Prof. Sokratis K. Katsikas University of the Aegean, Greece

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
PKI services in the Public Sector of the EU Member States Objectives and Methodology of the survey Prof. Sokratis K. Katsikas University of the Aegean,
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Secure Communication Architectures.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Public Key Infrastructure Ben Sangster February 23, 2006.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Intra-ASEAN Secure Transactions Framework Project Progress Report
PKI Services for the Public Sector of the EU Member States Dr. Dimitrios Lekkas Dept. of Products & Systems Design Engineering University of the Aegean.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
Republic of Sudan Ministry of Telecoms & Information Technology National Committee for Digital Certification ELECTRONIC ID IN ONLINE ADMISSION FOR UNIVERSITIES.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Key Elements for electronic Local Authorities’ Networks Cagliari, 27 th May 2002 Walter Wenzel CEO of KEeLAN project.
Active Directory ® Certificate Services Infrastructure Planning and Design Published: June 2010 Updated: November 2011.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Configuring Directory Certificate Services Lesson 13.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
DIGITAL SIGNATURE.
KEYSTONE EUROPEAN CROSS DOMAIN PKI ARCHITECTURE Sokratis K. Katsikas Professor & Head Dept. of Information & Communication Systems University of the Aegean.
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Public Key Infrastructure (PKI)
TeleTrusT Initiatives for PKI Solutions
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Chapter 5 Electronic Commerce | Security
SPOCS : Simple Procedures Online for Crossborder Services
Organized by governmental sector (National Institute of information )
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
Public Key Infrastructure (PKI)
8 Building Blocks of National Cyber Strategies
CompTIA Security+ Study Guide (SY0-401)
Cryptography and Network Security
Security in ebXML Messaging
Secure Electronic Transaction (SET)
زير ساخت كليد عمومي و گواهي هويت
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Chapter 5 Electronic Commerce | Security
Pooja programmer,cse department
NAAS 2.0 Features and Enhancements
PKI Services for the Public Sector of the EU Member States
جايگاه گواهی ديجيتالی در ايران
E-Commerce for Developing Countries (EC-DC)
HAQAA PROJECT: DEVELOPMENT OF A SADC CATS
CS 465 Certificates Last Updated: Oct 14, 2017.
Chapter 4 Cryptography / Encryption
Computer Security CIS326 Dr Rachel Shipsey.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
PKI (Public Key Infrastructure)
VERITE – Dissemination plan
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
National Trust Platform
Presentation transcript:

Prof. Sokratis K. Katsikas University of the Aegean, Greece PKI services in the Public Sector of the EU Member States Objectives and Methodology of the survey Prof. Sokratis K. Katsikas University of the Aegean, Greece

Research team Scientific Director Asst. Prof. Stefanos Gritzalis Technical Director Prof. Sokratis Katsikas Quality Reviewer Asst. Prof. Dimitris Gritzalis Researchers Asst. Prof. Lilian Mitrou Asst. Prof. Yannis Stamatiou Dr Dimitris Lekkas

Facts... Increasing use of technology and the Internet by huge numbers of people. Government organizations are in a transition state: from the “paper-based” to the “paper-less” office. …these led to the idea of making available online public services (i.e. G2G and G2C transactions). A considerable advantage: Transactions can take place with unprecedented ease at high speed, with no need for physical presence of either of the transacting parties at the transaction site. A considerable disadvantage: Security problems and privacy threats. Which leads us to …

Basic security requirements Confidentiality Access to information to authorized entities only. Integrity Modification of information only by authorized entities. Availability Information available to authorized entities upon request within reasonable time. Non-repudiation Impossibility of later denial of a committed action

Addressing security requirements Public Key Cryptography (PKC) is an effective technology to establish the baseline security requirements. To support PKC, it is necessary to establish an appropriate infrastructure, the Public Key Infrastructure (PKI). A series of technological and legal issues need to be addressed (and resolved) before establishing a PKI.

The objectives of our survey To identify the extent of the use of electronic signatures towards the establishment of e-government services. To identify the technologies employed for the exploitation of e-signatures. To investigate the legal issues involved in the use of e-signatures. To identify ways of managing certificates in the public sector. To provide a set of good-practices regarding the above issues.

Components of our methodology Review current status (identify the current status regarding the use of e-signatures in the EU) Investigate legal issues pertaining to e-signatures (review legal and regulatory issues regarding the use of signatures) Investigate already employed technical standards (review the e-signature standards in place) Review relevant case studies (where available) (information stemming from relevant surveys) Make use of questionnaires (conclusions drawn from responses to appropriate questions)

Good practice for the Public Sector in EU Member States Expected results Questionnaires Reviews Good practice for the Public Sector in EU Member States Case-studies EU legal issues Employed technical standards

Questionnaire We have prepared, for distribution, a questionnaire comprising 27 questions, grouped in 5 categories, relating to: (a) existing e-services (b) legal status of certificates (c) use of certificates in the public sector (d) requirements from Certification Service Providers (e) use of certificates for G2G and G2C transactions

Issues discussed in a good-practice proposal Architecture of and technologies needed for a PKI environment Interoperability Legal status of a Certification Authority (CA) Certification hierarchy levels and cross- certification Role and identity certificates Certificate revocation and expiration policy Registration Authorities (RA) …

Summary Towards a good-practice guidance, for the exploitation of Public Key Infrastructure by the Public Sector