ICC eTerms Repository Supporting the PKI infrastructure and secure electronic commerce Janjaap Bos Dublin, June 2000.

Slides:



Advertisements
Similar presentations
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Advertisements

Electronic Filing Case Study NSW Land and Environment Court.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Host of the 13 th ECRF Annual Conference - Budapest 2010.
Public Key Infrastructure Ben Sangster February 23, 2006.
Password?. Project CLASP: Common Login and Access rights across Services Plan
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Password?. Project CLASP: Common Login and Access rights across Services Plan
1 Archiving Workflow between a Local Repository and the National Library Archive Experiences from the DiVA Project Eva Müller, Peter Hansson, Uwe Klosa,
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Metadata: An Introduction By Wendy Duff October 13, 2001 ECURE.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Joint Information Systems Committee Supporting Higher and Further Education Development of an Information Environment for UK Learning and Teaching NOF-Digitise.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
The Pieces and the Puzzle of IT Policy University Computer Policy and Law Program April 7, 2004.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
STIMULATE 9 ZAINA RAMADHANI UNIVERSITY OF DAR ES SALAAM LIBRARY Library Assistant University Library P.O. Box 35092
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
ID Management in University ID Management in University Kenzi Watanabe Saga University, Japan
European Interoperability Architecture e-SENS Workshop : Document Interoperability Solutions use case 7-8 January 2015.
ADC Meeting ICEO Standards Working Group Steven F. Browdy, Co-Chair ADC Workshop Washington, D.C. September, 2007.
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Johnson & Johnson’s Public Key Infrastructure Bob Stahl
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
XIS XML Input System Statistics Denmark 12 October 2004.
DINI „Electronic Publishing Group“ DINI – Certificate Document and Publication Repositories “Electronic Publishing Group“
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
E-GOVERNMENT IN VIETNAM Ph.D Tran Cong Yen Deputy Director Information and Communication Technology Center Ministry of Science and Technology, Vietnam.
SWIM-SUIT Information Models & Services
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
DICOM and ISO/TC215 Hidenori Shinoda Charles Parisot.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Evaluating trusted electronic documents Petr Švéda Security and Protection of Information ‘03 © 2003 Petr Švéda, FI MU.
1 IRIS Europe II – Implementation of River Information Services in Europe This project is co-funded by the European Commission / DG-TREN / TEN-T A project.
Where are States Now? Preliminary Legal & Security Survey Results Jim Whitter National Governors’Association Center for Best Practices January 9, 2001.
Update on PKI Activities in the Spanish Academic Network PKI-COORD November 26, Amsterdam.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Enterprise Data Model for Transportation Planning Presentation to 2009 TRB Planning Application Conference Minhua Wang, Ph.D. Citilabs, Inc.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
State of e-Authentication in Higher Education August 20, 2004.
Cole David Ronnie Julio. Introduction Globus is A community of users and developers who collaborate on the use and development of open source software,
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E MyAPNIC Project Features & Facilities Prototype Demo.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B Pool of experts database and further enhancements.
OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Training for developers of X-Road interfaces
City-wide Active Directory Project Town Hall II
Building A Repository for Digital Objects
Statewide Digitization and the FCLA Digital Archive
Public Key Infrastructure (PKI)
Network Services.
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
XIS XML Input System Statistics Denmark 11 Maj 2004.
Public Key Infrastructure
NAAS 2.0 Features and Enhancements
Dashboard eHealth services: actual mockup
e-Invoicing – e-Ordering 20/11/2008
Presentation transcript:

ICC eTerms Repository Supporting the PKI infrastructure and secure electronic commerce Janjaap Bos Dublin, June 2000

Contents (1/2) Background & objectives eTerms Incorporation by reference eTerms Repository Management Scenarios Consortium

Contents (2/2) Prototype Naming Database Protocol Demo

eTerms history Open electronic networks Legal deficiencies Notices / legally binding messages

eTerms objectives Facilitation of e-commerce Provide secure trusted repository Support of incorporation by reference Enhancing legal notice Development of standard terms

Incorporation by reference Standard reference terms Technical constraints Notice and consumer issues User interface

eTerms: the terms Business resources: terms archived and published for subsequent use and reference, e.g. standard terms and conditions Multilateral resources: guidelines, model laws, best practices developed by multilateral business and government organizations Share resources: terms offered by persons who consider them to be good business practices

Repository Database Registration & authentication Publication –Unique reference: serial number –Object Identifier (OID) –LDAP based naming scheme ICC registered eTerms –Authenticity - Availability - Reliabilty

Protocol Application Programming Interface –User interface –Notification –Authentication Timestamping of transactions Archival of transaction records

Scenarios PKI applications –Certificate policies –Notices Web based transactions Wireless applications

Consortium Provision to the ICC of –Technology –Infrastructure –Software development Members: –British Telecom, Verisign, BOS Electronic Commerce, Oracle (proposed),...

eTerms repository prototype ldap master database input application file system replication mirroring

LDAP object classes eTerms root Country Submitter Version Resource dn: resversion=1, resname=demoterm, subname=democompany.nl, countrycode=NL, top=eterms

Liaison American Bar Association –PKI Disclosure Statement (PDS) Legal XML working group –Development of eTerms format (DTD)

Developers’ workshop Requirements architecture Specifications of eTerms protocol Reference applications Integration in PKI standards and applications 4th Quarter 2000

Next steps Public presentation of eTerms Pilot users Further development of eTerms architecture and protocol Content: the terms

Thank you for your attention More information: