Advanced search

Cybershare Conference
Cybershare Conference to share experience on cybersecurity.
SOLUTIONCreated: 20/06/2019

Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation…
SOLUTIONCreated: 25/01/2019

ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically…
SOLUTIONCreated: 28/11/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI…
SOLUTIONCreated: 28/11/2016
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and…
SOLUTIONCreated: 05/02/2013
X-Road Data Exchange Layer
X-Road is an open source data exchange layer solution that enables organizations to exchange information over the Internet. X-Road is a centrally managed distributed data exchange layer between…
SOLUTIONCreated: 21/10/2010
CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between…
SOLUTIONCreated: 15/07/2010
Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for…
SOLUTIONCreated: 29/10/2008
Web Security
This is written for Drupal, but really applies to many other open source tools https://openconcept.ca/drupal-security So often governments seem to mess up internet security. Can't just wait till it is convenient for us to implement it much of the time. Mike
DISCUSSIONCreated: 30/04/2018
6.1.1 Prepare test data
The use and reuse of any data exchange model is greatly eased by providing adequate test data. This test data should also be made a part of the final asset uploaded to SEMIC. Thus users of your asset will be better able to understand your asset and implement it correctly. This is an auto-generated…
DISCUSSIONCreated: 21/03/2016
6.1.2 Set quality criteria
As the owner and developer of the asset, you should define criteria against which your solution can be proofed (using the test data). This is an auto-generated Asset Development Assistant. Please refer to the library item Asset Development Assistant for further information. Category Asset…
DISCUSSIONCreated: 21/03/2016
6.2.1 Document your Implement
For an asset to enter the clearing process on SEMIC, a comprehensive documentation is required. As described above, this will make your solution easier to maintain and extend. This is an auto-generated Asset Development Assistant. Please refer to the library item Asset Development Assistant for…
DISCUSSIONCreated: 21/03/2016