Advanced search
Lessons on Safer Internet
This is a resource for teachers who teach young children at schools. Its purpose is to introduce a possible framework and guidelines for lessons during which pupils are introduced to different…
DOCUMENTCreated: 26/08/2015
Bomos2i Workshop ii minutes
This document contains the minutes of the Bomos2i Workshop ii: Sustaining Government ICT Standards, which was held in Brussels on 23 June 2015.
More information including the presentations…
DOCUMENTCreated: 10/07/2015
WinTIM 1.0.5 installer
WinTIM 1.0.5 Installer Nature of documentation: Package (didactic kit, software, CD-Rom…)
DOCUMENTCreated: 29/09/2014
WinTIM 1.0.5 zipped source code
Source code for the WINTIM package Version 1.0.5 Nature of documentation: Package (didactic kit, software, CD-Rom…)
DOCUMENTCreated: 29/09/2014
SBR: Standard Business Reporting (SBR)
Standard Business Reporting (SBR) provides governments and businesses with an unequivocal, cost-effective, secure and adaptable method for the exchange of business information between organisations in…
DOCUMENTCreated: 03/06/2014
Evaluation of Open Source CMS
How secure are Open Source CMS? To answer this question, the German Federal Office for Information Security (BSI) investigated the five most widely used CMS - Drupal, Joomla!, Plone, TYPO3 and…
DOCUMENTCreated: 25/02/2014
Background Document: Build, Connect, Grow: Make Business in the Digital Single Market
Build, Connect, Grow: Make Business in the Digital Single Market This document presents the background for the conference “Build, Connect, Grow: Make Business in the Digital Single Market” that will…
DOCUMENTCreated: 18/01/2013
SEMIRAMIS Newsletter
Welcome to the second newsletter of SEMIRAMIS. While our first newsletter centered on SEMIRAMIS in terms of objectives and challenges in the context of identity management for mobile citizens, this…
DOCUMENTCreated: 10/04/2012
EU: A flair for sharing - encouraging information exchange between CERTs
Description (short summary): Computer Emergency Response Teams (CERTs) are crucial in cross border co-ordination of computer incidents and in order to perform their important role they need to…
DOCUMENTCreated: 02/01/2012
EU: ENISA Report ‘Mapping security services to authentication levels - Reflecting on STORK QAA levels’
This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services)…
DOCUMENTCreated: 13/04/2011
SEMIRAMIS - Secure Management of Information across Multiple Stakeholders (SEMIRAMIS)
SEMIRAMIS will propose a European information exchange space for the unobstructed flow of data between and across multiple stakeholders by enabling the secure and reliable transfer of documents. It…
DOCUMENTCreated: 07/04/2011
CEL - Electric Power Quality (MITYC) (CEL)
The power of electrical supply is essential for the functioning of our society. Its price is a decisive factor of competitiveness of a large part of our economy. The technological development of the…
DOCUMENTCreated: 12/11/2010