Advanced search

Cybershare Conference
Cybershare Conference to share experience on cybersecurity.
SOLUTIONCreated: 20/06/2019
Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation…
SOLUTIONCreated: 25/01/2019
ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically…
SOLUTIONCreated: 28/11/2016MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI…
SOLUTIONCreated: 28/11/2016SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and…
SOLUTIONCreated: 05/02/2013X-Road Data Exchange Layer
X-Road is an open source data exchange layer solution that enables organizations to exchange information over the Internet. X-Road is a centrally managed distributed data exchange layer between…
SOLUTIONCreated: 21/10/2010CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between…
SOLUTIONCreated: 15/07/2010Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for…
SOLUTIONCreated: 29/10/2008Lessons on Safer Internet
This is a resource for teachers who teach young children at schools. Its purpose is to introduce a possible framework and guidelines for lessons during which pupils are introduced to different…
DOCUMENTCreated: 26/08/2015Evaluation of Open Source CMS
How secure are Open Source CMS? To answer this question, the German Federal Office for Information Security (BSI) investigated the five most widely used CMS - Drupal, Joomla!, Plone, TYPO3 and…
DOCUMENTCreated: 25/02/2014SEMIRAMIS Newsletter
Welcome to the second newsletter of SEMIRAMIS. While our first newsletter centered on SEMIRAMIS in terms of objectives and challenges in the context of identity management for mobile citizens, this…
DOCUMENTCreated: 10/04/2012EU: A flair for sharing - encouraging information exchange between CERTs
Description (short summary): Computer Emergency Response Teams (CERTs) are crucial in cross border co-ordination of computer incidents and in order to perform their important role they need to…
DOCUMENTCreated: 02/01/2012