Advanced search

Cybershare Conference
Cybershare Conference to share experience on cybersecurity.
SOLUTIONCreated: 20/06/2019

Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation…
SOLUTIONCreated: 25/01/2019

ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically…
SOLUTIONCreated: 28/11/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI…
SOLUTIONCreated: 28/11/2016
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and…
SOLUTIONCreated: 05/02/2013
X-Road Data Exchange Layer
X-Road is an open source data exchange layer solution that enables organizations to exchange information over the Internet. X-Road is a centrally managed distributed data exchange layer between…
SOLUTIONCreated: 21/10/2010
CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between…
SOLUTIONCreated: 15/07/2010
Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for…
SOLUTIONCreated: 29/10/2008
Web Security
This is written for Drupal, but really applies to many other open source tools https://openconcept.ca/drupal-security So often governments seem to mess up internet security. Can't just wait till it is convenient for us to implement it much of the time. Mike
DISCUSSIONCreated: 30/04/2018
Adopt new elements in the ESPD
Add into the Criterion class required elements to allow for automatic evaluation of criteria. EvaluationTypeCode: a code specifying whether the criterion is of type fail/pass, weight in, or any other.
EvaluationWeightTypeCode: a code representing possibly a percentage, a formula returning a weight…
DISCUSSIONCreated: 18/11/2016
Improve descriptions of Use Cases
Improve the clarity of the descriptions of the different use cases in the document. The use cases have as a goal to give specific descriptions of the needs that the vocabulary will be providing solutions for. However, the use cases seem to be cases which are focused on describing how the needs are…
DISCUSSIONCreated: 18/11/2016
Specify RDF elements
The standard could be improved by specifying the RDF elements in the vocabulary of the standard. It is not sufficient to reference the used RDF vocabulary as a whole. It is necessary to reference the specific RDF class and the specific RDF characteristics. We are going to provide an RDF version of…
DISCUSSIONCreated: 18/11/2016