Cybershare Conference to share experience on cybersecurity.
ICT security
Last update: 08/03/2019
Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation regardless of time or place. The service provides mandates for all possible business cases and scenarios and their use cases, depending on which services the mandate is being used for. Different scenarios include: person to person mandates, person to company/organisation mandates, company/organisation to person mandates and company/organisation to company/organisation mandates. The service consists…
Open Source Software
Last update: 11/01/2017
ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically “signing and submitting” represents a legal signature and ensures that the communications and transactions between customers and Revenue cannot be repudiated at a later stage. Developed on a PKI infrastructure, this security underpins all electronic activity for Business Users. 5.3 million Revenue Returns were processed through this channel over the course of 2015, and Ireland is considered as 1st in…
ICT security
Last update: 07/12/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI infrastructure uniquely binds public keys with respective user identities by means of a certificate authority (CA) trusting digital identities through the registration and issuance process. Depending on the assurance level of the binding, this may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA) that ensures the…
ICT security
Last update: 02/10/2017
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and tests it through two scenarios representing a large number of options related to ID Management and Secure Data Transfer: 1) a scenario that involves public and private organizations and legal requirements for exchange of sensitive information; 2) a scenario that involves worldwide citizen and their requirement to exchange personal information. A third Scenario is envisaged to involve public and…
ICT security
Last update: 20/02/2024
X-Road Data Exchange Layer
X-Road is an OSS (under MIT) for secure data exchange. In particular, it enables digital signature and encryption. Governed by NIIS, founded by Finland and Estonia. It is a NIIS solution.
ICT security
Last update: 02/10/2017
CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between two parties, specifying an ebMS trading agreement between trading partners. The following information will typically be contained in a CPA document: - Identification information: the unique identifiers for each party and their roles within the trading relationship - Security information: for instance, are digital signatures required, and what algorithms do they use - Communication information: the…
ICT security
Last update: 21/08/2015
Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for free. You can use verinice for: establishing, maintaining and improving an ISMS based on ISO 27001 assuring the compliance with standards such as ISO 27002, BSI IT-Baseline Security, VDA IS-Assessments and many more performing risk analysis based on ISO 27005 auditing, document management, report generation and much more verinice runs on Windows, Linux and Mac OS. For more information…