Interoperability solutions for the education, culture and sport
Culture and education
Last update: 23/04/2018
Slovenian Interoperability Portal NIO
The Slovenian interoperability Portal NIO is the basic cornerstone of the national interoperability framework in Slovenia. The portal allows various stakeholders to publish standards and guidelines on interoperability, interoperability information, and interoperability assets important at the national level and encourages them to publish open data and applications, developed in the reuse of the public sector information.
Standardisation
Last update: 25/09/2017
ISO/IEC 15408-2:2008 - Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional components
ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes. ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components…
eProcurement
Last update: 25/09/2017
ISO/IEC 15408-1:2005 - Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model
ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. It provides an overview of all parts of ISO/IEC 15408. It describes the various parts of ISO/IEC 15408; defines the terms and abbreviations to be used in all parts ISO/IEC 15408; establishes the core concept of a Target of Evaluation (TOE); the evaluation context; and describes the audience to which the…
eProcurement
Last update: 25/09/2017
ISO/IEC 19790:2012 - Information technology – Security techniques – Security requirements for cryptographic modules
ISO/IEC 19790:2012 is the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a…
eProcurement
Last update: 25/09/2017
ISO/IEC 29190:2015 - Information technology – Security techniques – Privacy capability assessment model
This standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.
eProcurement
Last update: 28/01/2016
Big file exchange system
The system SOVD is designed for transfer of large files (up to 10 GB) in a simple, secure and reliable way. The process starts when the 'sender' uploads the file into the central SOVD system. The 'receiver' gets notified by e-mail where he can find the link for the download. If the sender has protected the file with the password, the receiver gets that password via separate mail or SMS. The system also performs antivirus scan and in case of and viruses found, it denies the transfer. The senders must be registered, they must have a qualified digital certificateand they have to be inside the…
Standardisation
Last update: 28/01/2016
Common application building block Asynchronous module
SYSTEM FOR ELECTRONIC ENQUIRIES TO THE DATA SOURCES WHERE SYNCHRONOUS ACCESS IS NOT POSSIBLE Basic characteristics of the common building block ASYNCHRONOUS MODULE: • all enquiries are collected in a special protected "waiting room" for each data source data source processes the enquiries in the backoffice, returns the answers into the "waiting room" • support for single data sources and also data sources groups (wait for the answers of all group members, e.g. banks) • answering can be automatized (fetching the enquiries from the waiting room, processing, returning the answers) or manual…
Standardisation
Last update: 28/01/2016
Common application building block TRAY
SYSTEM FOR STANDARDIZED EXECUTION OF DATA ENQUIRIES Basic characteristics of the common application building block TRAY: • operating as a reliable transport between enquiring system and the data sources • neutralizes the technological particularities of data sources and their complexity • enables the enquiring systems to better focus on data contents and data processing • the data are stored only temporarily until the enquiring system receives them, afterwards only the traffic metadata are kept in the logs • extreme flexibility, adding data sources and enquiring systems without programming •…
Standardisation
Last update: 28/01/2016
Common application building block Security Platform
SYSTEM FOR STANDARDIZED MANAGEMENT OF USERS AND THEIR RIGHTS Basic characteristics of the common building block SECURITY PLATFORM: • access control for applications and their functionalities • support for physical users (persons) and system users (applications, systems) • authentication: all slovenian qualified digital certificates, additional password possible • authorization: first the user requests access to new application/module/profile/role, then the application owner confirms or rejects, automatization possible • managing hierarchy: application owner, institution supervisor, platform…
Standardisation
Last update: 28/01/2016
Common application building block IO-module
STANDARDIZED PLATFORM FOR DATA DISTRIBUTION Basic characteristics of the component IO-module: • enables the institutions to create their data distribution system on MPA infrastructure a special protected area is provided, where the institution (data owner) keeps its distribution database - updated copy of their data • many different technical possibilities for refreshing the contents of the distribution database • each institution is responsible for the contents of their distribution database and for the access control (transaction log) • standard enquiries by one key data (e.g. personal ID…
Standardisation
Last update: 11/02/2015
GovernmentConnect/JusticeConnect integration with MFERAC information system (invoices, financial orders)
This solution enables integration of the X-Connect information system (Government/Justice - Connect) with the information system of the Ministry of Finance MFERAC. Further, it includes electronic exchange of the invoices and financial orders. The solution is used also by The Public Payments Administration of the Republic of Slovenia.