Ferramentas Pessoais

Missão

O Instituto de Informática  tem por missão apoiar a definição das políticas e estratégias das tecnologias de informação e comunicação (TIC) do Ministério das Finanças e da Administração Pública (MFAP) e garantir o planeamento, concepção, execução e avaliação das iniciativas de informatização e actualização tecnológica dos respectivos serviços e organismos, assegurando uma gestão eficaz e racional dos recursos disponíveis.

A Entidade de Serviços Partilhados da Administração Pública, I.P. (eSPap), cuja criação foi concretizada através do Decreto-Lei n.º 117-A/2012, de 14 de junho, assume a missão e atribuições do anterior Instituto de Informática, extinto por fusão. www.espap.pt

 

Segurança do Software

Subir um nível
2010
 
Electronic Signatures as Obstacle for Cross-Border E-Procurement in Europe - Jun. 2009 File 114.1 kB
E-procurement is considered one of the most promising services within e-government in terms of cost and time efficiency. Within the European Union, the Internal Market requires cross-border e-procurement. The European Council has issued directives and guidelines for this purpose. While e-procurement works on national levels, cross-border e-procurement in Europe does not. This is mainly due to lacking technical interoperability and legal harmonisation in particular concerning the use of e-signatures. By a comparative study of the different legal provisions in the Czech Republic, France, Germany, Spain and Sweden this article provides an overview of the current state-ofplay and makes suggestions on how to overcome the remaining obstacles to pan- European e-procurement.
The Role Digital Identity Management in the Internet Economy: A primer for Policy Makers - Jun. 2009 File 329.7 kB
This primer aims to provide policy makers a broad-brush understanding of the various dimensions of digital identity management (IdM). Consistent with the Seoul Ministerial Declaration, it also aims to support efforts to address public policy issues for securely managing and protecting digital identities, with a view to strengthening confidence in the online activities crucial to the growth of the Internet Economy. The primer is a product of the Working Party on Information Security and Privacy. It is part of a broader work programme on IdM that began with a workshop held in Trondheim, Norway in May 2007 (www.oecd.org/sti/security-privacy/idm). It was prepared by a volunteer group of experts led by Katarina de Brisis of Norway, with additional assistance from Nick Mansfield, consultant to the Secretariat, and Mary Rundle, who provided assistance in her capacity as a Research Associate with the Oxford Internet Institute through a project funded by the Lynde and Harry Bradley Foundation.
PEPPOL Deliverable D1.1 Requirements for Use of Signatures in Public Procurement Processes Part 3: Signatures Policies - Abr. 2009 File 1.0 MB
This document is a part of the multi-part deliverable D1.1 “Requirements for Use of Signatures in the Procurement Processes” issued by the PEPPOL1 (Pan-European Public Procurement On-Line) project. PEPPOL is a three-year (May 2008 – April 2011) large scale pilot under the CIP (Competitiveness and Innovation Programme) initiative of the European Commission.
PEPPOL Deliverable D1.1 Requirements for Use of Signatures in Public Procurement Processes Part 7: eID and eSignature Quality Classification - Abr. 2009 File 477.8 kB
This document is a part of the multi-part deliverable D1.1 “Requirements for Use of Signatures in the Procurement Processes” issued by the PEPPOL1 (Pan-European Public Procurement On-Line) project. PEPPOL is a three-year (May 2008 – May 2011) large scale pilot under the CIP (Competitiveness and Innovation Programme) initiative of the European Commission.
Competitiveness and Innovation Framework Programme - D2.3 Quality Authenticator Scheme - Mar. 2009 File 3.3 MB
This deliverable combines the work described in deliverable D2.1 and D2.2 and defines the common STORK Quality Authentication Assurance framework. It describes how national authentication levels can be mapped onto STORK QAA levels to ensure eID interoperability. Mapping of these levels onto each other is not always straightforward. Recommendations are given to ensure proper mapping. Furthermore, legal implications regarding the use of qualified certificates are taken into account in the STORK QAA framework. Solution directions are offered to ensure legally allowed use of identifiers in STORK.
Competitiveness and Innovation Framework Programme - D4.1 Interim Report on eID Process Flows - Mar. 2009 File 1.2 MB
This document provides an overview of the current process flows that will be the input for the pilots.
UK Border Security: Issues, Systems and Recent Reforms: A Submission to the IPPR Commission on National Security for the 21st Century - Mar. 2009 File 131.8 kB
Tendo como base uma das politicas de segurança das fronteiras britânicas, este documento analisa o sistema de fronteiras electrónicas do Reino Unido, apontando algumas questões de relevo.
Competitiveness and Innovation Framework Programme - D2.2 Report on Legal Interoperability - Fev. 2009 File 5.7 MB
This deliverable provides an overview of the legal background of eID in 14 STORK Member States and describes the principle legal issues regarding pan Eruropean authentication.
Competitiveness and Innovation Framework Programme - D6.0 Pilots Scope - Fev. 2009 File 760.3 kB
This document is an overview that describes the scope and objectives of the five pilots.
Privacy Features of European eID Card Specifications - Fev. 2009 File 1.1 MB
As an authentication token and personal data source, a national eID card is a gateway to personal information. Any unwanted disclosure of personal information as a result of the issuance or use of the card constitutes a violation of the citizen’s privacy rights. Apart from considerations of fundamental rights, this is also a serious obstacle to the adoption of eID card schemes and to their cross-border interoperability. The aim of this paper is to allow easy comparison between privacy features offered by European eID card specifications and thereby to facilitate identification of best practice. The target audience is corporate and political decision-makers and the paper seeks to raise awareness of the legal and social implications of new developments in eID card technologies. In particular, the findings should have important implications for data protection and security policies. A clear statement of the status quo is an essential first step towards the important goals identifying best practice, improving the base-line of citizen privacy protection in eID cards throughout Europe and ultimately to improving interoperability and adoption by citizens.
Competitiveness and Innovation Framework Programme - D7.7 Dissemination Plan (M6 first planning, then 6 monthly updating) - Dez. 2008 File 521.4 kB
The dissemination strategy and plan will move from the general to the specific; from the overall objectives of the project down to the individual actions foreseen to achieve them. The Dissemination planning process will assist STORK by defining communication goals, objectives and strategies with specified timelines, allocating responsibilities, providing a clear modus operandi, facilitating timely response to changed conditions and deviations from plans, establishing a basis for evaluation, identifying risks and taking remedial steps to solve problems.
Competitiveness and Innovation Framework Programme - D2.1 Framework Mapping of Technical/Organisational Issues to a Quality Scheme - Out. 2008 File 2.4 MB
This deliverable explores how member states classify their local authentication solutions into levels of quality, and it investigates on a common framework for expressing authentication assurance levels in STORK. The IDABC “Proposal for a multi-level authentication mechanism and a mapping of existing authentication mechanisms” is used as guideline on the definition of a tentative common multi-level authentication scheme. A preliminary mapping between the locally adopted levels and the tentative assurance levels is also proposed.
EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond - Out. 2008 File 2.2 MB
EPC (Electronic Product Code) tags are industry-standard RFID devices poised to supplant optical barcodes in many applications. They are prevalent in case and pallet tracking, and also percolating into individual consumer items and border-crossing documents. In this paper, we explore the systemic risks and challenges created by increasingly common use of EPC for security applications. As a central case study, we examine the recently issued United States Passport Card and Washington State \enhanced" drivers license (WA EDL), both of which incorporate Gen-2 EPC tags. We explore several issues: 1. Cloning: We report on the data format of Passport Cards and WA EDLs and demonstrate their apparent susceptibility to straightforward cloning into o -theshelf EPC tags. We show that a key anti-cloning feature proposed by the U.S. Department of Homeland Security (the tag-unique TID) remains undeployed in these cards. 2. Read ranges: We detail experiments on the readrange of Passport Cards and WA EDLs across a variety of physical con gurations. These read ranges help characterize both issues regarding owner privacy and vulnerability to clandestine \skimming" and cloning. 3. Design drift: We nd that unlike Passport Cards, WA EDLs are vulnerable to scanning while placed in protective sleeves, and also to denial-of-service attacks and covert-channel attacks. We consider the implications of these vulnerabilities to overall system security, and o er suggestions for improvement. We also demonstrate anti-cloning techniques for o - the-shelf EPC tags, overcoming practical challenges in a previous proposal to co-opt the EPC\kill" command to achieve tag authentication. Our aim in this paper is to ll a vacuum of experimentally grounded guidance on security applications for EPC tags not just in identity documents, but more broadly in the authentication of objects and people.
Data Handling Procedures in Government: Final Report - Jun. 2008 File 277.7 kB
Com este relatório o Governo britânico pretendeu definir alguns príncipios e medidas para melhorar a segurança dos dados que detém, para evitar fugas ou roubos, como tem acontecido recentemente no país.
Promoting Data Protection by Privacy Enhancing Technologies (PETs) - Mai. 2007 File 152.2 kB
The purpose of this Communication, which follows from the First Report on the implementation of the Data Protection Directive5, is to consider the benefits of PETs, lay down the Commission's objectives in this field to promote these technologies, and set out clear actions to achieve this goal by supporting the development of PETs and their use by data controllers and consumers.
How to Raise Information Security Awareness - Jun.2006 File 1.3 MB
The Users´s Guide: How Raise Information Security Awareness illustrates the main processes necessary to plan, organise and run information security awareness raising initiatives: plan & assess, execute & manage, evaluate & adjust. Each process is analysed and time-related actions and dependencies are identified. The process modelling presented provides a basis for "kick-starting" the scoping and planning activities as well as the execution and assessment of any programme. The Guide aims to deliver a consistent and robust understanding of major processes and activities among users.
Biometrics at the Frontiers: Assessing the Impact on Society - 2005 File 2.5 MB
The present report, entitled Biometrics at the Frontiers: Assessing the impact on Society, represents the output of the study. Its title underlines the purpose of the study to address biometrics beyond the immediate application for border control purposes, to their wider adoption and use in society.
Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM) - 2004 File 79.8 kB
Abstract. In this paper, we present Chung-Kwei1, a system for the analysis of electronic messages and the automatic identification of unsolicited email messages (=SPAM). The method uses pattern-discovery as its underlying tool and is another instance of a generic approach that has been the basis of previously successful solutions developed by our group to tackle problems in computational biology such as gene finding and protein annotation. Chung- Kwei can be trained very quickly; as new examples of SPAM become available, the system can re-train itself without interrupting the classification of incoming e-mail. We trained Chung-Kwei on a repository of 87,000 messages, then tested it with a very large collection of 88,000 pieces of SPAM and WHITE email: the current prototype achieved a sensitivity of 96.56% whereas the false positive rate was 0.066%, or one-in-six-thousand. In terms of speed, we are currently capable of classifying 214 messages/second, on a 2.2 GHz Intel-Pentium platform. The Chung-Kwei system is part of SpamGuru, a collaborative antispam filtering solution that is currently under development at IBM Research.
The Ten Most Critical Web Application Security Vulnerabilities - Jan. 2003 File 335.7 kB
 
Guide to Securing your Web Site for Business - 2003 File 312.8 kB
VeriSign, Inc., the leading provider of trust services for electronic commerce and communication, offers a cost-effective, proven solution for securely conducting business over the Internet. This proven technology is in use now—by the top e-commerce sites, virtually all of the Fortune 500 companies with a Web presence, and thousands of other leading Web sites. By installing a VeriSign SSL Certificate (available as part of VeriSign's Secure Site Services) on your company's Web server(s), you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Understanding the Privacy Space - Set. 2002 File 153.2 kB
Understanding the Privacy Space by Benjamin D. Brunk This paper reports on an ongoing research project focusing on privacy tools, and services available on the Internet. A detailed examination of 133 different privacy-related software tools and services rendered a list of 1,241 features relating to privacy. Based on the data gathered, the ongoing work is to formulate a framework to describe this "privacy space" using grounded theory and content analytic techniques. Here, we discuss some of more interesting preliminary findings garnered from a descriptive statistical analysis of the raw data. This paper discusses what can be learned from a user-centric analysis of this increasingly important class of software tools.
Without Pen and Ink - The use of digital signatures in electronic interaction with and within public administration - Out. 2001 File 2.6 MB
It is not necessary to understand the “nuts and bolts” of a new technology to benefit from it, but a user must master the applications. Things that look simple to the user are often extremely complex and advanced “behind the scenes”. The introduction and use of digital signatures and accompanying infrastructure involve a number of technological, legal, organisational and administrative challenges. This is a complicated field for public administration to relate to. There is therefore a need for a policy on this area, covering norms for use, basic principles for setting up, introducing and maintaining the infrastructure, and strategies on how public administration should ensure that it works in accordance with assumptions. This report proposes basic elements for such a policy.

Acções do Documento