SlideShare ist ein Scribd-Unternehmen logo
1 von 44
TAA-Trusted Archive Authority Presented by Jan Biets   [email_address]   +32(0)477 32 90 11  Mechelen - Belgium
“PRE”  ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Non-repudiation  - undeniable  - legally binding
TSA E-SIGN CA - PKI ERS Management LAW Policy Security Business Process User interface Agenda
Agenda  law &  standards managed documented other modules operations TAA
RFC3281 : An Internet Attribute Certificate Profile for Authorization RFC3280 : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile R FC3369  :Cryptographic Message Syntax (CMS)  RFC3126  : Electronic Signature Formats for long term electronic signaturesRFC3161  : Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) RFC2459 : Internet X.509 Public Key Infrastructure Certificate and CRL Profile  PKCS#7  : Cryptographic Message Syntax Standard  PKCS#11 : Cryptographic Token Interface Standard  PKCS#12 : Personal Information Exchange Syntax Standard  FIPS PUB 186-2 digital signature standard  RfC 4871 - DomainKeys Identified Mail (DKIM) Signatures DomainKeys Identified Mail (DKIM) Service Overview draft-ietf-dkim-overview-10 (11 juli 2008)RfC 3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) ProfileRfC 5055 - Server-Based Certificate Validation Protocol (SCVP)RfC 3379 - Delegated Path Validation and Delegated Path Discovery Protocol RequirementsETSI 201 733 -  ETSI Electronic Signatures   and InfrastructuresACVS: An Advanced Certificate [RFC0989] Linn, J. and IAB Privacy Task Force, "Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures", RFC 0989, February 1987.[RFC2822] Resnick, P., "Internet Message Format", RFC 2822, April 2001.[RFC3164] Lonvick, C., "The BSD Syslog Protocol", RFC 3164, August 2001.[RFC3851] Ramsdell, B., "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification", RFC 3851, July 2004.[RFC4686] Fenton, J., "Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)", RFC 4686, September 2006. INTERNET DRAFT DKIM Service Overview February 2008 Hansen, et al. Informational [RFC4870] Delany, M., "Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys)", RFC 4870, May 2007. [RFC4871] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, "DomainKeys Identified Mail (DKIM) Signatures", RFC 4871, May 2007. TAA – the complexity (?)
TAA – functional architectural design IAM CA TSA DMS ERS i-Sign HW Event logging (audit trail) storage SA* Abbreviations : IAM – identity & access management CA – Certification authority RA – registration authority SA – “source authentic” ERS – Evidence record syntax
TAA - IAM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Abbreviations : CA  - Certification Authority , ETSI TS 101 456 PKI  - Private Key Infrastructure,  SA  – “source authentic” RA  - Registration Authority , ETSI TS 101 456
TAA - electronic signature ,[object Object],[object Object],[object Object],[object Object],[object Object],Based on : Xades , ETSI 101 903
TAA - electronic signature ,[object Object],[object Object],[object Object],[object Object],[object Object],Based on : Xades , ETSI 101 903
TAA - TSA ,[object Object],[object Object],Abbreviations : TSA  - Timestamp Authority , ETSI TS 102 023
TAA - TSA Abbreviations : TSA  - Timestamp Authority , ETSI TS 102 023
TAA - management ,[object Object],[object Object],[object Object]
TAA - management
TAA - other elements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Abbreviations : DMS - Document Management System,  GUI – Graphic User Interface
TAA - approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – Risk assessment 360° (off-site) Back-up  policy ICT room policies processes People & staff Physical  security operations TAA
TAA – Risk assessment 360°security tiers) Policy Security Policy HR Trusted Archival Authority Physical Security Building Security Policy Security Application security Server room Organisation & management Policy System Security Authorisation & authentification Network Security User interface Security procedures people
TAA – basic functionalities and features of a DMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – functionalities: audit trail (logging of events) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Based on results of risk assessment 1/2 Remark : CWA 14167-1.  Security Requirements for Trustworthy  Systems Managing Certificates for Electronic Signatures
TAA –functionalities: audit trail (logging of events) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2/2 Remark : CWA 14167-1.  Security Requirements for Trustworthy  Systems Managing Certificates for Electronic Signatures   Abbreviations : CSO – Chief Security Officer
TAA – basic functionalities: user management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Based on results of risk assessment
TAA – functionalities: proof of integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Abbreviations : ERS – Evidence record syntax
TAA –  Overview of Archiving Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Archived Object Object META - DATA Digital Signature ( optional ) Complementary data Archive meta - data Evidence record O b j e c t ’ s c o n s e r v a t i o n a t t r i b u t e s
TAA – ERS , Overview of evidence record syntax ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – basic architectural design Hardware & Storage Policy &  Procedures Web Service DMS – user interface ERS  engine TSA Security &  Legal
TAA – functional architectural design IAM CA TSA DMS ERS i-Sign HW Event logging (audit trail) storage SA* Abbreviations : IAM – identity & access management CA – Certification authority (RA – registration authority) SA – “source authentic” ERS – Evidence record syntax
TAA – architectural design Abbreviations : LTAP – long term archival protocol ERS – Evidence record syntax
Afterword ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Afterwords : points of attention during conceptual design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – some other fields of application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – basic functionalities: proof of integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TAA – basic functionalities: proof of integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ? ? ? ? ?
Certificate classification (Verisign) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],https :// www.verisign.com /support/ roots.html
The  EU  Directive  1999/93/EC on a Community framework for electronic signatures [3]  defines the term  qualified certificate  as: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The  EU  Directive  1999/93/EC on a Community framework for electronic signatures. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The  EU  Directive  1999/93/EC on a Community framework for electronic signatures. ,[object Object],[object Object],[object Object],[object Object],[object Object]
The  EU  Directive  1999/93/EC on a Community framework for electronic signatures :  Profiles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Xades, electronic signature composition The  XAdES-T  envelope: contains a trusted timestamp over the signature. The goal is to prove that the signer’s certificate was valid at the time of signature. The  XAdES-X  envelope:  “ When an OCSP response is used, it is necessary to time-stamp in particular that response in the case the key from the responder would be compromised”   In other words, the goal is to prove that the OCSP responder’s signing certificate was valid at the time of OCSP response.   “ The SignatureTimeStamp encapsulates the time-stamp over the SignatureValue element.” XADES  : XML Advanced Electronic Signatures Specification from the ETSI that is built upon the Xmldsig specification. It provides “signatures that remain valid over long periods. XAdES - X - L XAdES - X XAdES - C XAdES - T XAdES - EPES OCSP Timestamp Certificates Chain Timestamp XAdES - a Timestamp
Xades, electronic signature  composition
“ Xades – A”, electronic signature composition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Xades, electronic signature process flow E-sign
TSA – timestamp , process flow

Weitere ähnliche Inhalte

Ähnlich wie TAA Trusted Archive Authority Overview

Adss Server Trusted Archive Services (Tas Aug08)
Adss Server   Trusted Archive Services (Tas Aug08)Adss Server   Trusted Archive Services (Tas Aug08)
Adss Server Trusted Archive Services (Tas Aug08)andrei_gosman
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6 WE-IT TUTORIALS
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 ltsmchatoramhuru
 
IRJET- Blockchain based Certificate Issuing and Validation
IRJET-  	  Blockchain based Certificate Issuing and ValidationIRJET-  	  Blockchain based Certificate Issuing and Validation
IRJET- Blockchain based Certificate Issuing and ValidationIRJET Journal
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 

Ähnlich wie TAA Trusted Archive Authority Overview (20)

Blockchain private permissioned
Blockchain private permissionedBlockchain private permissioned
Blockchain private permissioned
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Adss Server Trusted Archive Services (Tas Aug08)
Adss Server   Trusted Archive Services (Tas Aug08)Adss Server   Trusted Archive Services (Tas Aug08)
Adss Server Trusted Archive Services (Tas Aug08)
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 
Q4 Product Safety Demo
Q4 Product Safety DemoQ4 Product Safety Demo
Q4 Product Safety Demo
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
IRJET- Blockchain based Certificate Issuing and Validation
IRJET-  	  Blockchain based Certificate Issuing and ValidationIRJET-  	  Blockchain based Certificate Issuing and Validation
IRJET- Blockchain based Certificate Issuing and Validation
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Let's Encrypt + DANE
Let's Encrypt + DANELet's Encrypt + DANE
Let's Encrypt + DANE
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
Web Security
Web SecurityWeb Security
Web Security
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 

Mehr von Jan Biets [jan_biets@hotmail.com] (12)

Maas
MaasMaas
Maas
 
MaaS
MaaSMaaS
MaaS
 
Core pmo services
Core pmo servicesCore pmo services
Core pmo services
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Eu 2016 114 - 8
Eu 2016 114 - 8Eu 2016 114 - 8
Eu 2016 114 - 8
 
MaaS sota
MaaS sotaMaaS sota
MaaS sota
 
Costing
CostingCosting
Costing
 
Portfolio,2square
Portfolio,2squarePortfolio,2square
Portfolio,2square
 
PMO, 2square
PMO, 2squarePMO, 2square
PMO, 2square
 
Project Management Flight stimulator 1.0
Project Management Flight stimulator 1.0Project Management Flight stimulator 1.0
Project Management Flight stimulator 1.0
 
PMO as a service
PMO as a servicePMO as a service
PMO as a service
 
Graphical project reporting-v1-0
Graphical project reporting-v1-0Graphical project reporting-v1-0
Graphical project reporting-v1-0
 

Kürzlich hochgeladen

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 

Kürzlich hochgeladen (20)

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 

TAA Trusted Archive Authority Overview

  • 1. TAA-Trusted Archive Authority Presented by Jan Biets [email_address] +32(0)477 32 90 11 Mechelen - Belgium
  • 2.
  • 3.
  • 4. TSA E-SIGN CA - PKI ERS Management LAW Policy Security Business Process User interface Agenda
  • 5. Agenda law & standards managed documented other modules operations TAA
  • 6. RFC3281 : An Internet Attribute Certificate Profile for Authorization RFC3280 : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile R FC3369  :Cryptographic Message Syntax (CMS) RFC3126 : Electronic Signature Formats for long term electronic signaturesRFC3161 : Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) RFC2459 : Internet X.509 Public Key Infrastructure Certificate and CRL Profile PKCS#7 : Cryptographic Message Syntax Standard PKCS#11 : Cryptographic Token Interface Standard PKCS#12 : Personal Information Exchange Syntax Standard FIPS PUB 186-2 digital signature standard RfC 4871 - DomainKeys Identified Mail (DKIM) Signatures DomainKeys Identified Mail (DKIM) Service Overview draft-ietf-dkim-overview-10 (11 juli 2008)RfC 3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) ProfileRfC 5055 - Server-Based Certificate Validation Protocol (SCVP)RfC 3379 - Delegated Path Validation and Delegated Path Discovery Protocol RequirementsETSI 201 733 - ETSI Electronic Signatures and InfrastructuresACVS: An Advanced Certificate [RFC0989] Linn, J. and IAB Privacy Task Force, "Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures", RFC 0989, February 1987.[RFC2822] Resnick, P., "Internet Message Format", RFC 2822, April 2001.[RFC3164] Lonvick, C., "The BSD Syslog Protocol", RFC 3164, August 2001.[RFC3851] Ramsdell, B., "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification", RFC 3851, July 2004.[RFC4686] Fenton, J., "Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)", RFC 4686, September 2006. INTERNET DRAFT DKIM Service Overview February 2008 Hansen, et al. Informational [RFC4870] Delany, M., "Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys)", RFC 4870, May 2007. [RFC4871] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, "DomainKeys Identified Mail (DKIM) Signatures", RFC 4871, May 2007. TAA – the complexity (?)
  • 7. TAA – functional architectural design IAM CA TSA DMS ERS i-Sign HW Event logging (audit trail) storage SA* Abbreviations : IAM – identity & access management CA – Certification authority RA – registration authority SA – “source authentic” ERS – Evidence record syntax
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. TAA - TSA Abbreviations : TSA - Timestamp Authority , ETSI TS 102 023
  • 13.
  • 15.
  • 16.
  • 17. TAA – Risk assessment 360° (off-site) Back-up policy ICT room policies processes People & staff Physical security operations TAA
  • 18. TAA – Risk assessment 360°security tiers) Policy Security Policy HR Trusted Archival Authority Physical Security Building Security Policy Security Application security Server room Organisation & management Policy System Security Authorisation & authentification Network Security User interface Security procedures people
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. TAA – basic architectural design Hardware & Storage Policy & Procedures Web Service DMS – user interface ERS engine TSA Security & Legal
  • 27. TAA – functional architectural design IAM CA TSA DMS ERS i-Sign HW Event logging (audit trail) storage SA* Abbreviations : IAM – identity & access management CA – Certification authority (RA – registration authority) SA – “source authentic” ERS – Evidence record syntax
  • 28. TAA – architectural design Abbreviations : LTAP – long term archival protocol ERS – Evidence record syntax
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Questions? ? ? ? ? ?
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Xades, electronic signature composition The XAdES-T envelope: contains a trusted timestamp over the signature. The goal is to prove that the signer’s certificate was valid at the time of signature. The XAdES-X envelope:  “ When an OCSP response is used, it is necessary to time-stamp in particular that response in the case the key from the responder would be compromised”   In other words, the goal is to prove that the OCSP responder’s signing certificate was valid at the time of OCSP response. “ The SignatureTimeStamp encapsulates the time-stamp over the SignatureValue element.” XADES : XML Advanced Electronic Signatures Specification from the ETSI that is built upon the Xmldsig specification. It provides “signatures that remain valid over long periods. XAdES - X - L XAdES - X XAdES - C XAdES - T XAdES - EPES OCSP Timestamp Certificates Chain Timestamp XAdES - a Timestamp
  • 42.
  • 43. Xades, electronic signature process flow E-sign
  • 44. TSA – timestamp , process flow