SlideShare a Scribd company logo
1 of 43
BVBA
03-23-05Juni 2011
page 1 • TSDT
TSDT-Trusted secure digital trans-actioning
(blockchain private)
Presented by Jan Biets
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 2 • TSDT
“Forview”
introduction
– Introduction: why do we need a trustworthy system?
– Overview of TSDT, the elements;
– Compliant with international standards
– Typical situation
• Business cases to apply ‘secure trans-actioning’
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 3 • TSDT
Intro
• The author adherents:
– in general ‘closed environment’, also known as “permissioned
blockchain”, and ‘private blockchain”, trust authority, or company
network, and other ‘membership’ or ‘society’ -based
environments, with very strong identification, access and
authorisation management
– In general ‘non-repudiation’ is definitely not easy to constitute in
a contemporary world. Trustworthy partners (authorities) are
required to establish a reliable (read: ’trustworthy’) and generally
accepted business trans-actioning system;
Admittance: face-2-face identification, class 3, 4 or even 5
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
NON-REPUDIATION
irrefutable
unwiderlegbar
ONWEERLEGBAAR
neizpodbitno
Non-repudio
necessarie
kieltämätÜn
反駁できない
确凿
अखंडनीय
неопровержимый
irrefutĂĄvel
inconfutabile
‫قابل‬‫انکار‬‫نیست‬
obestridliga
nepobitan
uigendrivelige
‫ל‬ ַ‫בא‬ ַ‫פייטא‬ ַ‫ירא‬
Why ?
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
NON-REPUDIATION
TSA
TTP
XADES-XL
C
A
LTANS
SSCD
PKI
RA
PROCESS
POLICY
CRL
OCSP
XADES-A
OID
HSM
European
LAW
ERS
VAS
XML TA
A
ETSITS102023
ETSITS101903
IAM
TSDT
How?
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 6 • TSDT
TSA
E-SIGN
CA - PKI
ERS
Management
LAW
Policy
Security
Business
Process
User
interface
components
IAM
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 7 • TSDT
TSDT
operations
other
modules
documentedmanaged
law &
standards
constellation
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 8 • TSDT
TSDT - other elements
• Business Case
– Why, what, how (justification)
• Risk assessment
– What are the risks “what if not”
• Business Process Flow
– Define the streams of the document flows
• DMS
– Choice ‘commercial’ product, or open source
– User interface (GUI)
Abbreviations:
DMS - Document Management System,
GUI – Graphic User Interface
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 9 • TSDT
TSDT - pre requisites
• CA – PKI and RA: strong identification and access
management
• Xades XL, electronic signature
– ETSI TS 101 903 XML advanced electronic
signatures
– ETSI TS 101 703 Electronic Signature Formats
(CMS)
– XAdES Long-Term Signature Format Profile v1.0
– Basic electronic signature (XAdES-BES)
– Explicit policy based electronic signature (XAdES-
EPES)
– Electronic signature with Time (XAdES-T)
– Electronic signature with Complete Validation Data
Reference (XAdES-C)
• TSA, timestamp authority
– ETSI TS 101 861 Time stamping profile
– ETSI TS 102 023 Policy requirements for time
stamping authorities
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
Applicable standards
•IAM : identification and access
management, by means of:
– RA – registration authority, both based on ,
and full compliancy with ETSI TS 101 456
V1.4.1 (2006-01)
– Technical Specification Electronic Signatures
and Infrastructures (ESI);
– Policy requirements for certification authorities
issuing qualified certificates, and
– ETSI_TS_101 862_Qualified_certificate_profile
– Policy based on ETSI TS 101 456
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
Applicable standards
• Electronic signature:
– To enable the use of digital signature, the programme decided to realise Xades
XL signature (ETSI TS 101 903 V1.3.2 (2006-03)
– Technical Specification XML Advanced Electronic Signatures (XAdES)
– ETSI_es_201733v010103_Electronic Signature Formats
– ETSI_sr_002176v010101_Algorithms and Parameters for Secure Electronic
Signatures
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
Applicable standards
• TSA (timestamp authority) based on ETSI TS 102 023 V1.2.1 (2003-01)
• Technical Specification Electronic Signatures and Infrastructures (ESI);
Policy requirements for time-stamping authorities, and
• ETSI_ts_101861v010301_time_stamping_profile
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 13 • TSDT
Xades, electronic signature process flow
Electronic
document
Creation (Pdf)
DocSign
Signature PIN code
TimeStamp
Public Key
Verification
OCSP
Verification
INPUT
Electronic
document
Creation (Pdf)
+
Timestamp profile
OUTPUT
0
1
2
3
4
5
6
7
8 9
E-sign
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 14 • TSDT
TSA – timestamp , process flow
Request
Time stamp
Verify validity
certificate
logging
Verify validity
> 1 < second
logging
Set
Time stamp
TimeStamp
According ETSI TS 102 023
System audit process
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 15 • TSDT
TSDT - approach
• creating a system to enable the TSDT service :
– policy,
– processes,
– procedures,
• procedures (or protocols) contain the 'what',
the 'how', the 'where', and the 'when'.
– security,
– infrastructure/architectural design and
– audit
• Verify: systems, documents, and operations
Abbreviations:
CA - Certification Authority ,
PKI - Private Key Infrastructure,
RA - Registration Authority
TSA - Timestamp Authority
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 16 • TSDT
TSDT - IAM
• Minimal requirement!
• Class 3 Certificate: This certificate will be issued to
individuals as well as organizations. As these are high
assurance certificates, primarily intended for e-commerce
applications, they shall be issued to individuals only on
their personal (physical) appearance before the Certifying
Authorities.
Abbreviations:
CA - Certification Authority ,
RA - Registration Authority
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 17 • Fedisa
Certificate classification (Verisign)
• VeriSign uses the concept of classes of digital certificates
– Class 1 for individuals, intended for email.
– Class 2 for organizations, for which proof of identity is required.
– Class 3 for servers and software signing, for which independent
verification and checking of identity and authority is done by the
issuing certificate authority.
– Class 4 for online business transactions between companies.
– Class 5 for private organizations or governmental security.
https://www.verisign.com/support/roots.html
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 18 • TSDT
TSDT - Policy
A policy is typically described as a principle or set of rules to
guide decisions and achieve rational outcome(s).
Where as a policy will contain the 'what' and the 'why',
Typical topics:
•Purpose
•Policy administration
•Obligations and liability
•Organisation’s digital archive preservation policy
•Records to be deposited
•Time of deposit (retention)
•Data integrity, and access continuity assurances
•Data integrity – system
•Accepted formats
•Infrastructure
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 19 • TSDT
TSDT – security shells (barriers, tiers)
Policy Security
PolicyHR
Trusted Archival
Authority
Physical Security
Building Security
Policy Security
Application security
Server room
Organisation&managementPolicy
System Security
Authorisation & authentification
Network Security
User interface Security
procedures people
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 20 • TSDT
TSDT – basic functionalities and features
• Depose documents
• User management
• Access control
• Document life cycle management (retention policy)
• Audit trail (event logging)
• Proof of document integrity
• Web access (intranet, internet)
• Document management system (user interface),
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 21 • TSDT
TSDT – basic functionalities: audit trail (logging of
events)
• System:
– Authorisation matrix
– Change file detection
– Log file is encrypted
– Secure logging
– Operator alerts
– System alarms
– System modifications have to be done by ‘system
administrator’ + logging (+ documented)
Based on results of risk assessment
1/2
Remark:
CWA 14167-1. Security Requirements for Trustworthy
Systems Managing Certificates for Electronic Signatures
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 22 • TSDT
TSDT – basic functionalities: audit trail (logging of
events)
• Procedures
– 4-eyes in case system operations / modifications
– Administrator access management by means of
smart card and certificate
• Dashboard (events)
– Authorisation matrix
– Configuration user management , access
management modifications
– Who has, when , what document deposed,
modified, consulted, changed, deleted, shared?
Based on results of risk assessment
2/2
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 23 • TSDT
TSDT – basic functionalities: user management
• Authority assigns access rights to users
• User management data (access rights) information exchange via Certificate
smart card, and authentic source;
– Roles:
• Authority
• Employee
• System administrator (local office/authority)
– Responsibilities:
• Depose
• Copy
• Share
• Delete
• View
• Annotate
• (other actions)
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 24 • TSDT
TSDT – basic functionalities: proof of integrity
• System generates ‘ERS’ per document, to proof long
term evidence (non-repudiation / undeniable )
• Kind of ‘fingerprint’
– Timestamp
– Electronic signature
– Certificate (status)
– Root chain certificate
– Hashing (verification / proof of ‘un-changed’ status
of content
• System regenerates periodically ERS (based on
certificate life cycle)
Abbreviations:
ERS – Evidence record syntax
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 25 • TSDT
TSDT – attributes of a trans-actioned document
Archived Object
Object META-DATA
Digital Signature
(optional)
Complementary data
Archive meta-data
Evidence record
Object’s
conservationattributes
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 26 • TSDT
TSDT – Overview of trans-actioned features
Archived Object
Object META-DATA
Digital Signature
(optional)
Complementary data
Archive meta-data
Evidence record
Object’s
conservationattributes
Transactioning object
Could be any
electronic file / data.
Object meta-data
Author, category, size, version,
date, key-word
Digital Signature
Relevance is depending on
legal requirements.
it is mandatory to proof the legal
‘serieux’ of the users
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 27 • TSDT
TSDT – ERS, evidence record syntax
Archived Object
Object META-DATA
Digital Signature
(optional)
Complementary data
Archive meta-data
Evidence record
Object’s
conservationattributes
Overview of ERS
Complementary data
•Digital certificate
•Certificate chain
•Certificate revokation list
meta-data
•Document owner
•Trans-actioning time
•Origin of document
Evidence record
•Document finger print
•Timestamp
•Hash link
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 28 • TSDT
TSDT – basic architectural design
ERS
engine
Hardware &
Storage
Policy & Procedures
Security & Legal
User client
Web Service
DMS –
user
interface
TSA
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 29 • TSDT
TSDT – functional architectural design
IAM
CA
TSA
DMS
ERS
i-Sign
HW
Event logging
(audit trail)
storage
SA*
Abbreviations:
IAM – identity & access management
CA – Certification authority
(RA – registration authority)
SA – “source authentic”
ERS – Evidence record syntax
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 30 • TSDT
TSDT – process design
TAA & ERS
ERS
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
TSDT – how it could work (a suggested scenario or use
case)
page 31 • TSDT
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 32 • Fedisa
TAA - pre requisites : TSA
Abbreviations:
TSA - Timestamp Authority , ETSI TS 102 023
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 33 • TSDT
TSDT – architectural design
S1
S2
S3
S4
Abbreviations:
LTAP – long term archival protocol
ERS – Evidence record syntax
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 34 • TSDT
Afterwords, attention items
• Business case, justification
• Risk analysis, threat , vulnerability, security
• Legal: sometimes constraints: only one copy as the original ! or not allowed
to store abroad (difficult to verify on internet!)
• Select technology;
• Business process flow;
• Usability , user friendly GUI;
• Success , succès.
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 35 • TSDT
Afterwords : points of attention during conceptual design
• Recoverability and Data Integrity
• Architecture / Design to achieve required availability
• Reliability
• Manageability
• Backup and Recovery
• Performance
• Scalability [Not every application supports more transactions or more
users when adding CPU and Memory]
• Installation Requirements
• Configuration Requirements
• Maintainability Requirements
• Localisation / Internationalisation Requirements & constraints
• Operations-, Support- and Troubleshooting Requirements
• Documentation Requirements
• Monitoring: Application Level Monitoring must be explicitly requested,
otherwise you just get system- and database monitoring.
• Archiving and Restoring
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 36 • TSDT
TSDT – some other fields of application
1. Liberal professions, have in some case long term - legal- responsibilities,
i.e.
– Lawyers
– architects : a 10 year professional responsibility for building plans
– accountants : also responsible for VAT declarations
– auditor/revisor (head of accountants): signing of fiscal year
documents/statements
2. Log files
– log files (systems, applications,...) should not be changed, only by
dedicated staff (i.e. chief security officer), and applicable policy, or local
laws
3. Banks, insurance companies; stock exchange
– approval of credits and loans: who has done what in accordance of the
mandate
– timeline and sequence (order) of the performed transactions (using
time-stamping)
4. Medical statements and medicines prescription
– patients' medical records in electronic form
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 37 • TSDT
TSDT – basic functionalities: proof of integrity
5. Justice (ministry)
– defined and traceable work streams
– from police statement to lawyers and judges, and classification of files:
every ‘role’ has added, viewed, changed documents.
– Files can not be changed by un-authorised people, nor been lost, with
dramtic legal consequences
6. Patenting (every country has a patent office; patent is public information)
– to be able to prove who was first to come up with an idea or to patent
a document, drawing, design, music score, research results,...
– Escrow
7. IPP (intellectual property protection)
– research companies have a legal trace of the progress of the search for
a new product
– this can/could be private information (un-disclosed for third parties)
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 38 • TSDT
TSDT – basic functionalities: proof of integrity
8. Registered mail
– electronic mail with proof of content, 'addressee", time , and
acceptance
9 . Closed environments
– tax governments, pension authority, banks, insurances, stock exchange
(logging of transactions),....
10. Accounting services companies
– storage of accounting companies customers' documents in electronic
format– outsourced electronic archiving (is implemented in some
Eastern European countries)
11. Apostilles:
– It specifies the modalities through which a document issued in one of
the signatory countries can be certified for legal purposes in all the
other signatory states. Such a certification is called an apostille
(French: certification). It is an international certification comparable to
a notarisation in domestic law.
12. Invoices:
– Electronic invoices archival, helpdesks, customer’s service , legal
purposes.
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 39 • Fedisa
The EU Directive 1999/93/EC on a Community framework for
electronic signatures : Profiles
XAdES defines six profiles (forms) differing in protection level offered. Each profile
includes and extends the previous one:
XAdES, basic form just satisfying Directive legal requirements for advanced
signature;
XAdES-T (timestamp), adding timestamp field to protect against repudiation;
XAdES-C (complete), adding references to verification data (certificates and
revocation lists) to the signed documents to allow off-line verification and
verification in future (but does not store the actual data);
XAdES-X (extended), adding timestamps on the references introduced by
XAdES-C to protect against possible compromise of certificates in chain in
future;
XAdES-X-L (extended long-term), adding actual certificates and revocation
lists to the signed document to allow verification in future even if their original
source is not available;
XAdES-A (archival), adding possibility for periodical timestamping (e.g. each
year) of the archived document to prevent compromise caused by weakening
signature during long-time storage period.
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 40 • TSDT
Xades, electronic signature composition
The XAdES-T envelope:
contains a trusted timestamp over the
signature. The goal is to prove that the
signer’s certificate was valid at the time of
signature.
The XAdES-X envelope:
“When an OCSP response is used, it is
necessary to time-stamp in particular that
response in the case the key from the
responder would be compromised”
In other words, the goal is to prove that
the OCSP responder’s signing certificate
was valid at the time of OCSP response.
“The SignatureTimeStamp encapsulates the
time-stamp over the SignatureValue
element.”
XADES : XML Advanced Electronic
Signatures
Specification from the ETSI that is built
upon the Xmldsig specification.
It provides “signatures that remain valid
over long periods.
XAdES-X-L
XAdES-X
XAdES-C
XAdES-T
XAdES-EPES
OCSP
Timestamp
Certificates Chain
Timestamp
XAdES - a Timestamp
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 41 • TSDT
Xades, electronic signature
composition
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 42 • TSDT
“Xades – A”, electronic signature composition
• Signed Signature Properties
• Signing Time (non-authoritative: may be from signer’s computer)
•Signature Certificate
•Signature Policy Identifier
•Signature Production Place (optional)
•Signer Role (optional)
•Signed Data Properties
•Data Object Format *
•Commitment Type Indication *
•All Data Objects Time Stamp *
•Individual Data Objects Time Stamp *
•Unsigned Signature Properties
•Counter Signature *
•Signature Timestamp+
•Complete Certificate Refs
•Complete Revocation Refs
•Refs Only Time Stamp - or – Sig and Refs Time Stamp
•Certificate Values
•Revocation Values
•Archive Time Stamp +
BLOCKCHAIN, Private & Permissioned Juni 2011
BVBA
page 43 • TSDT
Contact
Jan_biets@hotmail.com
-
0477 32 90 11

More Related Content

What's hot

Blockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain Worx
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docxAnbuShare
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Data Driven Innovation
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesCyberBahn Federal Solutions
 
Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Ian Beckett
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSJohn Bentley, II
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For EducationSanjeev Raman
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsSrinath Perera
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryPromptCloud
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the BlockchainTudor Stanciu
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeSebastian Cochinescu
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 

What's hot (20)

Blockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in FinanceBlockchain - a platform for Digital Transformation in Finance
Blockchain - a platform for Digital Transformation in Finance
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in Banking
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?
 
Blockchain Explained for Devlopers
Blockchain Explained for DevlopersBlockchain Explained for Devlopers
Blockchain Explained for Devlopers
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTS
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance Professionals
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing Industry
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 

Similar to Blockchain private permissioned

The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for BlockchainASPEX_BE
 
DLT developments in finance
DLT developments in financeDLT developments in finance
DLT developments in financeAlphons Ranner
 
DLT developments in Finance
DLT developments in FinanceDLT developments in Finance
DLT developments in FinanceAlphons Ranner
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 ltsmchatoramhuru
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4Capgemini
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCapgemini
 
Blockchain and the investment industry stack
Blockchain and the investment industry stackBlockchain and the investment industry stack
Blockchain and the investment industry stackDavid Taylor
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsAurora Consulting
 
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Vishnu Pendyala
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesValue Amplify Consulting
 
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...VSee
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
SSI, TBDex Overview
SSI, TBDex Overview SSI, TBDex Overview
SSI, TBDex Overview AlexLewin7
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 

Similar to Blockchain private permissioned (20)

The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
 
DLT developments in finance
DLT developments in financeDLT developments in finance
DLT developments in finance
 
DLT developments in Finance
DLT developments in FinanceDLT developments in Finance
DLT developments in Finance
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
Digital Transformation and Blockchain
Digital Transformation and BlockchainDigital Transformation and Blockchain
Digital Transformation and Blockchain
 
trusted archiving authority - LTANS
trusted archiving authority - LTANStrusted archiving authority - LTANS
trusted archiving authority - LTANS
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
 
Blockchain and the investment industry stack
Blockchain and the investment industry stackBlockchain and the investment industry stack
Blockchain and the investment industry stack
 
ELACHAIN
ELACHAIN ELACHAIN
ELACHAIN
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTsWeb 3 and IP: Cryptocurrencies, Blockchain, and NFTs
Web 3 and IP: Cryptocurrencies, Blockchain, and NFTs
 
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
 
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
SSI, TBDex Overview
SSI, TBDex Overview SSI, TBDex Overview
SSI, TBDex Overview
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 

More from Jan Biets [jan_biets@hotmail.com] (15)

Maas
MaasMaas
Maas
 
MaaS
MaaSMaaS
MaaS
 
Core pmo services
Core pmo servicesCore pmo services
Core pmo services
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Eu 2016 114 - 8
Eu 2016 114 - 8Eu 2016 114 - 8
Eu 2016 114 - 8
 
MaaS sota
MaaS sotaMaaS sota
MaaS sota
 
Costing
CostingCosting
Costing
 
Portfolio,2square
Portfolio,2squarePortfolio,2square
Portfolio,2square
 
PMO, 2square
PMO, 2squarePMO, 2square
PMO, 2square
 
Project Management Flight stimulator 1.0
Project Management Flight stimulator 1.0Project Management Flight stimulator 1.0
Project Management Flight stimulator 1.0
 
Project planning logic, how to optimise your schedule
Project planning logic, how to optimise your scheduleProject planning logic, how to optimise your schedule
Project planning logic, how to optimise your schedule
 
Set up pm reporting & tracking tool
Set up pm reporting & tracking toolSet up pm reporting & tracking tool
Set up pm reporting & tracking tool
 
PMO as a service
PMO as a servicePMO as a service
PMO as a service
 
Graphical project reporting-v1-0
Graphical project reporting-v1-0Graphical project reporting-v1-0
Graphical project reporting-v1-0
 
Project management dynamics
Project management dynamicsProject management dynamics
Project management dynamics
 

Recently uploaded

Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

Blockchain private permissioned

  • 1. BVBA 03-23-05Juni 2011 page 1 • TSDT TSDT-Trusted secure digital trans-actioning (blockchain private) Presented by Jan Biets
  • 2. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 2 • TSDT “Forview” introduction – Introduction: why do we need a trustworthy system? – Overview of TSDT, the elements; – Compliant with international standards – Typical situation • Business cases to apply ‘secure trans-actioning’
  • 3. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 3 • TSDT Intro • The author adherents: – in general ‘closed environment’, also known as “permissioned blockchain”, and ‘private blockchain”, trust authority, or company network, and other ‘membership’ or ‘society’ -based environments, with very strong identification, access and authorisation management – In general ‘non-repudiation’ is definitely not easy to constitute in a contemporary world. Trustworthy partners (authorities) are required to establish a reliable (read: ’trustworthy’) and generally accepted business trans-actioning system; Admittance: face-2-face identification, class 3, 4 or even 5
  • 4. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA NON-REPUDIATION irrefutable unwiderlegbar ONWEERLEGBAAR neizpodbitno Non-repudio necessarie kieltämätĂśn 反駁できない 确凿 अखंडनीय неопровержимый irrefutĂĄvel inconfutabile ‫قابل‬‫انکار‬‫نیست‬ obestridliga nepobitan uigendrivelige ‫ל‬ ַ‫בא‬ ַ‫פייטא‬ ַ‫ירא‬ Why ?
  • 5. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA NON-REPUDIATION TSA TTP XADES-XL C A LTANS SSCD PKI RA PROCESS POLICY CRL OCSP XADES-A OID HSM European LAW ERS VAS XML TA A ETSITS102023 ETSITS101903 IAM TSDT How?
  • 6. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 6 • TSDT TSA E-SIGN CA - PKI ERS Management LAW Policy Security Business Process User interface components IAM
  • 7. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 7 • TSDT TSDT operations other modules documentedmanaged law & standards constellation
  • 8. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 8 • TSDT TSDT - other elements • Business Case – Why, what, how (justification) • Risk assessment – What are the risks “what if not” • Business Process Flow – Define the streams of the document flows • DMS – Choice ‘commercial’ product, or open source – User interface (GUI) Abbreviations: DMS - Document Management System, GUI – Graphic User Interface
  • 9. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 9 • TSDT TSDT - pre requisites • CA – PKI and RA: strong identification and access management • Xades XL, electronic signature – ETSI TS 101 903 XML advanced electronic signatures – ETSI TS 101 703 Electronic Signature Formats (CMS) – XAdES Long-Term Signature Format Profile v1.0 – Basic electronic signature (XAdES-BES) – Explicit policy based electronic signature (XAdES- EPES) – Electronic signature with Time (XAdES-T) – Electronic signature with Complete Validation Data Reference (XAdES-C) • TSA, timestamp authority – ETSI TS 101 861 Time stamping profile – ETSI TS 102 023 Policy requirements for time stamping authorities
  • 10. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA Applicable standards •IAM : identification and access management, by means of: – RA – registration authority, both based on , and full compliancy with ETSI TS 101 456 V1.4.1 (2006-01) – Technical Specification Electronic Signatures and Infrastructures (ESI); – Policy requirements for certification authorities issuing qualified certificates, and – ETSI_TS_101 862_Qualified_certificate_profile – Policy based on ETSI TS 101 456
  • 11. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA Applicable standards • Electronic signature: – To enable the use of digital signature, the programme decided to realise Xades XL signature (ETSI TS 101 903 V1.3.2 (2006-03) – Technical Specification XML Advanced Electronic Signatures (XAdES) – ETSI_es_201733v010103_Electronic Signature Formats – ETSI_sr_002176v010101_Algorithms and Parameters for Secure Electronic Signatures
  • 12. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA Applicable standards • TSA (timestamp authority) based on ETSI TS 102 023 V1.2.1 (2003-01) • Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for time-stamping authorities, and • ETSI_ts_101861v010301_time_stamping_profile
  • 13. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 13 • TSDT Xades, electronic signature process flow Electronic document Creation (Pdf) DocSign Signature PIN code TimeStamp Public Key Verification OCSP Verification INPUT Electronic document Creation (Pdf) + Timestamp profile OUTPUT 0 1 2 3 4 5 6 7 8 9 E-sign
  • 14. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 14 • TSDT TSA – timestamp , process flow Request Time stamp Verify validity certificate logging Verify validity > 1 < second logging Set Time stamp TimeStamp According ETSI TS 102 023 System audit process
  • 15. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 15 • TSDT TSDT - approach • creating a system to enable the TSDT service : – policy, – processes, – procedures, • procedures (or protocols) contain the 'what', the 'how', the 'where', and the 'when'. – security, – infrastructure/architectural design and – audit • Verify: systems, documents, and operations Abbreviations: CA - Certification Authority , PKI - Private Key Infrastructure, RA - Registration Authority TSA - Timestamp Authority
  • 16. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 16 • TSDT TSDT - IAM • Minimal requirement! • Class 3 Certificate: This certificate will be issued to individuals as well as organizations. As these are high assurance certificates, primarily intended for e-commerce applications, they shall be issued to individuals only on their personal (physical) appearance before the Certifying Authorities. Abbreviations: CA - Certification Authority , RA - Registration Authority
  • 17. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 17 • Fedisa Certificate classification (Verisign) • VeriSign uses the concept of classes of digital certificates – Class 1 for individuals, intended for email. – Class 2 for organizations, for which proof of identity is required. – Class 3 for servers and software signing, for which independent verification and checking of identity and authority is done by the issuing certificate authority. – Class 4 for online business transactions between companies. – Class 5 for private organizations or governmental security. https://www.verisign.com/support/roots.html
  • 18. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 18 • TSDT TSDT - Policy A policy is typically described as a principle or set of rules to guide decisions and achieve rational outcome(s). Where as a policy will contain the 'what' and the 'why', Typical topics: •Purpose •Policy administration •Obligations and liability •Organisation’s digital archive preservation policy •Records to be deposited •Time of deposit (retention) •Data integrity, and access continuity assurances •Data integrity – system •Accepted formats •Infrastructure
  • 19. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 19 • TSDT TSDT – security shells (barriers, tiers) Policy Security PolicyHR Trusted Archival Authority Physical Security Building Security Policy Security Application security Server room Organisation&managementPolicy System Security Authorisation & authentification Network Security User interface Security procedures people
  • 20. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 20 • TSDT TSDT – basic functionalities and features • Depose documents • User management • Access control • Document life cycle management (retention policy) • Audit trail (event logging) • Proof of document integrity • Web access (intranet, internet) • Document management system (user interface),
  • 21. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 21 • TSDT TSDT – basic functionalities: audit trail (logging of events) • System: – Authorisation matrix – Change file detection – Log file is encrypted – Secure logging – Operator alerts – System alarms – System modifications have to be done by ‘system administrator’ + logging (+ documented) Based on results of risk assessment 1/2 Remark: CWA 14167-1. Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures
  • 22. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 22 • TSDT TSDT – basic functionalities: audit trail (logging of events) • Procedures – 4-eyes in case system operations / modifications – Administrator access management by means of smart card and certificate • Dashboard (events) – Authorisation matrix – Configuration user management , access management modifications – Who has, when , what document deposed, modified, consulted, changed, deleted, shared? Based on results of risk assessment 2/2
  • 23. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 23 • TSDT TSDT – basic functionalities: user management • Authority assigns access rights to users • User management data (access rights) information exchange via Certificate smart card, and authentic source; – Roles: • Authority • Employee • System administrator (local office/authority) – Responsibilities: • Depose • Copy • Share • Delete • View • Annotate • (other actions)
  • 24. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 24 • TSDT TSDT – basic functionalities: proof of integrity • System generates ‘ERS’ per document, to proof long term evidence (non-repudiation / undeniable ) • Kind of ‘fingerprint’ – Timestamp – Electronic signature – Certificate (status) – Root chain certificate – Hashing (verification / proof of ‘un-changed’ status of content • System regenerates periodically ERS (based on certificate life cycle) Abbreviations: ERS – Evidence record syntax
  • 25. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 25 • TSDT TSDT – attributes of a trans-actioned document Archived Object Object META-DATA Digital Signature (optional) Complementary data Archive meta-data Evidence record Object’s conservationattributes
  • 26. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 26 • TSDT TSDT – Overview of trans-actioned features Archived Object Object META-DATA Digital Signature (optional) Complementary data Archive meta-data Evidence record Object’s conservationattributes Transactioning object Could be any electronic file / data. Object meta-data Author, category, size, version, date, key-word Digital Signature Relevance is depending on legal requirements. it is mandatory to proof the legal ‘serieux’ of the users
  • 27. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 27 • TSDT TSDT – ERS, evidence record syntax Archived Object Object META-DATA Digital Signature (optional) Complementary data Archive meta-data Evidence record Object’s conservationattributes Overview of ERS Complementary data •Digital certificate •Certificate chain •Certificate revokation list meta-data •Document owner •Trans-actioning time •Origin of document Evidence record •Document finger print •Timestamp •Hash link
  • 28. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 28 • TSDT TSDT – basic architectural design ERS engine Hardware & Storage Policy & Procedures Security & Legal User client Web Service DMS – user interface TSA
  • 29. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 29 • TSDT TSDT – functional architectural design IAM CA TSA DMS ERS i-Sign HW Event logging (audit trail) storage SA* Abbreviations: IAM – identity & access management CA – Certification authority (RA – registration authority) SA – “source authentic” ERS – Evidence record syntax
  • 30. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 30 • TSDT TSDT – process design TAA & ERS ERS
  • 31. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA TSDT – how it could work (a suggested scenario or use case) page 31 • TSDT
  • 32. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 32 • Fedisa TAA - pre requisites : TSA Abbreviations: TSA - Timestamp Authority , ETSI TS 102 023
  • 33. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 33 • TSDT TSDT – architectural design S1 S2 S3 S4 Abbreviations: LTAP – long term archival protocol ERS – Evidence record syntax
  • 34. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 34 • TSDT Afterwords, attention items • Business case, justification • Risk analysis, threat , vulnerability, security • Legal: sometimes constraints: only one copy as the original ! or not allowed to store abroad (difficult to verify on internet!) • Select technology; • Business process flow; • Usability , user friendly GUI; • Success , succès.
  • 35. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 35 • TSDT Afterwords : points of attention during conceptual design • Recoverability and Data Integrity • Architecture / Design to achieve required availability • Reliability • Manageability • Backup and Recovery • Performance • Scalability [Not every application supports more transactions or more users when adding CPU and Memory] • Installation Requirements • Configuration Requirements • Maintainability Requirements • Localisation / Internationalisation Requirements & constraints • Operations-, Support- and Troubleshooting Requirements • Documentation Requirements • Monitoring: Application Level Monitoring must be explicitly requested, otherwise you just get system- and database monitoring. • Archiving and Restoring
  • 36. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 36 • TSDT TSDT – some other fields of application 1. Liberal professions, have in some case long term - legal- responsibilities, i.e. – Lawyers – architects : a 10 year professional responsibility for building plans – accountants : also responsible for VAT declarations – auditor/revisor (head of accountants): signing of fiscal year documents/statements 2. Log files – log files (systems, applications,...) should not be changed, only by dedicated staff (i.e. chief security officer), and applicable policy, or local laws 3. Banks, insurance companies; stock exchange – approval of credits and loans: who has done what in accordance of the mandate – timeline and sequence (order) of the performed transactions (using time-stamping) 4. Medical statements and medicines prescription – patients' medical records in electronic form
  • 37. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 37 • TSDT TSDT – basic functionalities: proof of integrity 5. Justice (ministry) – defined and traceable work streams – from police statement to lawyers and judges, and classification of files: every ‘role’ has added, viewed, changed documents. – Files can not be changed by un-authorised people, nor been lost, with dramtic legal consequences 6. Patenting (every country has a patent office; patent is public information) – to be able to prove who was first to come up with an idea or to patent a document, drawing, design, music score, research results,... – Escrow 7. IPP (intellectual property protection) – research companies have a legal trace of the progress of the search for a new product – this can/could be private information (un-disclosed for third parties)
  • 38. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 38 • TSDT TSDT – basic functionalities: proof of integrity 8. Registered mail – electronic mail with proof of content, 'addressee", time , and acceptance 9 . Closed environments – tax governments, pension authority, banks, insurances, stock exchange (logging of transactions),.... 10. Accounting services companies – storage of accounting companies customers' documents in electronic format– outsourced electronic archiving (is implemented in some Eastern European countries) 11. Apostilles: – It specifies the modalities through which a document issued in one of the signatory countries can be certified for legal purposes in all the other signatory states. Such a certification is called an apostille (French: certification). It is an international certification comparable to a notarisation in domestic law. 12. Invoices: – Electronic invoices archival, helpdesks, customer’s service , legal purposes.
  • 39. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 39 • Fedisa The EU Directive 1999/93/EC on a Community framework for electronic signatures : Profiles XAdES defines six profiles (forms) differing in protection level offered. Each profile includes and extends the previous one: XAdES, basic form just satisfying Directive legal requirements for advanced signature; XAdES-T (timestamp), adding timestamp field to protect against repudiation; XAdES-C (complete), adding references to verification data (certificates and revocation lists) to the signed documents to allow off-line verification and verification in future (but does not store the actual data); XAdES-X (extended), adding timestamps on the references introduced by XAdES-C to protect against possible compromise of certificates in chain in future; XAdES-X-L (extended long-term), adding actual certificates and revocation lists to the signed document to allow verification in future even if their original source is not available; XAdES-A (archival), adding possibility for periodical timestamping (e.g. each year) of the archived document to prevent compromise caused by weakening signature during long-time storage period.
  • 40. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 40 • TSDT Xades, electronic signature composition The XAdES-T envelope: contains a trusted timestamp over the signature. The goal is to prove that the signer’s certificate was valid at the time of signature. The XAdES-X envelope: “When an OCSP response is used, it is necessary to time-stamp in particular that response in the case the key from the responder would be compromised” In other words, the goal is to prove that the OCSP responder’s signing certificate was valid at the time of OCSP response. “The SignatureTimeStamp encapsulates the time-stamp over the SignatureValue element.” XADES : XML Advanced Electronic Signatures Specification from the ETSI that is built upon the Xmldsig specification. It provides “signatures that remain valid over long periods. XAdES-X-L XAdES-X XAdES-C XAdES-T XAdES-EPES OCSP Timestamp Certificates Chain Timestamp XAdES - a Timestamp
  • 41. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 41 • TSDT Xades, electronic signature composition
  • 42. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 42 • TSDT “Xades – A”, electronic signature composition • Signed Signature Properties • Signing Time (non-authoritative: may be from signer’s computer) •Signature Certificate •Signature Policy Identifier •Signature Production Place (optional) •Signer Role (optional) •Signed Data Properties •Data Object Format * •Commitment Type Indication * •All Data Objects Time Stamp * •Individual Data Objects Time Stamp * •Unsigned Signature Properties •Counter Signature * •Signature Timestamp+ •Complete Certificate Refs •Complete Revocation Refs •Refs Only Time Stamp - or – Sig and Refs Time Stamp •Certificate Values •Revocation Values •Archive Time Stamp +
  • 43. BLOCKCHAIN, Private & Permissioned Juni 2011 BVBA page 43 • TSDT Contact Jan_biets@hotmail.com - 0477 32 90 11