STORK is a large scale pilot in the ICT-PSP (ICT Policy Support Programme), under the CIP (Competitiveness and Innovation Programme), and co-funded by EU. It aims at implementing an EU wide interoperable system for recognition of eID and authentication that will enable businesses, citizens and government employees to use their national electronic identities in any Member State. It will also pilot transborder eGovernment identity services and learn from practice on how to roll out such services, and to experience what benefits and challenges an EU wide interoperability system for recognition of eID will bring.
The STORK consortium would like to announce that the approved STORK deliverables have now been released for public view and uploaded to the STORK website under the STORK Materials section.
Cwa4 Emerging Network Infrastructure Of E Invoice SpDanny Gaethofs
The CEN/ eInvoicing 2 Workshop presents the following draft CWAs for public review
- CWA2c-Monitoring_legal_requirements_for_cross_border_e-Invoicing.pdf
- CWA1 Adoption programme for increased eInvoicing in European business processes
- CWA2a e-Invoicing Compliance Guidelines Commentary
- CWA2b e-Invoicing Compliance Guidelines_v0.90-b
- CWA3 Assessing new business processes and technologies for eInvoicing
- CWA4 Emerging network infrastructure of eInvoice service providers throughout Europe
Comments have to be written down in the attached template and to be sent to the Secretary by 20 August 2009 at the latest.
More information on : http://www.cen.eu/cenorm/sectors/sectors/isss/activity/einvoicing_2.asp
Please forward this message to any interested party.
Comments can also be posted on ebusiness knowledge village
on Slideshare
http://www.slideshare.net/group/electronic-business-knowledge-village
on linkedin
http://www.linkedin.com/groups?gid=1106767
This document provides an overview of the EEI Platform activities and instruments to be executed in 2010. This document is publicly available for any organization interested in and involved in electronic billing (e-billing), e-invoicing (e-invoicing), automated invoice processing and credit management in all its aspects.
This version provides an overview of eligible activities and instruments in 2010 on January 20, 2010. New developments in activities and instruments will lead to a modified version of the activity plan during the remaining of 2010.
The purpose of this document, its activities and instruments is to achieve the objectives determined by the EEI Platform. It is intended to effectively realise the proposed activities and instruments as much as possible, in tune with the participants of the EEI Platform and also in tune with other partners and stakeholders in the field of e-billing, e-invoicing and automated invoice processing.
The first section of this document primarily addresses the mission and positioning of the EEI Platform towards e-invoicing and invoice automation. This section also discusses the differentiation of the activities and instruments into four segments. Section 3 provides an extensive explanation of these segments.
Section 2 deals -in alphabetical order- with the activities and instruments that are scheduled to be executed using the 'SMART’ method. Therefore, the section starts with an explanation of the 'SMART' Framework.
This deliverable presents all the dissemination and communication material produced by the ANDROMEDA consortium within the second period of the project, i.e. September 2020 – July 2021. Particularly, it outlines the material created for the promotion of the first workshop (Sept. 2020) as well as the final one (Jun. 2021) of ANDROMEDA. Also, other materials created within the aforementioned period are described. It should be noted that the material produced within the first period of the project has been reported in deliverable D7.2 Initial Dissemination Materials.
D.7.3 is a public deliverable of this project, part of WP7 and additionally includes information about the project and a short description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Lastly, it should be mentioned that the project has received a six-month extension of its lifecycle due to the COVID-19 impact on project’s activities and thus the submission date of this deliverable has been altered from M15 (Nov. 2020) as it was foreseen in DoA to M23 (Jul. 2021).
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
Goal: SAFEPOWER has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 687902.
SAFEPOWER’s goal is to enable the development of low power mixed-criticality systems through the provision of a reference architecture, platforms and tools to facilitate the development, testing, and validation of these kinds of systems according to the market needs
It is expected that the SAFEPOWER reference architecture and platforms will enable the integration and partitioning of mixed-criticality applications on a single device while reducing the total power consumption by 50%, compared to the non-integrated multi-chip implementation. To address this goal, SAFEPOWER needs to address a number of technology development challenges, that will afterwards be applied to the main project outputs, namely the SAFEPOWER low power reference architecture, the platforms and tools for the development, testing, and validation of low power mixed criticality systems.
PROJECT PARTNER(S):IKERLAN, S. Coop.CAF Signalling, S.L.fent Innovative Software SolutionsImperas Software Ltd.Kungliga Tekniska Högskolan (Royal Institute of Technology)SAAB ABUniversität Siegen
Methods: Railway Engineering, Energy Efficiency, Multi-Core Systems, Safety-Critical Systems, Industrial Safety, Avionics, MPSOCs, NoC, Fault Tolerance, Scheduling Theory, Power Management, Dependable Systems, MIXED CRITICALITY, predictable architectures and communication, Low Power Techniques, ENERGY MINIMIZATION TECHNIQUES, Energy and Power efficiency, Low power multicore embedded systems, Fault Isolation, hypervisor
Social media links:
a.Twitter : https://twitter.com/SAFEPOWER_H2020
b.Linkdin : https://www.linkedin.com/groups/7045467
d. Website : http://safepower-project.eu/
d.ResearchGate : https://www.researchgate.net/project/SAFEPOWER
The current deliverable reports the activities performed within Task 7.2 “Workshops Coordination” towards the organization of the second ANDROMEDA workshop that was held virtually on the 23rd June 2021. In conjunction with the workshop the consortium also organized online the Demonstration Event, the day after. These activities include the creation of both events’ programme (Agenda), the invitations sent to potential attendees, the digital promotional material created, the creation of the registration link and the information sheet for participation and data processing, the announcements made via the project’s website and social media for raising their visibility. Nevertheless, the core part of this document is dedicated in presenting the topics elaborated by the speakers, the discussions made and the results produced from both events.
Lastly, it should be noted that the ANDROMEDA project team decided to organize these events virtually as the vaccination programme across EU member states was under deployment and the risk for spreading the COVID-19 virus to partners, speakers and attendees was still valid.
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
We present to you the E-invoicing Yearbook 2017 - Q1. It shows the relevant content on e-invoicing, AP automation, e-procurement and compliance, published by us and our sponsors during the first quarter of 2017.
Our daily search for content regarding e-invoicing, AP automation and e-procurement lead to over 2,000 posts, published the past eight years.
On average, the E-invoicing Platform publishes ten posts per week. These posts are both user generated content from our sponsors, as well as content from other valuable sources.
This content is also published on Twitter, on LinkedIN and on Google (News). And every other week, the posts get extra attention via our newsletter, with currently over 8,900 recipients in 100+ countries.
As each post is interesting and newsworthy by itself, this is increased when we sort these posts in the sections underneath:
- Featured providers
- Opinions
- Mandatory and compliant e-invoicing:
- Interoperability and standardisation (in Europe):
- Case studies
- News in general
- Downloads, infographics and more
- Beyond e-invoicing: innovative and new services -
- Acquisitions, mergers and funding
- Around the globe
After each quarter of the year ends the E-invoicing Yearbook will be updated, building a picture of how the world of e-invoicing is progressing.
Publications 2017, Title only
Cwa4 Emerging Network Infrastructure Of E Invoice SpDanny Gaethofs
The CEN/ eInvoicing 2 Workshop presents the following draft CWAs for public review
- CWA2c-Monitoring_legal_requirements_for_cross_border_e-Invoicing.pdf
- CWA1 Adoption programme for increased eInvoicing in European business processes
- CWA2a e-Invoicing Compliance Guidelines Commentary
- CWA2b e-Invoicing Compliance Guidelines_v0.90-b
- CWA3 Assessing new business processes and technologies for eInvoicing
- CWA4 Emerging network infrastructure of eInvoice service providers throughout Europe
Comments have to be written down in the attached template and to be sent to the Secretary by 20 August 2009 at the latest.
More information on : http://www.cen.eu/cenorm/sectors/sectors/isss/activity/einvoicing_2.asp
Please forward this message to any interested party.
Comments can also be posted on ebusiness knowledge village
on Slideshare
http://www.slideshare.net/group/electronic-business-knowledge-village
on linkedin
http://www.linkedin.com/groups?gid=1106767
This document provides an overview of the EEI Platform activities and instruments to be executed in 2010. This document is publicly available for any organization interested in and involved in electronic billing (e-billing), e-invoicing (e-invoicing), automated invoice processing and credit management in all its aspects.
This version provides an overview of eligible activities and instruments in 2010 on January 20, 2010. New developments in activities and instruments will lead to a modified version of the activity plan during the remaining of 2010.
The purpose of this document, its activities and instruments is to achieve the objectives determined by the EEI Platform. It is intended to effectively realise the proposed activities and instruments as much as possible, in tune with the participants of the EEI Platform and also in tune with other partners and stakeholders in the field of e-billing, e-invoicing and automated invoice processing.
The first section of this document primarily addresses the mission and positioning of the EEI Platform towards e-invoicing and invoice automation. This section also discusses the differentiation of the activities and instruments into four segments. Section 3 provides an extensive explanation of these segments.
Section 2 deals -in alphabetical order- with the activities and instruments that are scheduled to be executed using the 'SMART’ method. Therefore, the section starts with an explanation of the 'SMART' Framework.
This deliverable presents all the dissemination and communication material produced by the ANDROMEDA consortium within the second period of the project, i.e. September 2020 – July 2021. Particularly, it outlines the material created for the promotion of the first workshop (Sept. 2020) as well as the final one (Jun. 2021) of ANDROMEDA. Also, other materials created within the aforementioned period are described. It should be noted that the material produced within the first period of the project has been reported in deliverable D7.2 Initial Dissemination Materials.
D.7.3 is a public deliverable of this project, part of WP7 and additionally includes information about the project and a short description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Lastly, it should be mentioned that the project has received a six-month extension of its lifecycle due to the COVID-19 impact on project’s activities and thus the submission date of this deliverable has been altered from M15 (Nov. 2020) as it was foreseen in DoA to M23 (Jul. 2021).
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
Goal: SAFEPOWER has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 687902.
SAFEPOWER’s goal is to enable the development of low power mixed-criticality systems through the provision of a reference architecture, platforms and tools to facilitate the development, testing, and validation of these kinds of systems according to the market needs
It is expected that the SAFEPOWER reference architecture and platforms will enable the integration and partitioning of mixed-criticality applications on a single device while reducing the total power consumption by 50%, compared to the non-integrated multi-chip implementation. To address this goal, SAFEPOWER needs to address a number of technology development challenges, that will afterwards be applied to the main project outputs, namely the SAFEPOWER low power reference architecture, the platforms and tools for the development, testing, and validation of low power mixed criticality systems.
PROJECT PARTNER(S):IKERLAN, S. Coop.CAF Signalling, S.L.fent Innovative Software SolutionsImperas Software Ltd.Kungliga Tekniska Högskolan (Royal Institute of Technology)SAAB ABUniversität Siegen
Methods: Railway Engineering, Energy Efficiency, Multi-Core Systems, Safety-Critical Systems, Industrial Safety, Avionics, MPSOCs, NoC, Fault Tolerance, Scheduling Theory, Power Management, Dependable Systems, MIXED CRITICALITY, predictable architectures and communication, Low Power Techniques, ENERGY MINIMIZATION TECHNIQUES, Energy and Power efficiency, Low power multicore embedded systems, Fault Isolation, hypervisor
Social media links:
a.Twitter : https://twitter.com/SAFEPOWER_H2020
b.Linkdin : https://www.linkedin.com/groups/7045467
d. Website : http://safepower-project.eu/
d.ResearchGate : https://www.researchgate.net/project/SAFEPOWER
The current deliverable reports the activities performed within Task 7.2 “Workshops Coordination” towards the organization of the second ANDROMEDA workshop that was held virtually on the 23rd June 2021. In conjunction with the workshop the consortium also organized online the Demonstration Event, the day after. These activities include the creation of both events’ programme (Agenda), the invitations sent to potential attendees, the digital promotional material created, the creation of the registration link and the information sheet for participation and data processing, the announcements made via the project’s website and social media for raising their visibility. Nevertheless, the core part of this document is dedicated in presenting the topics elaborated by the speakers, the discussions made and the results produced from both events.
Lastly, it should be noted that the ANDROMEDA project team decided to organize these events virtually as the vaccination programme across EU member states was under deployment and the risk for spreading the COVID-19 virus to partners, speakers and attendees was still valid.
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
We present to you the E-invoicing Yearbook 2017 - Q1. It shows the relevant content on e-invoicing, AP automation, e-procurement and compliance, published by us and our sponsors during the first quarter of 2017.
Our daily search for content regarding e-invoicing, AP automation and e-procurement lead to over 2,000 posts, published the past eight years.
On average, the E-invoicing Platform publishes ten posts per week. These posts are both user generated content from our sponsors, as well as content from other valuable sources.
This content is also published on Twitter, on LinkedIN and on Google (News). And every other week, the posts get extra attention via our newsletter, with currently over 8,900 recipients in 100+ countries.
As each post is interesting and newsworthy by itself, this is increased when we sort these posts in the sections underneath:
- Featured providers
- Opinions
- Mandatory and compliant e-invoicing:
- Interoperability and standardisation (in Europe):
- Case studies
- News in general
- Downloads, infographics and more
- Beyond e-invoicing: innovative and new services -
- Acquisitions, mergers and funding
- Around the globe
After each quarter of the year ends the E-invoicing Yearbook will be updated, building a picture of how the world of e-invoicing is progressing.
Publications 2017, Title only
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Stork Deliverable D7.3 List Of Commission A2 A Services Of Common Interest
1. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME
ICT Policy Support Programme (ICT PSP)
Towards pan-European recognition of electronic identities (eIDs)
ICT PSP call identifier: ICT-PSP/2007/1
ICT PSP Theme/objective identifier: 1.2
Project acronym: STORK
Project full title: Secure Identity Across Borders Linked
Grant agreement no.: 224993
List of Commission A2A Services of Common Interest
Deliverable Id : D7.3
Deliverable Name : List of Commission A2A Services of Common Interest
Status : FINAL
Dissemination Level :
Due date of deliverable : M6
Actual submission date :
Work Package : 7.1
Organisation name of lead contractor for
AT BKA
this deliverable :
Author(s): Hubert Schier
Partner(s) contributing :
Abstract: This document aims to identify a way how to incorporate the findings of STORK into the A2A
services operated by the European Commission. Several of these services of common interest are described by
way of example, and special attention is devoted to the European Commission Authentication System
(ECAS).
Project funded by the European Community under the ICT Policy Support Programme
Copyright by the STORK-eID Consortium
2. List of Commission A2A Services of Common Interest 19 11 2008
History
Version Date Modification reason Modified by
1.0 26.08.2008 initial draft HS
1.1 28.10.2008 updates in sections 2.1, 2.2, 2.3 and 2.5 HS
2.0 19.11.2008 new chapter 3 about ECAS HS
new chapter 4 Conclusions
STORK-eID Consortium Page 2 of 16
3. List of Commission A2A Services of Common Interest 19 11 2008
Table of contents
HISTORY .......................................................................................................................................... 2
TABLE OF CONTENTS .................................................................................................................. 3
EXECUTIVE SUMMARY ............................................................................................................... 4
1 INTRODUCTION .................................................................................................................... 5
1.1 SCOPE AND OBJECTIVES OF THE DELIVERABLE ................................................................. 5
1.2 METHODOLOGY ................................................................................................................. 6
1.3 REFERENCE TO RELATED WORK PACKAGES....................................................................... 6
2 COMMISSION A2A SERVICES OF COMMON INTEREST ........................................... 7
2.1 INTERNAL MARKET INFORMATION SYSTEM (IMI) ............................................................ 7
2.2 COMMUNICATION AND INFORMATION RESOURCE CENTRE FOR ADMINISTRATIONS,
BUSINESS AND CITIZENS (CIRCABC) ............................................................................................ 8
2.3 ELECTRONIC EXCHANGE OF SOCIAL SECURITY INFORMATION (EESSI) .......................... 8
2.4 DG SANCO REFERENCE DATABASE SYSTEM (SANREF) ................................................ 9
2.5 CONSUMER PROTECTION COOPERATION SYSTEM (CPCS)................................................ 9
2.6 LISFLOOD-ALERT ........................................................................................................ 11
2.7 EUROPEAN COMPETITION NETWORK - ELECTRONIC TRANSMISSION (ECN-ET) ............ 11
2.8 EUROPEAN DATABASE FOR MEDICAL DEVICES (EUDAMED) ....................................... 12
2.9 SECURE EXCHANGE AND STORAGE OF AGRICULTURAL DATA (SESAD) ....................... 12
3 THE EUROPEAN COMMISSION AUTHENTICATION SERVICE (ECAS) ............... 13
3.1 WHAT DOES IT DO? .......................................................................................................... 13
3.2 HOW DOES IT WORK? ....................................................................................................... 13
3.3 ACTORS INVOLVED .......................................................................................................... 14
4 CONCLUSIONS ..................................................................................................................... 15
REFERENCES ................................................................................................................................ 16
STORK-eID Consortium Page 3 of 16
4. List of Commission A2A Services of Common Interest 19 11 2008
Executive summary
This document aims to identify a way how to incorporate the findings of the EU co-funded
project STORK into the A2A services operated by the European Commission for itself and
for the Member States. Several of these services of common interest are described in the
following by way of example, and special attention is devoted to the European Commission
Authentication System (ECAS) in chapter 3, which could possibly be the starting point for
including electronic identities into the username/password solutions which are currently
still the commonly accepted access method for ICT systems.
STORK-eID Consortium Page 4 of 16
5. List of Commission A2A Services of Common Interest 19 11 2008
1 Introduction
1.1 Scope and objectives of the deliverable
The European Commission i2010 eGovernment Action Plan stated that eID solutions will
be key enablers of secure and seamless access to modern public services. Ensuring the
availability of an electronic identity management (eIDM) backbone across Europe will help
to serve the citizens and businesses in their interaction with governments.
The eID Large Scale Pilot STORK aims to develop not only a shared vision to align actors
in the field, but also pilot trans-border eGovernment identity services, as well as to learn
from practice on how to roll out such services, and to experience what benefits and
challenges an EU wide interoperability system for recognition of eID will bring.
The project will
• contribute to accelerate the deployment of eID for public services, while ensuring co-
ordination between national and EC initiatives in the field and support federated eID
management schemes across Europe
• test, in real life environments, secure and easy-to-use eID solutions for citizens and
business, in particular SMEs and government employees at relevant levels (local,
regional, cross/national level)
The scope of the deliverable at hand is defined in the Description of Work (DoW) as a sub-
task 7.1 of Work Package 7.
Applications of "common interest", i.e. in the interest of the European Commission as well
as of Member States, are first to be identified. This will be done in close cooperation with
Commission Services. Next, common specifications will be derived by the WP participants
(deliverable 7.4). Implementation will be carried out by the Commission Services and is not
funded under the STORK project. Finally, a report on the implementation process will be
produced (deliverable 7.5).
In detail: in contrast to citizen-oriented communication, this deliverable does not only
involve subgroups of the MS participating in the Pilot and the specific applications run by
them; instead it concerns the profits to the EU27 as a whole, since these applications are
operated by the Commission – or other European Institutions – for all MS alike. eID is
offered as an additional feature for enhanced security.
The European Commission provides various A2A services with restricted access rights.
Currently, these are often handled by a rather insecure system using e-mails, usernames and
PIN/passwords. With the Service Directive in particular, Europe is facing a major eID
challenge. A seamless identification of users, as well as of government officials, needs to be
in place. For this purpose, it is crucial that the common services are integrated and that they
use "European eID interoperability".
STORK-eID Consortium Page 5 of 16
6. List of Commission A2A Services of Common Interest 19 11 2008
1.2 Methodology
A first list was drafted using Section I of the IDABC Work Programme 2008 describing
projects of common interest and horizontal measures. This work programme is co-ordinated
and aligned with related Community programmes such as the CIP. Horizontal measures
develop the components of the infrastructure for cross-border service delivery while the
specifications for the overarching structure are being prepared. See in particular the
Common Identity Management Service (CIMS) described in chapter 3.2 of the document,
and the following chapter on eID interoperability.
IDABC projects and horizontal measures focus on the implementation of operational
services and infrastructures. They take into account, whenever appropriate, the results of
the innovative and exploratory projects and pilots and of the studies undertaken in the
related Community programmes.
Existing EC systems as well as projects in different stages of planning, implementation or
testing have been selected from reference [1] depending on whether they feature particular
needs for reliable authentication of users and/or contents. When considering these systems
from the user and service perspective, confidentiality (i.e. access control) and integrity (i.e.
risk of data alteration through unauthorised access) could be guaranteed by ensuring that
appropriate authentication (and possibly also authorisation) mechanism be put into place.
An interoperable authentication or identity management mechanism that could span across
different domains (national or EU Institutions) is clearly the target solution. Most of the
services listed below have already expressed their intention of using additional security
measures as described in the IDABC Work Programme.
This list of services does of course not pretend to be exhaustive, and can be complemented
at any time in the future. Suggestions have e.g. been made to include electronic travel
reimbursement and some other internal "housekeeping" systems, which doubtlessly are of
common interest and have a certain amount of authentication needs.
Reference [1] gives few information about the approximate number of real or potential
users for most systems, but names at least the units and the persons in charge, who have
been asked to comment on the document and to provide additional input. Regrettably, less
than 50% of the EC services concerned have replied to this request. A meeting which was
organised in Brussels to discuss the issue was attended by DG MARKT, DIGIT and EMPL.
1.3 Reference to related work packages
Since the objectives of Working Package 7 are to communicate and promote the
methodology and findings of STORK, it will in a way get input from the entire project, but
especially from WP5 (common specifications) as far as task 7.1 is concerned. The
subsequent deliverables have already been described above.
STORK-eID Consortium Page 6 of 16
7. List of Commission A2A Services of Common Interest 19 11 2008
2 Commission A2A Services of Common Interest
2.1 Internal Market Information System (IMI)
Objectives:
The fundamental objective of the Internal Market Information (IMI) system is to create the
conditions in which day-to-day administrative cooperation between Member States can take
place, by supplying a cross-border e-government application to support Internal Market
legislation. The system is an enabling mechanism. It will provide Member State
administrations with a multilingual, open and flexible tool with interfaces to other
European and national IT-applications and databases (where applicable) to support the
mutual assistance and information exchange required to implement Internal Market
legislation efficiently. The system shall be operated and maintained by the Commission.
IMI will overcome barriers to cooperation created by different administrative cultures,
structures and languages and will provide clearly identified partners and procedures.
European citizens and businesses will be able to rely on a fast and constructive response by
administrations to help cross-border activities and enable them to take advantage of Internal
Market opportunities.
The responsibility for implementing and ensuring compliance with the legislation, in
practice, lies with a large number of public authorities in the 27 Member States. These
authorities must be in a position to cooperate closely. However, different administrative
cultures, structures and languages as well as a lack of agreed procedures and clearly
identified partners are significant barriers to Member States working efficiently together.
A Competent Authorities database will be built up gradually, beginning with those
authorities who will use IMI to exchange information according to their obligations under
the revised Professional Qualifications Directive. A beta version of IMI is intended to pilot
with 4 professions (accountants, doctors, pharmacists and physiotherapists). In following
phases IMI will be further enhanced to support the specific requirements of the Services
Directive.
Service in charge: MARKT.E.3
Associated service: DIGIT, DGT
Responsible action manager: LEAPMAN Nicholas
Committee/group of experts: Internal Market Advisory Committee (IMAC)
User group: Member States competent authorities for Services and Professional
Qualification Directive; currently around 400, up to 100.000 potential authorities when
fully operational
Current authentication methods: username / password / 12-digit pincode
STORK-eID Consortium Page 7 of 16
8. List of Commission A2A Services of Common Interest 19 11 2008
2.2 Communication and Information Resource Centre for Administrations,
Business and Citizens (CIRCABC)
Objectives:
Continuation of project CIRCA, which provided information pages, documents repository,
search and retrieval, directory and access management, meetings organisation and
newsgroups/discussion fora.
The existing user community is very large and the service is considered as critical by many
committees and workgroups. In 2007, over 17.000 users participated to around 1.150 active
Interest Groups with an average number of 9.000 users connecting every week.
Hosting and supporting a service which improves collaboration between committees and
working groups involved in projects of European Union Institutions and Member State
administrations at pan-European level, the new system will also improve interactivity
between administrations and citizens as well as interactions between businesses and
citizens. Multilingual aspects and security features are currently added.
Service in charge: DIGIT.A.3.EGIS
Associated service: ESTAT, MARKT, OPOCE
Responsible action manager: WEISSENBERGER Jean-Marie
Committee/group of experts:
Pan-European eGovernment Services Committee (PEGSCO)
User group: Yearly stakeholders conference; internal Steering + Technical Committee
Current authentication methods: ECAS (EC Common Authentication Service) which
enables Web applications to authenticate centrally. It offers also single sign-on between
applications using it. It includes CAS software developed by Yale University.
2.3 Electronic Exchange of Social Security Information (EESSI)
Objectives:
The social security coordination rules are applied and put into practice through exchange of
information between social security institutions of the Member States and the EFTA states.
This means that, in order to guarantee appropriate and correct protection of the social
security rights of citizens who are mobile, there is a permanent, regular and complex flow
of information between thousands of social security institutions in the Member States,
comprising mainly information on validity of rights, insurance history, competent social
security institutions, identification of the citizen and payment of benefits and contributions.
As a matter of fact, the bulk of these exchanges is still done by sending paper forms in 22
different language versions. IT-based exchanges would permit and lead to:
• improved knowledge on the quality and reliability of the data
• increased use of the data
• multiple usage of the data
• efficient verification of the data
• faster processing
• more flexible and easier interface between different systems
STORK-eID Consortium Page 8 of 16
9. List of Commission A2A Services of Common Interest 19 11 2008
Data protection and privacy aspects are of course of major importance in this context.
Service in charge: EMPL.E.3
Responsible action manager: RAI Shahida
Committee/group of experts:
the Administrative Commission for social security for migrant workers, and in particular
the Technical Commission on Data Processing
User group: social security clerks in national administrations
Current authentication methods: to be determined (call for tender for the system has
been launched this year)
2.4 DG SANCO Reference Database System (SANREF)
Objectives:
Within the area of Food Safety, most networks have the need to contain and maintain
reference information. This has lead to the situation where many networks contain and
exchange the same type of information but in a different format or structure, which doesn’t
allow for easy creation of global reports or lateral cross-checking across systems. In
addition, it forces most projects to re-invent a reference data model and to develop a user
interface to maintain such information, which is inefficient.
The new Feed and Food control regulation establishes the need to have a correct cross-
checking option of reference information across the Food Safety policy area. SANREF will
store and provide interfaces to Food Safety reference information. Existing and new
networks will be able to use the interfaces within their applications. This includes:
• Member States administrations
• Member States authorities
• Member States institutional structures
• Economic Operators within Member States having a relationship with the Commission
• Members of the public having interaction with the Commission
• Other relevant organisations
Service in charge: SANCO.A.4
Responsible action manager: BRAND Herman
Committee/group of experts:
Standing Committee on the Food Chain and Animal Health (SCFCAH) - IT working group
User group: information not provided
Current authentication methods: information not provided
2.5 Consumer Protection Cooperation System (CPCS)
Objectives:
A recent Regulation enables the competent national authorities to cooperate in detecting,
investigating and stopping, if necessary through the courts, businesses that break the laws
protecting the economic interests of consumers. Each of the authorities involved will be
STORK-eID Consortium Page 9 of 16
10. List of Commission A2A Services of Common Interest 19 11 2008
able to call on other members of the network for assistance in investigating possible
breaches of consumer laws, and take action against rogue traders.
The three main objectives of the CPCS are:
• to act as a secure central repository of information, to be accessed by the competent
authorities
• to act as a secure communication system between the authorities
• to include remaining functionalities that are necessary to allow for a proper execution of
the actions defined in the Regulation and satisfy specific authorities needs
In order to adapt the application to be completely in line with the data protection regulatory
framework, additional implementation work will have to be done.
Service in charge: SANCO.B.5
Responsible action manager: JANSCHEK Maria Luisa
Committee/group of experts:
Consumer Protection Cooperation Committee
User group:
There are mainly two types of users:
• Case handlers in the Competent Authorities designated by the Member States as being
responsible for the application of at least one of the Legal Acts listed in the Consumer
Protection Cooperation Regulation (EC) 2006/2004
• Officials working in the Single Liaison Offices, i.e. the authority responsible for the
coordination of the application of Regulation (EC) 2006/2004 in a given Member State
In addition to the above, the Commission has a restricted access (consultation only) to some
of the information exchanged between authorities.
Current authentication methods:
The CPCS is only accessible to authorities through the sTESTA network. No access from
the internet is allowed.
Access is only granted to the public enforcement authorities formally designated by the
Member States and to nominative users (i.e. 'competent officials' pursuant to article 3 of
Regulation 2006/2004). Password rules are: initial password is given to user and must be
changed with first login. Strong password form is used.
CPCS uses the SANCO-wide authentication and authorisation system (SAAS-SANCAS).
SAAS-SANCAS is ECAS-compliant and is designed to evolve toward the use of electronic
certificates for authentication. It could probably serve as a service in the context of the use
of eID infrastructure.
Particular care should be given to real usable systems, while the older attempts to such
projects collapsed because the internal Commission services (namely ADMIN-DS and
DIGIT) were not involved early enough in the project, thus no platform could be deployed
or management of the Ids organised.
STORK-eID Consortium Page 10 of 16
11. List of Commission A2A Services of Common Interest 19 11 2008
2.6 LISFLOOD-ALERT
Objectives:
This is a harmonised on-line information system, updated in real time, capable of providing
an early alert on potential floods to the relevant civil protection and water authorities in the
Member States, thus improving the ability to respond appropriately and in time.
The scope of the project is to create a data environment that allows flood forecasting with
larger lead times in large river basins, where downstream forecasts rely on the availability
of upstream river flows and observed and forecasted meteorological data.
Throughout Europe, this information is not or only scarcely available, and whatever is
available is scattered over more than 75 authorities. Therefore, the aim is to establish a
harmonised system for exchanging these real-time water level and river discharge data
between Member State administrations and the organisation running the European Flood
Alert System.
The potentially larger lead times will increase the preparedness of national and regional
water authorities and civil protection services. This increased preparedness and furthermore
increased warning time potentially reduces the number of flood victims and reduces a part
of the flood damage by timely evacuation.
Service in charge: JRC
Associated service: ENV.A.3
Responsible action manager: DE ROO Arie
Committee/group of experts:
Management and Regulatory Committee for Civil Protection (MRCCP)
User group: information not provided
Current authentication methods: information not provided
2.7 European Competition Network - Electronic Transmission (ECN-ET)
Objectives:
In the context of the competition rules, the Commission services have the duty to transmit
to the Member States documents which are relevant for the assessment of specific cases.
Due to the confidentiality of some documents, security is a fundamental point to be
managed in this system. The use of ECN-ET will be restricted to the competition
authorities involved.
Service in charge: COMP.R.3
Associated service: COMP.A.5, COMP, DIGIT
Responsible action manager: PEREZ ESPIN Manuel
Committee/group of experts: European Competition Network Committee
User group: information not provided
Current authentication methods: information not provided
STORK-eID Consortium Page 11 of 16
12. List of Commission A2A Services of Common Interest 19 11 2008
2.8 European Database for Medical Devices (EUDAMED)
Objectives:
The system is accessible to competent authorities to register manufacturers, medical
devices, certificates and incident reports, either manually or by uploading them from their
national databases. This creates the possibility for market surveillance and warning
capabilities. The medical devices sector will have access to products information and
vigilance reports, leading to increased protection of Public Health.
Service in charge: ENTR.F.3
Associated service: ENTR.R.3
Responsible action manager: information not provided
Committee/group of experts: Medical Devices Expert Group (MDEG)
User group: information not provided
Current authentication methods: information not provided
2.9 Secure Exchange and Storage of Agricultural Data (SESAD)
Objectives:
Data pertaining to agriculture circulates between the Member states and the DG AGRI on a
daily basis. Though this data itself is not "EU classified", there is a growing need to
ascertain that the data being sent is not tampered with and that the sending users are really
who they pretend to be.
As most of the financial data transfer between MS correspondents and the DG AGRI is
nowadays done using electronic means (electronic messages and/or submission of Web
forms), a high level of security and integrity must be guaranteed. This "securisation" of the
transferring will also allow DG AGRI to reduce the paper circulating between MS and the
Commission, by replacing an important number of paper reports by electronic data
submission.
Service in charge: AGRI.I.3, AGRI.I.4, AGRI.D.2
Responsible action manager: KOORNSTRA Timotheus
Committee/group of experts:
European Agricultural Guidance and Guarantee Fund Committee (EAGGF)
User group: information not provided
Current authentication methods: information not provided
STORK-eID Consortium Page 12 of 16
13. List of Commission A2A Services of Common Interest 19 11 2008
3 The European Commission Authentication Service (ECAS)
3.1 What does it do?
The purpose of ECAS is to provide a secure and common way for EC applications to
authenticate their users and to simultaneously provide a single sign-on (SSO) to all
applications that use it.
The service is available to any Commission system that needs to authenticate its users such
as information systems or infrastructure components, otherwise referred to as ECAS client
applications. ECAS clients are primarily web applications, but in the future, ECAS will
also be available for other technologies.
ECAS allows applications to authorize users even though it does not actually perform any
authorization, i.e. it does not determine whether or not an authenticated user has rights to
access a certain resource. ECAS only uses passwords - always travelling on an encrypted
channel - but it also provides support for stronger methods of authentication.
3.2 How does it work?
ECAS mechanisms work with simple HTTPS calls and redirections and do not rely on any
specific technology such as strong encryption mechanisms.
4
ECAS
2
3
6 7
Browser
5
1 App1
A user making a first connection to an application (1) has no session established with the
application, and so is redirected to ECAS (2) on a secure channel. The application specifies
where the user must return after authentication.
ECAS presents a login/password screen (3) and the user enters his credentials (4). After
successful authentication, ECAS redirects the call back to the application and adds a
specific token, or ticket, to the request (5). At the same time, it sets an SSO cookie.
STORK-eID Consortium Page 13 of 16
14. List of Commission A2A Services of Common Interest 19 11 2008
The application now receives a call from its user, along with a ticket number. The
application validates the ticket by issuing a call to a specific ECAS URL (6) and ECAS
answers by providing information about the user (7).
Based on the Yale University Open Source “CAS”, no user information is transmitted in an
insecure way. Even if the application is called on HTTP, the ticket sent by ECAS contains
no user information, and is valid only once. The actual user information is retrieved on the
basis of the ticket on a secure channel.
The Single Sign On cookie that was set after successful authentication is a secure server (or
application) session cookie: it is sent only to ECAS, always over HTTPS, and does not
outlive the browser session (it is not stored physically on disk). This cookie is sent to ECAS
when the user connects to a second application that requires authentication. Recognizing
the cookie, ECAS does not present the login screen but instead redirects immediately to the
application with a brand new ticket for the user.
Once the user has a session with the application, ECAS is no longer used: the requests are
passed directly to the application.
3.3 Actors involved
End users comprise users of any system that is protected by ECAS. The first phase will
only include internal users (Commission staff and contractors working on Commission
premise) while in the second phase, certain groups of generic users (managed by service
providers, usually external to the Commission) will also be able to be authenticated. The
third phase will see generic users gradually replaced and supplemented by properly
identified external users, managed by specific systems.
The ECAS service is managed by DIGIT.A.1; DIGIT.B.4 develops the ECAS software and,
together with DIGIT.A.4, is also responsible for resolving problems relating to the internal
functioning of the system.
In line with other operational services, the Service Centre handles all reports of incidents
and problems. The system administrator monitors the proper technical functioning of the
service and also maintains a list of client applications.
The Security Directorate defines the Commission’s authentication policy and is responsible
for following up security incidents. It also conducts audits concerning the behaviour and the
usage of the service.
STORK-eID Consortium Page 14 of 16
15. List of Commission A2A Services of Common Interest 19 11 2008
4 Conclusions
Discussions with DG DIGIT and DG MARKT have shown that they are very interested in
incorporating electronic identities into ECAS over the course of 2009 - especially for the
purposes of the Internal Market Information System.
Although the finalisation of common specifications for EU eID interoperability through
STORK require some time still, it might be recommendable, as a first step, to launch a pilot
system including technical solutions for a limited number of Member States. Apparently,
some ECAS tests have already been run on the Belgian citizen card.
The issue will be discussed again in the context of the STORK General Assembly in
December, and by the beginning of 2009 a working group with technicians from the
services involved will start to draft deliverable D7.4 "Common Specifications A2A", which
is scheduled to be finalised in June 2009.
STORK-eID Consortium Page 15 of 16
16. List of Commission A2A Services of Common Interest 19 11 2008
References
[1] IDABC Work Programme Fifth Revision (2008), Section I -
Projects of common interest / Horizontal measures
[2] European Commission - ECAS local support guide (2005)
STORK-eID Consortium Page 16 of 16