The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
The Agency for the Promotion of E-Government, the Information and Knowledge Society Andrés Saravia - Uruguay.
Secure Communication Architectures.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
PenalNet Secure e-communications in Criminal Law Practice Antonio Ruiz-Giménez de Aguilar, CEO of PenalNet.
Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 March 4th, 2005 eMayor Clustering Event Secure communication and collaboration framework for the judicial co-operation environment.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure Ammar Hasayen ….
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Building trust in networking in Newly Associated States through the use of secure information society technologies Aleksej Jerman Blazic TELEBALT 2002.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
LEFIS PLANNED ACTIVITIES: 2007 AND MORE Fernando Galindo, University of Zaragoza, Spain LEFIS Coordinator The teaching on Management, E-business and E-Commerce.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
ICTWG-ECPRD SEMINAR 2006 INFORMATION SECURITY ISSUES AT THE CHAMBER OF DEPUTIES Carlo Simonelli Head of Unit – ICT Systems and User Support ICT Department.
Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava.
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
Possibilities of E-learning between Spain and Latin America Aires Rover Federal University of Santa Catarina Brasil.
Internet Security for Small & Medium Business Week 6
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
ALBARRACIN MEETING - MAY 2007 Facultad de Ciencias Jurídicas y Sociales Universidad Nacional de La Plata - ARG E – learning experiencies. Virtual & Blended.
LEFIS Master in Legal issues for the Information Society Pilar Lasala University of Zaragoza LEFIS Postgraduate studies Rotterdam, 16 th -17 th June 2006.
Universidad de Zaragoza LEFIS General Assembly Firenze February 2006 LEFIS - APTICE: Legal Framework for the Information Society II The LEFIS Network:
The LEFIS Virtual Campus design Albarracín Meeting 18th- 19th May 2007 The design of a course of Electronic Government as an on line offer in the virtual.
LEFIS Steering Committee Meeting Brussels, 11th November 2005 SOCRATES PROGRAMME ERASMUS - Thematic Network projects LEFIS - APTICE: Legal Framework for.
INTERNATIONAL PROJECT „LAW&ICT SHARED VIRTUAL CAMPUS“: ACTIVITIES AND FUTURE PLANS University of Lapland, Rovaniemi 27 th April 2009.
DIGITAL SIGNATURE.
The LEFIS experiences and perspectives Regional Meeting Wroklaw, 3 rd April 2004 Fernando Galindo Universidad de Zaragoza.
Law and Justice in a Global Society Artificial Intelligence and Law Ontology and Philosophy of Law: from REIMDOC as example Fernando Galindo University.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
The Establishment of the LEFIS virtual campus: step by step Fernando Galindo, University of Zaragoza, Spain The LEFIS Virtual Campus Design 18th- 19th.
1st MEETING, ZARAGOZA 27th OCTOBER :00 – 17:00Meetings and Courses Plan; other organization questions.
The European High Education Space and LEFIS Fernando Galindo University of Zaragoza Rovaniemi 5th June 2004.
Laws and Codes for the Internet: a Continental European Legal Perspective Fernando Galindo Faculty of Law University of Zaragoza Belfast,
Stamp of Quality: AGACE Pilar Lasala, APTICE LEFIS Quality Sofia, 2 nd -3 rd June 2006.
Information Security Systems Cost Effective Authenticity & Integrity in CEN/FISCALIS eInvoicing Good Practice Guidelines Nick Pope – Principal Consultant,
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
EID and eSignature programs at National level in Europe Detlef Houdeau Nov 2013 Exploratory seminar on e-signatures for e- business in the South Mediterranean.
Electronic Banking & Security Electronic Banking & Security.
The trusted network. Stamp of guarantee. Policies proposals (of European and National character): to the executive, legislative and judicial powers 3.
Electronic signature: several experiences Fernando Galindo University of Zaragoza, Spain 12th June 2007 Beijing.
University of Zaragoza
The LEFIS experiences and perspectives
Pooja programmer,cse department
Electronic Payment Security Technologies
Presentation transcript:

The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level

PKI UNIZAR. Developments Previews. Beginnings Pki Unizar Development Future of Pki used by the Universities 1 2 3

The LEFIS PKI. Causes Fast growing of New ICTFast growing of New ICT Use of ICT without secure protection against risksUse of ICT without secure protection against risks Sensible data communications with easy vulnerabilitySensible data communications with easy vulnerability 1

LEFIS developed its own PKILEFIS developed its own PKI Providing digital certificates to membersProviding digital certificates to members Use of Open StandardsUse of Open Standards –X.509 –SSL –S/MIME The LEFIS PKI 1

Construction of PKIs. Past ExperienceConstruction of PKIs. Past Experience –FESTE: from 1997 NotariesNotaries –Procurators: from 1997 Justice AdministrationJustice Administration –Property registers: from 2000 Identification to access to the RegistersIdentification to access to the Registers –European PKI with juridical institutions Project AEQUITAS. Trust frame for electronic documents exchange between european judicial operators. Information Society technologies. IST Project AEQUITAS. Trust frame for electronic documents exchange between european judicial operators. Information Society technologies. IST PKI. First Steps 1

Non government organizationNon government organization Advanced electronic signature: PKIAdvanced electronic signature: PKI Access to Web pages contents and learning resourcesAccess to Web pages contents and learning resources 160 certificates160 certificates Number of access using public keys from February 2007 to concrete learning resourcesNumber of access using public keys from February 2007 to concrete learning resources – Private Area. APTICE 1

visited on 05/07/ The LEFIS PKI 1

The LEFIS PKI. Step by Step 1 Certification Authority Private Key Public Key Signed Certificates User LEFIS WEB Web, Registration Authority

PKI LEFIS UNIZAR Previews. Begginnings Pki Lefis Unizar Development Future of Pki used by the Universities 1 2 3

As a result of LEFIS PKI successAs a result of LEFIS PKI success Main objectivesMain objectives –Authentication –Integrity –Confidentiality To Provide a Public Key Infrastructure to University of ZaragozaTo Provide a Public Key Infrastructure to University of Zaragoza The LEFIS UNIZAR PKI 2

Guarantees effective communications inside the UniversityGuarantees effective communications inside the University Privacy and Integrity on Data Protection from its usersPrivacy and Integrity on Data Protection from its users Certification AuthorityCertification Authority –Data Protection and Digital Signature Investigation Group (University of Zaragoza) Registration AuthorityRegistration Authority –University of Zaragoza’s Professors Group (part of the Data Protection and Digital Signature Investigation Group ) The LEFIS UNIZAR PKI 2

2 visited on 07/07/2007

Advantages 2 Applied for a research projectApplied for a research project Use of own certificatesUse of own certificates Use of Electronic National Identitiy CardUse of Electronic National Identitiy Card Access to Public Administration pagesAccess to Public Administration pages Foreseen example: the LEFIS virtual campusForeseen example: the LEFIS virtual campus

»ARLA PLATA.- Spain »BRSANTA CATARINA.- Brasil »DEUNIMUENSTER.- Germany »ESULL.- Spain »ESUNIZAR.- Spain »FIULAPLAND.- Finland »FIUWASA.- Finland »LTMRUNI.- Lithuania »PLUMK.- Poland »PTIPBEJA.- Portugal »TRISIKUN.- Turkey »UKQUEENS.- UK »OPEN TO NEW INTERESTED PARTNERS Virtual Campus Partners 2

Spanish BookSpanish Book –On LEFIS Web page, only for owners of the LEFIS private-public key Privacy, first book of the LEFIS Serie in preparationPrivacy, first book of the LEFIS Serie in preparation –Will be included on the LEFIS Web page: Access by public key Online teaching in Faculties of Law: second bookOnline teaching in Faculties of Law: second book Joint courses on the LEFIS Web: A page for the LEFIS Virtual campus (in outcomes)Joint courses on the LEFIS Web: A page for the LEFIS Virtual campus (in outcomes) –Participants from different Universities, teachers and students Teachers and students need to use the LEFIS public-private keyTeachers and students need to use the LEFIS public-private key –Instructions to generate and obtain the key / / PKI Access 2

Comparisons 2 Without use of PKI Use of PKI Vulnerability of communicationsVulnerability of communications Non trusted contentsNon trusted contents Repudiation of sent informationRepudiation of sent information Vulnerability of our Personal DataVulnerability of our Personal Data Secure communications between sender and receiverSecure communications between sender and receiver Trusted content integrityTrusted content integrity Non repudiationNon repudiation Personal Data ProtectionPersonal Data Protection

PKI LEFIS UNIZAR. Developments Previews. Begginnings Pki Lefis Unizar Development Future of Pki used by the Universities 1 2 3

LEFIS UNIZAR PKI 3 Recent rules based on e-signature existRecent rules based on e-signature exist Not yet enough active PKIsNot yet enough active PKIs The Government institutions support several PKIs or only oneThe Government institutions support several PKIs or only one Neccesary to made real proofs attending to real/concrete present and future problemsNeccesary to made real proofs attending to real/concrete present and future problems LEFIS has experience in real proofsLEFIS has experience in real proofs

If members of a University can use and manage PKI systemIf members of a University can use and manage PKI system If students can manage PKI systemIf students can manage PKI system If PKI can handle big lists of users (all students from a University)If PKI can handle big lists of users (all students from a University) 3 Points to Analyze

Conclusions Secure Communications Integrity of Contents Personal Data Protection Easy to use STRONG PUBLIC KEY INFRAESTRUCTURE FOR UNIVERSITIES DEVELOPED BY LEFIS

Thank You for Your Time UNIversity of ZARagoza Andrés Saravia