Cybershare Conference to share experience on cybersecurity.
ICT security
Last update: 08/03/2019
Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation regardless of time or place. The service provides mandates for all possible business cases and scenarios and their use cases, depending on which services the mandate is being used for. Different scenarios include: person to person mandates, person to company/organisation mandates, company/organisation to person mandates and company/organisation to company/organisation mandates. The service consists…
Open Source Software
Last update: 11/01/2017
ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically “signing and submitting” represents a legal signature and ensures that the communications and transactions between customers and Revenue cannot be repudiated at a later stage. Developed on a PKI infrastructure, this security underpins all electronic activity for Business Users. 5.3 million Revenue Returns were processed through this channel over the course of 2015, and Ireland is considered as 1st in…
ICT security
Last update: 07/12/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI infrastructure uniquely binds public keys with respective user identities by means of a certificate authority (CA) trusting digital identities through the registration and issuance process. Depending on the assurance level of the binding, this may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA) that ensures the…
ICT security
Last update: 02/10/2017
CEN Workshop Agreement Global eBusiness Interoperability Test Beds GITB Phase 3
The GITB project (Global eBusiness interoperability test bed methodologies) aims at: developing the required global Testing Framework, architecture and methodologies for state-of-the-art eBusiness Specifications and profiles covering all layers of the interoperability stack (organizational, semantic and technical interoperability); supporting the realization of GITB as a network of multiple Test Beds, thereby leveraging existing and future testing capabilities from different stakeholders (for example standards development organizations and industry consortia, Test Bed Providers, and…
Trade
Last update: 02/10/2017
CEN Business Interoperability Interface Workshop 3
The CEN BII Workshop was established in May 2007 with the objective of harmonising electronic procurement in Europe. The BII Workshop is a standardisation initiative within CEN (European Committee for Standardisation). It provides a framework for interoperability in pan-European electronic transactions expressed as a set of technical specifications. The mission of the CEN BII Workshop is to spread and facilitate the use of e-Procurement standards for buyers and suppliers, and especially public administrations, by: identifying requirements (including legal requirements) regarding e…
Trade
Last update: 02/10/2017
Interoperability of the electronic European Health Insurance Cards (WS/eEHIC)
Interoperability of the electronic European Health Insurance Cards (WS/eEHIC) is a CEN/ISSS (European Committee for Standardization / Information Society for Standardization System) CEN WORKSHOP AGREEMENT (CWA) that describes a standardised solution (a specification) for the electronic European Health Insurance card (eEHIC) throughout EU. This document includes guidelines and recommendations for standards for an electronic European health Insurance Card.
Objectives
Privacy: eEHIC data is safely stored, retrieved and used in the respect of data integrity in a confidential way, thanks to…
Trade
Last update: 02/10/2017
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and tests it through two scenarios representing a large number of options related to ID Management and Secure Data Transfer: 1) a scenario that involves public and private organizations and legal requirements for exchange of sensitive information; 2) a scenario that involves worldwide citizen and their requirement to exchange personal information. A third Scenario is envisaged to involve public and…
ICT security
Last update: 08/12/2015
Business Interoperability Interfaces for Public procurement inEurope - BII Architecture
National and European authorities have been promoting the use of electronic processes in public procurement for decades because increased efficiency and transparency will give improved and more efficient use of public procurement budgets. Electronic processes involving different systems and various partners depend on the use of common standards for information exchange between systems; however, it should be emphasised that there are different levels of openness that can be created by the use of technology standards. Interoperability requires common use of standards; there are several groups…
Trade
Last update: 07/12/2015
Business Interoperability Interfaces for Public procurement in Europe - Tender Notification
This profile supports a process of submitting procurement notices by a Contracting Authority to a Publication Body. It is intended to support transmission of electronic documents for processing in semi-automated processes by the receiver. The legal requirements that were taken into account are requirements from European legislation, in particular the EU directives, mentioned in Clause 5 of this profile. The intended scope for this profile is Government to Government (G2G) and Government to Business (G2B), depending on legal requirements for publication, to support Business to Government (B2G)…
Trade
Last update: 07/12/2015
Business Interoperability Interfaces for Public procurement in Europe - Use of profiles in the tendering process
The profiles referenced in this guideline support a process of electronic tendering. It is intended to support transmission of electronic documents or processing by the receiver. The legal requirements that were taken into account are requirements from European legislation, in particular the irectives with relation to public procurement. The profiles may also be used for tenders below the thresholds that are defined in the directives. The intended scope for the profiles includes: - Business to Government (B2G) - Common business processes for local and pan European tendering - Mainly for…
Trade
Last update: 07/12/2015
Business Interoperability Interfaces for Public procurement in Europe - eCatalogue profiles
The eCatalogue profiles are intended to support the synchronization of catalogues between the selling and the buying side in a business relationship,whereas the selling side is the source of the catalogue and the buying side the receiver. In the profiles the selling side can be any Economic perator and the buying side any Contracting Authority. The intended scope for the profiles includes B2G and B2B relationships. The transactions, specified in the profiles are intended to be exchanged between the procurement systems of contracting authorities and systems for catalogue management of economic…