1 March 4th, 2005 eMayor Clustering Event Secure communication and collaboration framework for the judicial co-operation environment.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Courtroom Modernization: In-Court Technology
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
IST E-POLL Electronic Polling System for remote voting operation
Secure Communication Architectures.
PenalNet Secure e-communications in Criminal Law Practice Antonio Ruiz-Giménez de Aguilar, CEO of PenalNet.
IST Priority - No Venue:Bolzano eMayor Clustering Event Author(s):A. Kaliontzoglou, I. Stamatiou, P. Hengeveld Organisations: Expertnet S.A., Deloitte.
Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM (0) {mkamel, benzekri, barrere, nasser}
Europol’s tailor-made data protection framework
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
EMayor Confidential ProprietaryIST Priority - No Venue:Bolzano Author(s): Nineta Polemi ( ) Organisations: University of Pireus.
Internet Protocol Security (IPSec)
Public Key Infrastructure Ammar Hasayen ….
European developments in judicial systems Pim Albers Special advisor of the CEPEJ Council of Europe.
BDU conference - 28 September Sign language interpreting in legal settings: a European overview Marinella Salami, efsli president European.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
PenalNet Secure e-communications in Criminal Law Practice Sylviane Baker Project Leader (CNB) Julen Fernández Conte PenalNet’s Executive Director 24 th.
Wisconsin Digital Summit Monona Terrace November 15, 2004 Justice and Public Safety Interoperability: Wisconsin’s Justice Information Sharing (WIJIS) Initiative.
Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization.
EGov Interop'05 - Feb 23-24, Geneva (Switzerland) OBSERVATORY ON INTEROPERABLE eGOVERNMENT SERVICES eGov-Interop'05 Annual Conference February.
European Life Sciences Infrastructure for Biological Information ELIXIR
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
Discussion “International Cooperation: Service of Documents, Taking of Evidence” – Practical Implementation of Regulations No 1393/2007 and No 1206/2001.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Digitalization of courts in the context of mutual assistance in criminal matters Dr Arkadiusz Lach Department of Criminal Procedure University of Nicolaus.
Ministry of Justice - Italy Electronic monitoring in Italy and the use of secure communication in the Justice system Programma Operativo Nazionale University.
AGIS 2004 EAW Conference Noordwijkerhout June The European Arrest Warrant Project A short overview of Project JAI/2004/AGIS/043.
1 Integrating the Healthcare Enterprise Audit Trail and Node Authentication Profile IHE IT Technical and Planning Committee June 15 th – July 15 th 2004.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Integrating the Healthcare Enterprise Audit Trail and Node Authentication Profile Name of Presenter IHE affiliation.
AIMS’99 Workshop Heidelberg, May 1999 P805: Internet Roaming Giuseppe Sisto - Telecom Italia / CSELT Project participants:
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Building Security into Your System Bill Major Gregory Ponto.
PROJECT INITIATIVES under the FUND FOR BILATERAL RELATIONS OF PROGRAMME BG 14 “JUDICIAL CAPACITY-BUILDING AND COOPERATION” OF THE NORWEGIAN FINANCIAL MECHANISM.
Ministry of Agriculture and Environmental Protection of the Republic of Serbia Implementation of the third pillar of the Aarhus Convention - Access to.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
SOAR 2015 Annual Conference Justice Video Network Workplace Innovation The Ontario Justice Sector November 5, 2015.
Information Security Systems Cost Effective Authenticity & Integrity in CEN/FISCALIS eInvoicing Good Practice Guidelines Nick Pope – Principal Consultant,
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
E-CODEX: the new frontiers of integration among e-Justice platforms Giampiero Lupo Research Institute on Judicial Systems (IRSIG-CNR) National Research.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
S/MIME T ANANDHAN.
PowerONE Secure Information On-Demand Delivering…
2017 Standard Crime Contract
Pooja programmer,cse department
Improving digital skills for career guidance at school
E-government Working Group
HIMSS National Conference New Orleans Convention Center
Install AD Certificate Services
Matching Evidence into e-Codex CNR / e-Codex core team
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Women’s Access to Justice: A Guide for Legal Practitioners
Unit 8 Network Security.
CROSS BORDER GATHERING EVIDENCE
Session 1 – Introduction to Information Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

1 March 4th, 2005 eMayor Clustering Event Secure communication and collaboration framework for the judicial co-operation environment

March 4th, 2005 eMayor Clustering Event 2 Holland  University of Amsterdam Holland  University of Amsterdam Denmark  Cryptomathic Denmark  Cryptomathic Poland  Ministry of Justice  Aram Poland  Ministry of Justice  Aram Greece  European Dynamics  Chorus Call Greece  European Dynamics  Chorus Call Norway  Computas Norway  Computas Switzerland  A4Vision Switzerland  A4Vision France  Court d’Appel de Bordeaux  AEC France  Court d’Appel de Bordeaux  AEC Spain  Canaries Islands Government  Atos Origin Spain  Canaries Islands Government  Atos Origin UK  GL2006 UK  GL2006 Consortium Italy  Ministry of Justice  Project Automation  Cefriel  Sineura  Telecom Italia  SDA Bocconi Italy  Ministry of Justice  Project Automation  Cefriel  Sineura  Telecom Italia  SDA Bocconi

March 4th, 2005 eMayor Clustering Event 3 u Management of Investigation and Trial Phases Will address the protection of all the actions and activities relating to the investigation of the crime. The collection of evidence (including witnesses and testimonies) and the questioning of suspects. Will guarantee the improvement of judicial procedures by accelerating experts examination, interpreters translation and the effective remote participation in the Trial of witness needing protection, dangerous criminals, victims, etc.. Objectives

March 4th, 2005 eMayor Clustering Event 4 Research activities (i) u Secure user management: identification, authentication and authorization of users; PKI, digital certificates and biometric identification technologies. u Secure communication management: confidentiality, integrity and non repudiation; SIP message encryption, SecureRTP.

March 4th, 2005 eMayor Clustering Event 5 Research activities (ii) u Remote / Local participation: Remote Users (i.e. Witnesses, Experts, Interpreters, etc…) would be able to participate to the trial from other locations through a virtual identification mechanism, using a biometric authentication system Local users (i.e. Judges, Lawyers) would be able to access the collaboration platform through a “secure” Web portal. u Privacy protection: The privacy of the intercommunication among users, such as judges and policemen, will be guaranteed with cryptography, secure audio-video transmission, VPN and SSL communication protocols and secure procedures.

March 4th, 2005 eMayor Clustering Event 6 u Security Guidelines: SecurE-Justice project will produce security guidelines for Judicial Public Administration aiming at the implementation of innovative organizational models. u Infrastructure for Smart Device: The technological environment will provide an infrastructure of smart devices for secure control of identification, privacy and data protection. u Time Reduction of Investigation and Trials: Judicial authorities will have rapid exchange of investigative information and will reduce the dead time of judicial trials. u Better Collaboration: Information exchange between sites using “secure” multi video conference systems. Expected Results