WORKING ACROSS BORDERS - eIdentity & Authentication

Slides:



Advertisements
Similar presentations
How eID and eSignatures work in a cross-border setting Wendy Carrara SPOCS Deputy Programme Director eID workshop Reaping the benefits of eID in different.
Advertisements

From e-Government to e-Governance: The OECD Experience Elizabeth Muller E-Government Project OECD SitExpo February 1004, Casablanca - Morocco.
Conference on Accelerating Global Commerce Through Technology and Policy Elliot E. Maxwell September 20, 2002 The E-Commerce Policy Landscape.
What is the W-SPES Project? Carlo Pentimalli (Prato, Italy)
Economic Tussles in Federated Identity Management Tyler Moore joint work with Susan Landau WEIS 2011.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
A User-centric, Anonymous and Interoperable pan-European eID Pavel Sekanina September 13th, 2006.
United States Department of Justice The goal : Enable justice information sharing and protect privacy.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
XML One Conference Amsterdam 21 Sept 2001 e-government the crusade to get the UK and government online Anwar Choudhury Director Office of the e-Envoy UK.
State Alliance for e-Health Conference Meeting January 26, 2007.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Kevin Novak, Chair W3C Electronic Government Interest Group April 17, 2009.
NHS Connecting for Health A National Framework For Implementing Electronic SAP Summary of Recommendations.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
United States Department of Justice Global Security Working Group Update Global Advisory Committee November 2, 2006 Washington, D.C.
4 NATIONS WORK ON DATA STANDARDS Bill McCluggage Director of eGovernment Office of the First Minister & Deputy First Minister Northern Ireland.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
CS818 SOFTWARE SYSTEM ENGINEERING Team 3 Steve Grimes, Craig Mitchell, Mark Oden, Mark Ramos, Brian Rater, Kat Reagan.
IBM State and Local Government Team Strategic Vision to Transform Government in Arizona – December 20, Presentation to Society for Information Management.
Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Broadband Panel: NASUCA Mid- Year Meeting Debra Berlyn Consumer Policy Solutions.
Electronic Commerce Semester 1 Term 1 Lecture 14.
EID and eSignature programs at National level in Europe Detlef Houdeau Nov 2013 Exploratory seminar on e-signatures for e- business in the South Mediterranean.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Trust in Trust Frameworks, the missing link  Abbie Barbir, Ph.D  OASIS Board of Directors,
Identity on the Internet
Digital health Vision: Faster, easier & more engaging
tf-emc meeting: 28th / 29th March 2007
Electronic Government and IT Policy Unit
Higher Education’s Role in the Identity Ecosystem
New Zealand Disability Strategy Prepared for the Japanese Young Core Leaders Programme Jacinda Keith.
Web Services UNIT 5.
Dave Lewis W3C MultilingualWeb - Language Technology Working Group
Cloud Application Marketplaces
TAB Internal Report to board May 2010 final
BACK SOLUTION:
Why eIDAS? eID under eIDAS compliance
U.S. Federal e-Authentication Initiative
Who Uses Encryption? Module 7 Section 3.
OASIS, Emergency Management Technical Committee
Enhancing Web Application Security with Secure Hardware Tokens
تحليل الحساسية Sensitive Analysis.
Privacy and Digital Rights Management
Cloud Application Marketplaces
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Cloud Application Marketplaces
Relationship Cards: Security + Society
The E-Authentication Initiative
Advancing Open Standards in eGovernment using SOA & Web Services
Dashboard eHealth services: actual mockup
Privacy Management Reference Model (PMRM) A formal reference model for data privacy.
WG 1.5 b Summary Statement: Qualitative e-Government-services and effective front-office are conditioned by a good back-office Presentation of Emmanuel.
eGovernment - The technological potential
The e-government Conference main issues
Electronic Payment Security Technologies
Legal Terms electronic commerce (p. 284) electronic signature (p.286)
Cloud Application Marketplaces
Presentation transcript:

WORKING ACROSS BORDERS - eIdentity & Authentication www.oasis-open.org WORKING ACROSS BORDERS - eIdentity & Authentication Governments internationally are working on solutions to perform online government transactions. The need for citizens to authenticate their electronic identity has increased strongly, as has the requirement to protect sensitive data and privacy. Interoperability across agencies requires adoption of standards from OASIS and other standards organizations, such as W3C. What are the key issues and requirements from eIdentity projects? Panelists Libor Neumann, ANECT a.s. Bill Young, New Zealand All of Government Authentication Programme Olivier Djololian, Cap Gemini Consulting José Manuel Alonso, W3C