The document discusses judicial and law enforcement cooperation between EU member states and EU agencies. It provides background on the political programs and agreements that have been established over time to facilitate cooperation, such as Europol in 1992, Eurojust in 2002, and the Hague Program in 2004. It then presents some key facts and statistics that demonstrate the need for cooperation, such as numbers of illegal border crossings and terrorist attacks. Finally, it introduces a case study about collaboration between different authorities to address a cocaine shipment case and discusses the European interoperability framework and software architecture used to enable information exchange and cooperation.
This document discusses international cooperation against fraud against EU and European institutions. It outlines the legal bases for cooperation including Interpol, Europol, Eurojust, and bilateral memorandums of understanding. Cooperation aims both at law enforcement activities like information exchange and judicial cooperation, and developing security policies through intelligence analysis and risk assessment. Specific areas of cooperation addressed include taxes, customs, structural funds, and expenditures. Trends in information exchanges from 2006 to 2008 are presented for various areas. Current and planned cooperative actions are also summarized.
Social dialogue - European social dialogue - 30 Years of European social dial...Eurofound
30 years of European social dialogue since its launch in Val Duchesse in Brussels,eprésentativité des partenaires sociaux européens interprofessionnels, les partenaires patronaux,European social dialogue, European Union, social dialogue, industrial relations, IR, European industrial relations, social policy, Val Duchesse, employers, trade unions, collective bargaining union, European works councils, European framework agreements, European company statute, représentativité, partenaires sociaux européens interprofessionnels, syndicats
UNIDROIT - International law on the protection of cultural property. The 1995...UNESCO Venice Office
FIGHTING AGAINST THE ILLICIT TRAFFICKING OF CULTURAL PROPERTY
Cross-border training workshop for relevant authorities of
Montenegro and Serbia
Rome (Italy), 20-24 November 2017
Presentation on e services gepp for igf programme at kacegsorkpor
The document discusses Ghana's National Information Technology Agency (NITA) and its efforts to expand online government services. It outlines NITA's legal mandate to oversee Ghana's national ICT infrastructure and ensure efficiency and security. It then describes several of Ghana's major e-government initiatives including the e-Services portal, Ghana ePayment Platform, and network of public access centers. These online platforms aim to improve access to government information and services, enhance transparency, and promote cashless transactions.
ESERVICES one of the leading Business promotion Service Provider Company in Delhi NCR, Eservice formed with the aim of providing services in the field of Information Technology. We work in a motivated way to showcase the real potential of our customers' business through meaningful Business Promotion Services.
Our Core Competencies are Web Solutions, SEO, Exhibition Designing, Retail Designing, Graphics Designing, Audio Video Editing( Production House ) etc. We provide the highest level of quality and services at the most competitive rates and our growing number of clients are testimony to that. We are a one stop shop for all your Business Promotional Products.
Digital services in India - A Consumer's PerspectiveKshitij Trivedi
The Govt. of India has just launched Digital India Week with the purpose of imparting e-services to the citizens of India on a very large scale. This short presentation highlights the consumer's perspective about the plan of Govt. while being receiver of the digital / e-services - their expectations, the awareness, which are the forces shaping the delivery of services from the statutory bodies.
This document discusses international cooperation against fraud against EU and European institutions. It outlines the legal bases for cooperation including Interpol, Europol, Eurojust, and bilateral memorandums of understanding. Cooperation aims both at law enforcement activities like information exchange and judicial cooperation, and developing security policies through intelligence analysis and risk assessment. Specific areas of cooperation addressed include taxes, customs, structural funds, and expenditures. Trends in information exchanges from 2006 to 2008 are presented for various areas. Current and planned cooperative actions are also summarized.
Social dialogue - European social dialogue - 30 Years of European social dial...Eurofound
30 years of European social dialogue since its launch in Val Duchesse in Brussels,eprésentativité des partenaires sociaux européens interprofessionnels, les partenaires patronaux,European social dialogue, European Union, social dialogue, industrial relations, IR, European industrial relations, social policy, Val Duchesse, employers, trade unions, collective bargaining union, European works councils, European framework agreements, European company statute, représentativité, partenaires sociaux européens interprofessionnels, syndicats
UNIDROIT - International law on the protection of cultural property. The 1995...UNESCO Venice Office
FIGHTING AGAINST THE ILLICIT TRAFFICKING OF CULTURAL PROPERTY
Cross-border training workshop for relevant authorities of
Montenegro and Serbia
Rome (Italy), 20-24 November 2017
Presentation on e services gepp for igf programme at kacegsorkpor
The document discusses Ghana's National Information Technology Agency (NITA) and its efforts to expand online government services. It outlines NITA's legal mandate to oversee Ghana's national ICT infrastructure and ensure efficiency and security. It then describes several of Ghana's major e-government initiatives including the e-Services portal, Ghana ePayment Platform, and network of public access centers. These online platforms aim to improve access to government information and services, enhance transparency, and promote cashless transactions.
ESERVICES one of the leading Business promotion Service Provider Company in Delhi NCR, Eservice formed with the aim of providing services in the field of Information Technology. We work in a motivated way to showcase the real potential of our customers' business through meaningful Business Promotion Services.
Our Core Competencies are Web Solutions, SEO, Exhibition Designing, Retail Designing, Graphics Designing, Audio Video Editing( Production House ) etc. We provide the highest level of quality and services at the most competitive rates and our growing number of clients are testimony to that. We are a one stop shop for all your Business Promotional Products.
Digital services in India - A Consumer's PerspectiveKshitij Trivedi
The Govt. of India has just launched Digital India Week with the purpose of imparting e-services to the citizens of India on a very large scale. This short presentation highlights the consumer's perspective about the plan of Govt. while being receiver of the digital / e-services - their expectations, the awareness, which are the forces shaping the delivery of services from the statutory bodies.
This document discusses key issues in creating a regulatory framework to support e-commerce development. It identifies 7 issues: 1) telecom reform to introduce competition and lower costs, 2) recognition of electronic documents and signatures, 3) consumer protection regulations, 4) rules for electronic funds transfer, 5) alternative dispute resolution processes, 6) limiting ISP liability, and 7) management of domain names. For each issue, it provides examples of international best practices and models from organizations like the UN, EU, and WTO.
21st century data management in public administration in Europe.pptxIbolyaJagodics1
The data processed in a global way means a huge set of information that is difficult to access and store directly, securely. The European Union's desire to ensure that this data is treated uniformly in the Member States and made available in a uniform way is a response to the needs.
The document discusses the debate around monitoring and controlling internet use and mass surveillance programs. It notes arguments from politicians and experts on both sides of the issue, with some arguing for more surveillance powers to fight crime and terrorism, while others see mass surveillance as a threat to civil liberties and an ineffective means of preventing attacks. The document also examines oversight of surveillance programs and public opinion on privacy and government monitoring of communications data.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Communication from the commission to the institutions december2015Greg Sterling
This document discusses the need to modernize EU copyright rules to adapt to the digital environment. It notes that while the internet has increased access to creative content, EU copyright laws have not kept pace and fragmentation remains. The document proposes actions to ensure wider access to content across EU borders by addressing issues like "portability" and territorial licensing that currently limit the cross-border availability of online content within the EU single market. The overall goal is to develop a more unified European copyright framework that benefits both content creators and consumers.
UNITED NATIONS December 2005 DOCUMENTS OUTCOME WSIS Dr Lendy Spires
This document contains the outcome documents from the 2003 and 2005 World Summits on the Information Society (WSIS). It includes the Geneva Declaration of Principles, the Geneva Plan of Action, the Tunis Commitment, and the Tunis Agenda for the Information Society. These documents establish a vision for an inclusive global information society and set goals and targets and areas of action to bridge the digital divide and ensure that the benefits of information and communication technologies (ICTs) are available to all.
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015Chris Marsden
This document discusses various approaches to net neutrality regulation internationally. It notes that Norway implemented co-regulation in 2009 through an industry agreement. The Netherlands implemented the 2009 EU law quickly through legislation due to mobile blocking. The US process was very slow due to lack of bipartisanship and court delays before the FCC order in 2015. The UK process was also very slow, with industry groups delaying meaningful self-regulation.
The document presents the Cybersecurity Strategy of the European Union. It discusses how cyberspace has become critical to society and the economy but also faces growing threats. It outlines five strategic priorities to address these threats: 1) achieving cyber resilience through cooperation between public and private sectors, 2) reducing cybercrime, 3) developing cyberdefense capabilities, 4) strengthening cybersecurity industry and technology, and 5) establishing international cyber policy. It proposes legislative actions to establish common cybersecurity standards and information sharing across the EU to enhance prevention, detection and response to cyber incidents. The private sector is encouraged to improve cyber defenses and share best practices due to its key role in owning cyber infrastructure.
EU actions on Bockchain- Moving beyond the Hype Soren Gigler
This presentation provides and overview of the main EU programs on blockchain and DLT. It shows the concrete actions the European Commission is taking to support the further development and adoption of blockchain technologies across all sectors. The programs are closely working with multiple stakeholders from governments, regulatory agencies, academics, startups, tech companies, international financial institutions and civil society.
Prosumer Law and Networked Platform Regulation: The Long View
Platform regulation has become the cause of technology regulation: a call to regulate the intermediaries who provide platforms for networked digital services. These include the GAFA giants: Google, Amazon, Facebook and Apple. Many policy entrepreneurs are peddling solutions as the policy cycle turns, in a classic Kingdon case of ‘solutions chasing a problem’. Yet networks are not new, and their platforms have been regulated for hundreds of years. In this paper, I take the long view, focussing on common carriage neutrality and the railways/telegraphy regulation of the 1840s in England. I offer some historical examples that may be highly relevant to ‘prosumer’ digital capitalism 180 years later.
Any Internet user who has posted content, from Facebook to Twitter to blog posts to podcasts, has become a prosumer – though there are very broad categories, ranging from the occasional tweeter to the fully developed hacker. Over two billion people now use Google to search for content, Facebook, Instagram and WhatsApp to share news, gossip and photos, YouTube to watch and upload videos, and Twitter/Snap and other sites to say just about anything. We are all becoming ‘prosumers’ sharing intimate details of our personal lives. But this ‘prosumer environment’ is currently either grossly unregulated, leaving users' data and content at the mercy of the multinationals who host it and sometimes claim to own it, or subject to knee-jerk over-regulation as with the current ‘fake news’ controversy in Germany. It is a new regulatory policy cycle in network regulation.
Regulatory responses are finally emerging, driven by both data protection and competition concerns, yet the over-arching need to ensure greater neutrality of intermediaries has largely been limited to last mile monopolists and mobile oligopolists: the legacy telecommunications companies who provide Internet access. What is needed is a comprehensive Prosumer Law solution that draws on fundamental human rights to privacy and free expression, competition, and technology regulation to ensure a fair and neutral deal for prosumers and citizens.
This proposal is part of the Digital Finance package, a package of measures to further enable and support the potential of digital finance in terms of innovation and competition while mitigating the risks.It is in line with the Commission priorities to make Europe fit for the digital age and to build a future-ready economy that works for the people.The digital finance package includes a new Strategy on digital finance for the EU financial sector with the aim to ensure that the EU embraces the digital revolution and drives it withinnovative European firms in the lead, making the benefits of digital finance available to European consumers and businesses.In addition to this proposal, the package also includes a proposal for a pilot regime on distributed ledger technology (DLT) market infrastructures, a proposal for digital operational resilience, and a proposal to clarify or amend certain related EU financial services rules.
The EU document proposes reforms to data privacy regulations to give individuals greater control over personal data collected by companies. It acknowledges that current regulations are outdated and do not address today's data practices. The proposed reforms aim to strengthen individual rights by requiring opt-in for data collection and use, data minimization by companies, and a "right to be forgotten." However, the document is criticized for not sufficiently addressing technical implementation details or conflicts with freedom of expression. The implications of the legislation could be significant globally as other regions may adopt similar regulations.
The document discusses the European Union's perspective on using XBRL (eXtensible Business Reporting Language) in various areas such as regulating financial markets, simplifying reporting requirements, automating information exchange, and increasing transparency. It outlines how XBRL could be applied to streamline regulatory reporting, reduce administrative burdens on businesses, and create a single electronic network for company financial disclosures across the EU. The document also references various EU initiatives, resolutions, and recommendations that promote the adoption of XBRL and other technologies to modernize public administration, financial supervision, and business reporting in Europe.
Presentation at Data protection in the Western Balkans and the Eastern Partnership Region. High-level exchange and learning week organised by SIGMA, GIZ, RCC and ReSPA.
This document discusses collaborating on regulation for machine-to-machine (M2M) and internet of things (IoT) technologies in the Middle East region. It notes that key stakeholders are bringing together issues like big data, cloud computing, privacy, and cybersecurity to devise a regulatory framework. It suggests establishing a regional M2M/IoT working group through DLA Piper to develop whitepapers on relevant topics. While some see no need yet for specific regulation, others argue regulators can facilitate joining supply and demand. Examples of regional collaboration discussed include initiatives by the UAE's TRA and smart city projects in Dubai.
The document discusses the European Union's Digital Single Market initiative. It aims to create a unified digital economic area in the EU by ensuring the free movement of data, goods, services, and people online. The three pillars of the strategy are improving access to digital content across borders for consumers and businesses, establishing policies to foster innovation in digital technologies, and maximizing growth of the EU's digital economy. Some key policies mentioned include ending roaming charges, harmonizing e-commerce rules, reforming data and privacy regulations, and increasing cybersecurity. The overall goal is to facilitate a digital marketplace in Europe and help EU businesses compete globally online.
The document summarizes a call from the European Commission in 2007 to build a Thematic Network on Privacy Protection Infrastructures. The goal was to facilitate an open European eServices market while allowing users to define and control privacy profiles across different privacy regimes. It would bring together stakeholders from government, enterprise, and civil society through 4 events over 2 years. The first event, called the European PrivacyOS Conference, would focus on Towards Privacy Friendly Identity Management and was scheduled for October 2007 in Strasbourg just before an international privacy and data protection conference. 16 partners from 9 countries and organizations agreed to participate in the open and collaborative network.
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
The document discusses the authors' experience with different testing strategies at their company StratEx. They initially used Selenium for UI testing but found it did not help when they frequently changed screens. They then investigated Test-Driven Development (TDD) but found it inefficient, as tests are also code that must be written and maintained. Behavior-Driven Development (BDD) showed more promise as it focuses on functionality rather than architecture and bridges communication between users and developers. However, no methodology fully describes large, complex systems. The search for the best testing approach is ongoing.
More Related Content
Similar to 15th GCC Secured Judicial And Police Cooperation
This document discusses key issues in creating a regulatory framework to support e-commerce development. It identifies 7 issues: 1) telecom reform to introduce competition and lower costs, 2) recognition of electronic documents and signatures, 3) consumer protection regulations, 4) rules for electronic funds transfer, 5) alternative dispute resolution processes, 6) limiting ISP liability, and 7) management of domain names. For each issue, it provides examples of international best practices and models from organizations like the UN, EU, and WTO.
21st century data management in public administration in Europe.pptxIbolyaJagodics1
The data processed in a global way means a huge set of information that is difficult to access and store directly, securely. The European Union's desire to ensure that this data is treated uniformly in the Member States and made available in a uniform way is a response to the needs.
The document discusses the debate around monitoring and controlling internet use and mass surveillance programs. It notes arguments from politicians and experts on both sides of the issue, with some arguing for more surveillance powers to fight crime and terrorism, while others see mass surveillance as a threat to civil liberties and an ineffective means of preventing attacks. The document also examines oversight of surveillance programs and public opinion on privacy and government monitoring of communications data.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Communication from the commission to the institutions december2015Greg Sterling
This document discusses the need to modernize EU copyright rules to adapt to the digital environment. It notes that while the internet has increased access to creative content, EU copyright laws have not kept pace and fragmentation remains. The document proposes actions to ensure wider access to content across EU borders by addressing issues like "portability" and territorial licensing that currently limit the cross-border availability of online content within the EU single market. The overall goal is to develop a more unified European copyright framework that benefits both content creators and consumers.
UNITED NATIONS December 2005 DOCUMENTS OUTCOME WSIS Dr Lendy Spires
This document contains the outcome documents from the 2003 and 2005 World Summits on the Information Society (WSIS). It includes the Geneva Declaration of Principles, the Geneva Plan of Action, the Tunis Commitment, and the Tunis Agenda for the Information Society. These documents establish a vision for an inclusive global information society and set goals and targets and areas of action to bridge the digital divide and ensure that the benefits of information and communication technologies (ICTs) are available to all.
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015Chris Marsden
This document discusses various approaches to net neutrality regulation internationally. It notes that Norway implemented co-regulation in 2009 through an industry agreement. The Netherlands implemented the 2009 EU law quickly through legislation due to mobile blocking. The US process was very slow due to lack of bipartisanship and court delays before the FCC order in 2015. The UK process was also very slow, with industry groups delaying meaningful self-regulation.
The document presents the Cybersecurity Strategy of the European Union. It discusses how cyberspace has become critical to society and the economy but also faces growing threats. It outlines five strategic priorities to address these threats: 1) achieving cyber resilience through cooperation between public and private sectors, 2) reducing cybercrime, 3) developing cyberdefense capabilities, 4) strengthening cybersecurity industry and technology, and 5) establishing international cyber policy. It proposes legislative actions to establish common cybersecurity standards and information sharing across the EU to enhance prevention, detection and response to cyber incidents. The private sector is encouraged to improve cyber defenses and share best practices due to its key role in owning cyber infrastructure.
EU actions on Bockchain- Moving beyond the Hype Soren Gigler
This presentation provides and overview of the main EU programs on blockchain and DLT. It shows the concrete actions the European Commission is taking to support the further development and adoption of blockchain technologies across all sectors. The programs are closely working with multiple stakeholders from governments, regulatory agencies, academics, startups, tech companies, international financial institutions and civil society.
Prosumer Law and Networked Platform Regulation: The Long View
Platform regulation has become the cause of technology regulation: a call to regulate the intermediaries who provide platforms for networked digital services. These include the GAFA giants: Google, Amazon, Facebook and Apple. Many policy entrepreneurs are peddling solutions as the policy cycle turns, in a classic Kingdon case of ‘solutions chasing a problem’. Yet networks are not new, and their platforms have been regulated for hundreds of years. In this paper, I take the long view, focussing on common carriage neutrality and the railways/telegraphy regulation of the 1840s in England. I offer some historical examples that may be highly relevant to ‘prosumer’ digital capitalism 180 years later.
Any Internet user who has posted content, from Facebook to Twitter to blog posts to podcasts, has become a prosumer – though there are very broad categories, ranging from the occasional tweeter to the fully developed hacker. Over two billion people now use Google to search for content, Facebook, Instagram and WhatsApp to share news, gossip and photos, YouTube to watch and upload videos, and Twitter/Snap and other sites to say just about anything. We are all becoming ‘prosumers’ sharing intimate details of our personal lives. But this ‘prosumer environment’ is currently either grossly unregulated, leaving users' data and content at the mercy of the multinationals who host it and sometimes claim to own it, or subject to knee-jerk over-regulation as with the current ‘fake news’ controversy in Germany. It is a new regulatory policy cycle in network regulation.
Regulatory responses are finally emerging, driven by both data protection and competition concerns, yet the over-arching need to ensure greater neutrality of intermediaries has largely been limited to last mile monopolists and mobile oligopolists: the legacy telecommunications companies who provide Internet access. What is needed is a comprehensive Prosumer Law solution that draws on fundamental human rights to privacy and free expression, competition, and technology regulation to ensure a fair and neutral deal for prosumers and citizens.
This proposal is part of the Digital Finance package, a package of measures to further enable and support the potential of digital finance in terms of innovation and competition while mitigating the risks.It is in line with the Commission priorities to make Europe fit for the digital age and to build a future-ready economy that works for the people.The digital finance package includes a new Strategy on digital finance for the EU financial sector with the aim to ensure that the EU embraces the digital revolution and drives it withinnovative European firms in the lead, making the benefits of digital finance available to European consumers and businesses.In addition to this proposal, the package also includes a proposal for a pilot regime on distributed ledger technology (DLT) market infrastructures, a proposal for digital operational resilience, and a proposal to clarify or amend certain related EU financial services rules.
The EU document proposes reforms to data privacy regulations to give individuals greater control over personal data collected by companies. It acknowledges that current regulations are outdated and do not address today's data practices. The proposed reforms aim to strengthen individual rights by requiring opt-in for data collection and use, data minimization by companies, and a "right to be forgotten." However, the document is criticized for not sufficiently addressing technical implementation details or conflicts with freedom of expression. The implications of the legislation could be significant globally as other regions may adopt similar regulations.
The document discusses the European Union's perspective on using XBRL (eXtensible Business Reporting Language) in various areas such as regulating financial markets, simplifying reporting requirements, automating information exchange, and increasing transparency. It outlines how XBRL could be applied to streamline regulatory reporting, reduce administrative burdens on businesses, and create a single electronic network for company financial disclosures across the EU. The document also references various EU initiatives, resolutions, and recommendations that promote the adoption of XBRL and other technologies to modernize public administration, financial supervision, and business reporting in Europe.
Presentation at Data protection in the Western Balkans and the Eastern Partnership Region. High-level exchange and learning week organised by SIGMA, GIZ, RCC and ReSPA.
This document discusses collaborating on regulation for machine-to-machine (M2M) and internet of things (IoT) technologies in the Middle East region. It notes that key stakeholders are bringing together issues like big data, cloud computing, privacy, and cybersecurity to devise a regulatory framework. It suggests establishing a regional M2M/IoT working group through DLA Piper to develop whitepapers on relevant topics. While some see no need yet for specific regulation, others argue regulators can facilitate joining supply and demand. Examples of regional collaboration discussed include initiatives by the UAE's TRA and smart city projects in Dubai.
The document discusses the European Union's Digital Single Market initiative. It aims to create a unified digital economic area in the EU by ensuring the free movement of data, goods, services, and people online. The three pillars of the strategy are improving access to digital content across borders for consumers and businesses, establishing policies to foster innovation in digital technologies, and maximizing growth of the EU's digital economy. Some key policies mentioned include ending roaming charges, harmonizing e-commerce rules, reforming data and privacy regulations, and increasing cybersecurity. The overall goal is to facilitate a digital marketplace in Europe and help EU businesses compete globally online.
The document summarizes a call from the European Commission in 2007 to build a Thematic Network on Privacy Protection Infrastructures. The goal was to facilitate an open European eServices market while allowing users to define and control privacy profiles across different privacy regimes. It would bring together stakeholders from government, enterprise, and civil society through 4 events over 2 years. The first event, called the European PrivacyOS Conference, would focus on Towards Privacy Friendly Identity Management and was scheduled for October 2007 in Strasbourg just before an international privacy and data protection conference. 16 partners from 9 countries and organizations agreed to participate in the open and collaborative network.
Similar to 15th GCC Secured Judicial And Police Cooperation (20)
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
The document discusses the authors' experience with different testing strategies at their company StratEx. They initially used Selenium for UI testing but found it did not help when they frequently changed screens. They then investigated Test-Driven Development (TDD) but found it inefficient, as tests are also code that must be written and maintained. Behavior-Driven Development (BDD) showed more promise as it focuses on functionality rather than architecture and bridges communication between users and developers. However, no methodology fully describes large, complex systems. The search for the best testing approach is ongoing.
ALT-F1.BE : The Accelerator (Google Cloud Platform)Abdelkrim Boujraf
The Accelerator is an IT infrastructure able to collect and analyze a massive amount of public data on the WWW.
The Accelerator leverages the untapped potential of web data with the first solution designed for diverse sectors,
completely scalable, available on-premise, and cloud-provider agnostic.
This document provides a summary of research papers and publications related to security, privacy, and trust in computing. It lists 11 different publications, including journal articles, conference papers, and reports. The publications cover topics such as privacy-preserving social network analysis, secret handshake protocols, distributed access control, and emerging risks to high tech industries from foreign regulation.
Google has released a robust Platform-as-a-Service called Google App Engine. It allows start-ups, firms or individuals to experience the scalable infrastructure Google uses to run its applications (e.g. Gmail, Google Docs, Google search engine).
The platform is named Google App Engine; it gives access to many programming languages, libraries, services and tools that facilitate the development of scalable and reliable applications on the Cloud.
ALT-F1 Google AppEngine-cloud-computing-v2.00
What you need to know about an IT experience - 2012-11-29 - universite-lilleAbdelkrim Boujraf
What you need to know about an IT experience - Talk given at the "Université de Lille 1 Sciences et Technologies USTL, 59650 Villeneuve-d'Ascq" (http://www.univ-lille1.fr)
Alt f1-rpt-2012-11-29 universite-lille
ALT-F1: Visualize Quantify Optimize Facility layout and planning using GE Bri...Abdelkrim Boujraf
Result of the GE Brilliant Manufacturing Hackathon: https://brilliantmanufacturing.devpost.com
We used Predix, Predix-UI, ALT-F1 Resources and AMIA Systems solutions: SIMOGGA Planner and SIMOGGA Layout Design
http://www.alt-f1.be
http://www.amia-systems.com
https://www.ge.com/digital/brilliant-manufacturing
The competition is fierce worldwide, companies compete with each other and the management focuses on the cost production while trying to keeping its energy footprint low.
SIMOGGA Solutions are built to Visualize, Quantify and Optimize the shop floor layout, the MRO processes as well the Warehouses.
We want to help companies keep the local employment produce, maintain & recycle locally
v0.06
The document discusses the challenge of keeping environmental impacts from civil aviation steady over the next 30 years as aircraft numbers are expected to double. It notes that currently there are 20,000 aircraft flying worldwide, and within 30 years an additional 30,000 aircraft will be added. The challenge is how to prevent a rise in CO2 emissions given increased aircraft and flights. The document proposes using artificial intelligence to optimize aircraft schedules and speeds to reduce circling times and emissions. This could help the aviation industry meet international treaties aimed at curbing greenhouse gas emissions.
Reduce CO2 Emission of the Civial Aviation - GE Digital - Predix.io - v3.03Abdelkrim Boujraf
OptimAviation Artificial Intelligence proposes to Aircraft #21 to slow down to let aircraft #13 land first.
POSITIVE IMPACT
Both aircrafts #13 and #21 consume less fuel
The airline industry complies with international treaties forcing the parties to reduce greenhouse emission
CONSEQUENCE
A rise of CO2 emission
High kerosene consumption
further info: www.alt-f1.be
SIMOGGA Solutions uses Predix services to optimize operational processes. It analyzes shop floor data to propose new layouts that increase capacity and reduce costs. It also optimizes maintenance and repair processes to improve material usage. Additionally, it optimizes warehouse management to minimize customer wait times. SIMOGGA Planner and Connect integrate Predix data to simulate planning under resource and capacity constraints. The solutions help various industries increase efficiency and reduce costs through visualization, quantification, and optimization of operational processes.
StratEx, PMO EASILY & AFFORDABLY (SaaS and On-premise)Abdelkrim Boujraf
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions.
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions.
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
The Schengen Information System (SIS) is an EU database that allows law enforcement, border, and immigration authorities to enter and consult alerts regarding wanted persons and stolen property. It facilitates information sharing between member states and EU agencies. The Commission is proposing to expand SIS by adding new alert categories and improving security and data protection. New categories will include alerts on unknown wanted persons identified by fingerprints and preventive alerts for missing children. Access to SIS will be expanded for Europol and the new European Border and Coast Guard Agency. Strict rules ensure data quality and protect individuals' rights.
AMIA Systems help plant managers to visualize, quantify and optimize the layout of their production site, MRO site or Warehouse using SIMOGGA.
AMIA Systems works for several industries such as transportation, maritime, automotive, aerospace and defense: i.e. DAF Trucks (Automotive), Twin Disc (Machinery), TD Williamson (Oil & Energy), SNCB/NMBS (transportation), Sonaca (Aviation & Aerospace), NLMK (Mining & Metals), Tale Me (Textiles), FN Herstal (Defense & Space)
AMIA Systems helps managers visualize, quantify, and optimize factory layouts and production schedules using their SIMOGGA software solutions. The document outlines AMIA Systems' products and services, including SIMOGGA Layout Design for optimizing factory layouts, SIMOGGA Planner for advanced planning and scheduling, and SIMOGGA Appliance for real-time operational data collection. Customer case studies and testimonials are provided showing how AMIA Systems has helped clients reduce costs, improve productivity, and identify optimization opportunities through quantitative analysis and proposed layout/schedule improvements.
AMIA Systems helps managers optimize factory layouts and schedules using their SIMOGGA software solutions. SIMOGGA Layout Design visualizes and quantifies material flows to optimize layouts for increased production speed and lower costs. SIMOGGA Planner optimizes schedules under constraints to maximize goals with limited resources. SIMOGGA Appliance provides real-time shop floor transparency through manufacturing execution systems. AMIA Systems has helped customers reduce distances, workloads, and improve productivity through new layouts and flow analysis.
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
Business challenges
Built by ALT-F1, StratEx embodies proven methods, based on experience from dozens of successful small and large-scale projects performed by/for public or private companies.
Keys to success
Easy to use
On-Premise and SaaS application
Support RUP, ITIL, TOGAF and your custom method
Generates Word and PDF reports
Methodology, Simplicity and Management Consulting improve your productivity
Integration with MS Office Online
StratEx is a web-based project and program management application that helps managers control project delivery using existing customer processes and conventions. It was developed in 2006 and has since been used on over 30 international projects involving thousands of deliverables, staff, and stakeholders. StratEx integrates with tools like Microsoft Project and CA Clarity to provide features like Gantt charts, earned value management, automatic reporting, and templates aligned with methodologies like PMBOK and PRINCE2. The application is available both as SaaS and for on-premise installation at an affordable price.
1. 1
15TH GCC eGOVERNMENT
AND eSERVICES FORUM
May 23-27, 2009 - Al a secured eGovernment case study:
Bustan Rotana Hotel - Judicial and Law enforcement cooperation between EU Member States and EU agencies
Dubai, UAE
2. Abdelkrim Boujraf
2
¨ More than 10 years implementing/studying
exchange of judicial and police information
¨ President of non-profit organisation
¨ Master in Business administration (Minor IT and
Human Resources)
¨ Graduate in Computer Sciences
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
3. Agenda
p.3
¨ The EU political background
¤ Some facts (EU, International)
¤ The need to cooperate efficiently
¨ The case study
¤ The Interoperability issues
¤ The Service Oriented Architecture vision
¤ Imaginary screenshots
¨ The conclusions
May 23-27, 2009 - Al Bustan Rotana Hotel - 15th GCC eGovernment and eServices
Dubai, UAE Forum
4. The reality
4
¨ Public administrations must
¤ Provide efficient services to their citizens and businesses
¤ reduce their operational costs
¤ communicate efficiently with foreign public administrations
and organisations
¨ How do they achieve their goals starting from their
political programmes to end with the software code?
¨ The case study’s focus on the judicial and law
enforcement real life
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
5. 5
The European Union
Political background
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
6. 6
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
7. The European Union
7
¨ Member States: 27
¨ Political centres: Brussels, Luxembourg, Strasbourg
¨ Official languages: 23
¨ Formation
¤ ParisTreaty (18 April 1951)
¤ Rome Treaty (25 March 1957)
¤ Maastricht Treaty (7 February 1992)
¤ Lisbon Treaty (?)
¨ Population: 500 Million
¨ GDP: Total $19.195 trillion
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
8. What are the threats to the security of
8
a “western lifestyle”
The climate
The migration
The agriculture
The terrorism
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
9. Three pillars (main political areas)
9
• Customs Union and Single • Foreign policy: • Drug trafficking and weapons
market • Human rights smuggling
• Common Agricultural Policy • Democracy • Terrorism
• Common Fisheries Policy • Foreign aid • Trafficking in human beings
• EU competition law • Security policy: • Organized crime
• Economic and monetary union • European Security and • Bribery and fraud
• EU-Citizenship Defense Policy
• Education and Culture • EU battle groups
• Trans-European Networks • Helsinki Headline Goal Force
• Consumer protection Catalogue
• Healthcare • Peacekeeping
• Research (e.g. Sixth Framework
Programme)
• Environmental law
• Social policy
• Asylum policy
• Schengen treaty
• Immigration policy
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
10. Pillar III: The political programmes
10
¨ Feb 1992: The establishment of Europol (The Hague, The Netherlands) was agreed
in the Maastricht Treaty on European Union of 7 February 1992
¨ The “Tampere Program”, terminated in 1999 under the Finnish Presidency, was
primarily a “management of migration flows”
¨ The Europol Convention was ratified by all Member States and came into force on
1 October 1998.
¨ Eurojust is established in 2002 by a Decision
¨ The “Hague Program” in 2004, it has been agreed upon for the creation of an
“area of freedom, security and justice”. Again it was decided on intensification of
migration policy, including the construction of the Border Agency “Frontex” and the
interception of refugees already in their home countries. “The Hague Program” puts
the “defence of terrorism” in the centre. At the level of information exchange and
cooperation we can now count on the “principle of availability”
¨ Autumn 2009, To adopt the new “Stockholm program”, containing a wish-list for
"police cooperation, the fight against terrorism, management of missions in third
countries, migration, asylum and border management, civil protection, new
technologies and information networks ".
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
11. 26 July 1995:
Council Act drawing up the Convention on the
establishment of a European Police Office
(Europol Convention).
1992 1995
07 Feb 1992:
The establishment of Europol
(The Hague, The Netherlands)
was agreed in the Maastricht
Treaty on European Union
12. 29 June 1998:
Objective of the European 15/16 Oct 1999:
Judicial Network (EJN) in criminal Set up a unit called Eurojust, with the
matters is to facilitate mutual objective of coordinating the activities
judicial assistance in the fight carried out by the national authorities
against transnational crime. It responsible for prosecution
originates in a Joint Action
adopted by the Council
1998 1999 2000
1 July 1999:
Europol commenced its full activities.
Europol’ objective is to improve the
effectiveness of, and cooperation
between, the competent authorities in
the Member States in preventing and
combating international organised
crime
13. 4/5 Nov 2004:
The “Hague Program” has been agreed upon for the
creation of an “area of freedom, security and justice”.
It was decided on intensification of migration policy,
including the construction of the Border Agency “Frontex”
and the interception of refugees already in their home
countries.
“The Hague Program” puts the “defence of terrorism” in the
centre. At the level of information exchange and
cooperation we can now count on the “principle of
availability”
2002 2004
28 February 2002:
Council Decision setting up Eurojust with a
view to reinforcing the fight against serious
crime 26 October 2004:
Council Regulation establishing a European
Agency for the Management of
Operational Cooperation at the External
Borders of the Member States of the
European Union (Frontex)
14. Autumn 2009:
To adopt the new “Stockholm program”,
containing a wish-list for "police
cooperation, the fight against terrorism,
management of missions in third countries,
migration, asylum and border
management, civil protection, new
technologies and information networks ".
2005 2009
20 Sept 2005:
European Police College (CEPOL) is created.
Its objective is to step up cooperation
between national police schools in order to
promote a joint approach to the major
problems encountered in fighting crime,
preventing delinquency and maintaining law
and order.
15. Institutions & Authorities
15
¨ European Union’s Judicial Cooperation Unit Eurojust
¨ European Judicial Network in civil and commercial
matters
¨ European Police Office Europol
¨ Police academy CEPOL
¨ Border agency Frontex, committee for the
Management of Operational Cooperation of all
police agencies of the EU within its intelligence
operation assessment centre.
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
16. 16 Facts
Riots, Terrorist attacks, cross-border serious
crimes
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
17. Frontex: Illegal Border Crossing by
17
Member States in 2007
By Land By Air
*This table is provisional and contains the data provided by Member States until February 2008 The consolidated collected data will be presented in the Annual Risk Assessment to be distributed in June 2008
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
18. Frontex: Illegal Border Crossing
18
by Member States in 2007
By Sea Total
*This table is provisional and contains the data provided by Member States until February 2008 The consolidated collected data will be presented in the Annual Risk Assessment to be distributed in June 2008
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
19. Europol: # of operational
19
projects (between ‘06 and ‘07)
4
3.5
3
2.5
2
1.5
1
0.5 2006
0
2007
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
20. Europol: Progression of info.
20
exchange from 2000 until 2007
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
21. Eurojust: Requested countries vs.
21
Requesting countries
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
22. Terrorist attacks in Europe
22
(between 2002 and 2009)
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
23. Riots in Europe
23
(between Dec 2008 and Feb 2009)
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
24. 24 The case study
Judicial and Law enforcement cooperation
between EU Member States and EU agencies
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
25. EU Interagency Collaboration - The reality….
25
¨ During a routine check Spanish customs intercept a
shipment of coffee containing cocaine in the harbour of
Malaga.
¨ The container came from Caracas, Venezuela and was
supposed to be transported by road to Antwerp and to be
delivered to a trade company called BE.
¨ A number of persons are taken into custody, whilst
investigations start…..
¤ The involved authorities (Europol and Eurojust) need to
collaborate in a quick and efficient manner.
n European Arrest Warrant
n Rogatory Letter
n Joint Investigation Teams
n ….
¤ They need to remain in control of their systems
¤ They need to follow local as well as EU-wide laws,
agreements and policies
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
26. High level exchange of information
between National Judicial & Law Enforcement authorities, Europol and Eurojust
Page 26
27. The European interoperability
27
framework
Pan-European eGovernment Services (PEGS)
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
29. Scope / Area of validity
Page 29
Member States A Member States B
Administration
Businesses
A
A2B
Citizens A2A Citizens
A2C
A2C
Administration Administration A2C
Businesses
A A2A B
A2B
A2A A2B
European administration
30. Software architecture
30
Bilateral architecture Multilateral architecture
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
31. Basics of software strategy
Page 31
¨ Interoperability based on
¤ open standards
¤ open interfaces
¨ Goals …
¤ Create the lowest possible obstacles for adoption
¤ Independence from specific software vendors
¤ Long-term sustainability of software (moderate costs,
reusability, etc.)
¤ Security of communication and systems
32. Definition of an Open Standard
32
¨ The standard is adopted and will be maintained by a not-
for-profit organisation, and its ongoing development occurs
on the basis of an open decision-making procedure
available to all interested parties (consensus or majority
decision etc.).
¨ The standard has been published and the standard
specification document is available either freely or at a
nominal charge. It must be permissible to all to copy,
distribute and use it for no fee or at a nominal fee.
¨ Intellectual property – i.e. patents possibly present – of
(parts of) the standard is irrevocably made available on a
royalty-free basis.
¨ There are no constraints on the re-use of the standard.
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
33. 33 Software architecture
From the technical requirements to the code
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
34. Principles vs. Technical requirements
34
Technical Software
Privacy Subsidiarity
Architecture Architecture
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
35. Enforcement of Steps – Levels of
Enforcement
Optimistic strategy Confidence
Confirmation
Controlling by Process Design
Agreements and policies
Monitoring and Controlling
Dual Control
Pessimistic strategy Direct control
36. Security analysis
36
Security and Organisational
Control Requirements Cross-Organisational
Workflow
private public
- Collaboration A
B
public private
- Transactions A B
A
- Basic Security Services
public
- Rights Management B
- Privacy private
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
37. Security analysis
37
Security and Organisational
ACID-Properties
Control Requirements
- Collaboration Advanced Transaction Models
- Transactions Coordination
Pivot, Compensate, Retry
- Basic Security Services
Enforcement (of steps)
- Rights Management
- Privacy Mixed/Atomic Outcome
Time constraints
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
38. Security analysis
38
Security and Organisational
Control Requirements Confidentiality
- Collaboration Data Integrity
- Transactions Authentication
Non-Repudiation
- Basic Security Services
Time Stamping
- Rights Management
- Privacy Traceability / ‘Structured Proof’
Assurance
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
39. Security analysis
39
Security and Organisational
Control Requirements
Access Control
- Collaboration
- Transactions Delegation
- Basic Security Services Revocation
- Rights Management
Separation of Duties
- Privacy
Obligation of Duties
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
40. Security analysis
40
Security and Organisational
Control Requirements
Anonymity / Pseudonymity
- Collaboration
- Transactions Data Control / Obligation Management
- Basic Security Services
- Rights Management
Unlinkability / Unobservability
- Privacy
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
41. Unisys SOA reference architecture
41
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
42. Service Oriented Architecture
42
Security Security
Audit Control … Audit Control …
policy policy
Enterprise Service Bus Enterprise Service Bus
Web Web
Workflow Management Services Services Workflow Management
System Contracts Contracts System
Legacy Application Legacy Application
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
43. Privacy Preservation in distributed Role
43
Based Access Control
Organisation A’s Org-to-Org Confidentiality and End-to-EndDistributed role based access Organisation B’s
domain of trust Authenticity protection domain with subject privacy protection domain domain of trust
Privacy Srv. Oblig. Srv. PAP PDP Application PEP IOP GW IOP GW PEP PDP PAP Oblig. Srv. Service
load policies request
autorisation request load policies
auth. decision
role mapping request
identity protection request
attribute cert. Organis
ation A
request with attribute certificate holding distributed roles and user pseudonym
Prosecutor
send OUT
REQUEST .
request
Request with
attribute
User X.Y..
certificate attribute certificate and request validation
holding auth. request
distributed roles authorisation decision
and user
obligation service invocation
pseudonym,
signed by Root request with distributed roles
CA of target service invocation
Organisation A
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
45. WS-Choreography Description
Slide 45
Language
• W3C recommendation
• Describes the global view
Web
service Web
service
process flow
collaboration
Web Web Web Web
service service service service
The BPEL view The CDL view
BPEL: Business Process Execution Language
CDL: Choreography Description Language
Monitoring of Service Choreographies 07/08/12
46. 46 Imaginary screenshots
Cross organisation exchange of information
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
47. Imaginary screenshots
Request for information
47
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
48. Imaginary screenshots
Controlling the Choreography
48
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
50. Imaginary screenshots
50
Retrieve data & Send response
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
51. Imaginary screenshots
51
Controlling the Choreography (final step)
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
52. 52 conclusions
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
53. Conclusions
53
¨ You need to incorporate the … constraints
¤ Political
¤ Business
¤ Organisational
¤ Technical
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
54. Conclusions
54
¨ Do you have … understanding each other?
¤ Lawyers
¤ Economists
¤ Linguists
¤ Business Architects
¤ Project managers
¤ Software Architects
¤ Software developers
¤ Testers
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
55. Conclusions
55
¨ Where can you find software developers knowing so
much concepts?
¨ Do you use one methodology for each software
development steps?
¨ COTS vs. Do-it-yourself?
¨ Have you developed a proof of concept using a
complex use case running under the selected
software architecture?
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
56. 56 Miscellaneous
Resources, references, contact details
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
57. R4eGov
Page 57
¨ Funded by: the European Commission through the Framework Programme 6
– Integrated Project
¨ Contract duration: from March 2006 to March 2009
¨ Budget: €11.4 millions (€7.4 millions financed by EC)
¨ Partners: 20 partners in 7 countries (BE, FR, IT, UK, NL, DE, AT)
¨ Tasks: 11 Work packages (Coordination, Dissemination, User Group /
Case studies, Interoperability, Security, Integration, Training, Development
of 2 Demonstrators)
http://www.r4egov.eu
58. Resources available
Page 58
¨ Website:
¤ http://www.r4egov.eu
¨ Three Video presentations
¤ http://www.dailymotion.com/group/r4egov
n Business Presentation
n Technical components
n Architecture mechanisms
¨ Tools
¤ eGovCube: http://www.uni-koblenz.de/~regov/
¨ European Commission
¤ Framework Programme 6: http://ec.europa.eu/research/fp6/index_en.cfm
¤ Information Society Technologies: http://cordis.europa.eu/ist/about/about.htm
59. References
59
¨ Eurojust: http://europa.eu/scadplus/leg/en/lvb/l33188.htm
¤ http://www.eurojust.europa.eu/press_releases/annual_reports/2006/Annual_Report_2006_EN.pdf
¤ http://www.eurojust.europa.eu/press_releases/annual_reports/2007/Annual_Report_2007_EN.pdf
¨ Europol: http://europa.eu/scadplus/leg/en/lvb/l14005b.htm
¤ http://www.europol.europa.eu/publications/Annual_Reports/EuropolAnnualReport2006.pdf
¤ http://www.europol.europa.eu/publications/Annual_Reports/Annual%20Report%202007.pdf
¨ European Judicial Network: http://ec.europa.eu/civiljustice/index_en.htm
¨ CEPOL: http://europa.eu/scadplus/leg/en/lvb/l14006.htm
¨ Frontex: http://europa.eu/scadplus/leg/en/lvb/l33216.htm
¤ http://www.frontex.europa.eu/gfx/frontex/files/justyna/annual_report_2006%5B1%5D.pdf
¤ http://www.frontex.europa.eu/gfx/frontex/files/justyna/frontex_general_report_2007_final.pdf
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
60. Riots / Strikes in Europe
60
¨ Greece (Dec 2008) http://en.wikipedia.org/wiki/2008_Greek_riots
¨ Iceland (Jan 2009) http://en.wikipedia.org/wiki/2009_Icelandic_financial_crisis_protests
¨ Sweden (Dec 2008)
¨ Lithuania (Jan 2009) http://www.nytimes.com/2009/01/17/world/europe/17lithuania.html
¨ Latvia (Jan 2009) http://en.wikipedia.org/wiki/2009_Riga_riot
¨ Bulgaria (Jan 2009) http://www.reuters.com/article/latestCrisis/idUSLE473019
¨ France (Feb 2009)
http://www.heralddeparis.com/rage-and-violence-anti-nato-march-in-strasbourg-started-
peacefully/29960
¨ Guadeloupe (16 Feb 2009)
http://www.kuwaittimes.net/read_news.php?newsid=OTcwMjc3MzQ3
¨ Lampedusa – Italy (Feb 2009)
http://www.timesofmalta.com/articles/view/20090219/world-news/illegal-immigrants-start-
fires-clashes-at-lampedusa
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE
61. References
61
¨ Pictures from http://www.flickr.com
¨ Maps generated by http://gunn.co.nz/map/
¨ Definitions from http://www.wikipedia.org
May 23-27, 2009 - Al Bustan
15th GCC eGovernment and eServices Forum
Rotana Hotel - Dubai, UAE