculty of Architecture, STU, EIA Centre TwoEA-M.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Vienna, | Slide 1 EUROPEAN ENVIRONMENT AGENCY EUROPEAN TOPIC CENTRE ON WATER Quality of Groundwater in Europe Vienna, 22 June 2005 Andreas Scheidleder.
For APNOMS Managing Pervasive Computing and Ubiquitous Communications Challenges Ahead Graham Chen.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
© UNCTAD End. © UNCTAD End Direct Trader Input A short description of how Direct Trader Input ( DTI) is implemented using the ASYCUDA ++
FUTURE OF INFORMATION ACCESS OVERVIEW OF OECD AND LATIN AMERICA PERSPECTIVE ACCESSING TRANSPORTATION INFORMATION RESOURCES WORLDWIDE July 29 - August 2,
Credit hours: 4 Contact hours: 50 (30 Theory, 20 Lab) Prerequisite: TB143 Introduction to Personal Computers.
The Implementation Structure DG AGRI, October 2005
1 The role of macro- regional strategies after 2013 The Commissions view (or rather the view of one official) David Sweet, DG Regional Policy, European.
WG 2 (data exchange) During the transitional period and till the Single Authorisation electronic information and communication system is implemented,
Scoping the Framework Guidelines on Interoperability Rules for European Gas Transmission Geert Van Hauwermeiren Workshop, Ljubljana, 13 Sept 2011.
PwC Simplification Study for the EU Commission Jean-Marc Cambien Senior Manager ITU Conference, 5 and 6 June 2003, Geneva © 2003 PricewaterhouseCoopers.
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Computer Security CIS326 Dr Rachel Shipsey.
Introduction to Relational Database Systems 1 Lecture 4.
The ANSI/SPARC Architecture of a Database Environment
Multibanking.
Using Information at the University University Secretarys Office
Health and Safety Executive Health and Safety Executive CDM 2007 Training Package Session 2 - Clients Version: September 07.
Social Sciences Collections & Research: a new content-based team Gillian Ridgley, Ian Cooke, Jerry Jenkins.
SADC Course in Statistics Choosing appropriate methods for data collection.
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
1 Forms of International Business Trade International licensing of technology and intellectual property (trademarks, patents and copyrights) Foreign direct.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Creating Tables. 2 home back first prev next last What Will I Learn? List and provide an example of each of the number, character, and date data types.
1 UNSD/FSO workshop on Integrated Economic Statistics Jean-François Fracheboud Federal Department of Home Affairs FDHA Federal Statistical Office Re-engineering.
O X Click on Number next to person for a question.
© S Haughton more than 3?
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
United Nations Economic Commission for Europe Transport Division United Nations Economic Commission for Europe Transport Division ITU - Inland Transport.
HORIZON 2020 STEPHEN FOX FOR KEELE UNIVERSITY 26 TH FEBRUARY 2014.
Lecture 5: Requirements Engineering
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
2.2.1 Property Rights and Land Tenure 1 PROPERTY RIGHTS AND LAND TENURE UPA Package 2, Module 2.
BGP Overview Processing BGP Routes.
E-Nomination – Electronic procedure for the nomination of exchange students.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.
Week 1.
Protecting Heritage Places 10 steps to help protect the natural and cultural significance of places.
We will resume in: 25 Minutes.
O X Click on Number next to person for a question.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Building an EMS Database on a Company Intranet By: Nicholas Bollons Sally Goodman.
1 Budapest, June 14, Cross border communication among registers - Practical aspects - Yves Gonner Managing director - Trade and Companies Register.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e- commerce.
Data Protection Act AS Module Heathcote Ch. 12.
EDI communication system
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Data protection.
Data Protection Legislation
Presentation transcript:

© 1998 CSC. All rights reserved. 1 CSC Danmark International Operations Computer Sciences Corporation IOPNTS IOPNTS Overview of Telematic Systems October 1999

© 1998 CSC. All rights reserved. 2 CSC Danmark International Operations Computer Sciences Corporation IOPNTS Telematic Systems

© 1998 CSC. All rights reserved. 3 CSC Danmark International Operations Computer Sciences Corporation IOPNTS The following areas are covered: Telematic systems In general Technologies and Standard Directions Transmission Standards Services Applications Key issues on Physical Infrastructure Organisational Pattern Security requirements Issues covered Telematic Systems

© 1998 CSC. All rights reserved. 4 CSC Danmark International Operations Computer Sciences Corporation IOPNTS All countries provided information on their Telematic infrastructure Most countries have identified the main telematic service providers Most countries have or have plans for National Administrative Networks Telematic Systems General Information responses

© 1998 CSC. All rights reserved. 5 CSC Danmark International Operations Computer Sciences Corporation IOPNTS There is a clear trend towards IP technology However other technologies must be supported (X400, CICS, SNA …) Telematic Systems Telematics Technologies and Standard Directions

© 1998 CSC. All rights reserved. 6 CSC Danmark International Operations Computer Sciences Corporation IOPNTS The following 3 tables present the responses to questions on the use of specific techniques within the administration in terms of whether these are: OIn operation IUnder implementation PPlanned or Envisaged -Not used or no information Telematic Systems Telematic Transmission Standards

© 1998 CSC. All rights reserved. 7 CSC Danmark International Operations Computer Sciences Corporation IOPNTS For all countries the basic telematic infrastructure is present Telematic Systems Telematic Transmission Standards

© 1998 CSC. All rights reserved. 8 CSC Danmark International Operations Computer Sciences Corporation IOPNTS All the services listed are widely used and should be supported by the EuroDomain. Telematic Systems Telematic Services

© 1998 CSC. All rights reserved. 9 CSC Danmark International Operations Computer Sciences Corporation IOPNTS Again and Web facilities are required Conferencing should be extended to the EuroDomain The response to Language translation is remarkable Telematic Systems Telematic Applications

© 1998 CSC. All rights reserved. 10 CSC Danmark International Operations Computer Sciences Corporation IOPNTS services is a must IP protocol must be supported X400 is widely used and must be supported Telematic Systems Telematic Applications

© 1998 CSC. All rights reserved. 11 CSC Danmark International Operations Computer Sciences Corporation IOPNTS There is a general need for EDI services EDIFACT is the preferred format Newer formats should be considered Telematic Systems Telematic Applications Electronic Document Exchange

© 1998 CSC. All rights reserved. 12 CSC Danmark International Operations Computer Sciences Corporation IOPNTS Key issues on Physical Infrastructure and Organisational Pattern System integration and co-operation between administrations is an issue Likewise the infrastructure in remote areas Telematic Systems

© 1998 CSC. All rights reserved. 13 CSC Danmark International Operations Computer Sciences Corporation IOPNTS Security Requirements

© 1998 CSC. All rights reserved. 14 CSC Danmark International Operations Computer Sciences Corporation IOPNTS The main findings are centred round the following statements: Privacy in terms of protection of data about citizens (and businesses) Personal Data Protection Act or similar legislation is a prime reason for security Protection of the individual rights covers storing, processing and circulation of personal data. National law does not distinguish between whether personal data is used at National or Trans-National level. The main concern is on exchange of data between administrations within the National boundaries Little or no mentioning of exchange of data at Trans-National level Security aspect of reliability is rarely mentioned Security Requirements Findings

© 1998 CSC. All rights reserved. 15 CSC Danmark International Operations Computer Sciences Corporation IOPNTS These findings may be put in a more general context Cultural impacts Human rights Intellectual rights Interest of the State And more National Legislation Personal Data Protection Act Restrictions on registers And more The frame within which it is allowed to operate: Restriction on collection and storing of sensitive data Restriction on access to data Restriction on sharing of data Requirements on the reliability of data Influence Define Influence Security Requirements Structuring the Findings

© 1998 CSC. All rights reserved. 16 CSC Danmark International Operations Computer Sciences Corporation IOPNTS The definition of the borders of the frame is defined by the Nations. Some trans-National co-ordination has occurred in bilateral or collective agreements (EU, OECD, ….) Security Requirements Structuring the Findings

© 1998 CSC. All rights reserved. 17 CSC Danmark International Operations Computer Sciences Corporation IOPNTS All information kept by the administration is sensitive unless defined as public. Therefore sharing of data (telematic exchange) is only allowed between specific authorised administrations. Within the Nation as well as externally. When an agreement has been arranged both parts have agreed to treat the information according to the agreement. And the exchange must be safe according to the security level. Security Requirements A good starting point

© 1998 CSC. All rights reserved. 18 CSC Danmark International Operations Computer Sciences Corporation IOPNTS The requirements for exchange of information are: Delivery (non repudiation) No incorrect delivery The messaged is un-opened The message is un-copied Identity of the sender These must be guaranteed: Security Requirements Safe transmission