Cen ws xbrl
Download
1 / 21

CEN/WS XBRL - PowerPoint PPT Presentation


  • 109 Views
  • Uploaded on

CEN/WS XBRL. CWA2: Hot topics of interest in 2nd level reporting. 20 February 2013 Ignacio Boixo. CWA2. Hot topics of interest in 2 nd level reporting. Workflow on 2 nd level reporting Proof of concept e-mail validation Core Business Vocabulary Legal Entity Identifier

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CEN/WS XBRL' - tovah


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cen ws xbrl

CEN/WS XBRL

  • CWA2:

  • Hot topics of interest in 2nd level reporting

20 February 2013

Ignacio Boixo

CWA2


Hot topics of interest in 2 nd level reporting
Hot topics of interest in 2nd level reporting

Workflow on 2nd level reporting

Proof of concept e-mail validation

Core Business Vocabulary

Legal Entity Identifier

Any other Business?


Requirement example workflow
Requirement: example workflow

Signature (and encryption) via National

regulator public certificate

Signature (and encryption) using

European regulator

public certificate

Submission container

Subcontainer

header.xml

nationalinstance1.xbrl

nationalinstance2.xbrl

Subcontainer

Declarer

European

Supervision

Authority

National Supervision Authority


Alternative A: Signature encapsulated

Zip

Zip

Zip

Header

Instance 1, Instance 2, …,

Instance n

Header

Instance 1, Instance 2, …,

Instance n

Header

Instance 1, Instance 2, …,

Instance n

Encryption (public key of the first addressee)

Other

Authority:

BIS / ESRB / Banking Union / …

National Supervision Authority

Other

Authority:

e.g. EBA

Signature 1 (contributor 1 - private key)

Signature 2 (contributor 2 - private key)

Signature/ Encryption (addressee certificate)

& transfer

Encryption (public key 2nd addressee)

Signature 3 (contributor 3 key)

transfer


Alternative Z: Zip-encapsulated

Encryption (public key of the first addressee)

National Supervision Authority

Other

Authority:

e.g. EBA

Other

Authority:

BIS / ESRB / Banking Union / …

Signature 1 (contributor 1 - private key)

Zip

  • Header

  • Instance 1

  • Instance 2

  • ...

  • Instance n

  • SignedSubContainers

  • XadesSignedSubcontainer.xml

    • signed with contributor 2 private key

    • Inside, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

  • FullSubContainers

  • EncryptedSubcontainer.xml

    • public key 2nd addressee

    • signed with contributor 3 private key

    • Inside the signed, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

Encryption (next

addressee)

& transfer

Transfer

only

Page 5


Characteristics
Characteristics

Alternatives are functionally equivalent: both provide

Xades-signed sub-containers for trusting authorities

Fully encrypted subcontainers for non-trusting authorities

Both alternatives can deliver as a result a set of files using a generic decomposition tool

For Alternative 1, the result file set will be a flat set of files having their original filenames

For Alternative 2, the result file set will be a hierarchical set of files (in accordance with the folder hierarchy defined in the .zip container, both folders and files having their original name)

Problem : How shall the NSA identify the final recipients of the subpackages (EBA, Banking union, etc)?

For Alternative 1, the addressee of the subcontainer has to be identified using a non-standard xml tag (requiring thus an intermediate xml schema which is not standard?)

For Alternative 2, a file naming convention would be required in the instructions of the NSA to identify the addressee of the subpackage


Proof of concept e mail validation
Proof of concept e-mail validation

Encryption (XML Encryption)

Encryption (XML Encryption)

Signature (XADES-EPES)

Zip

Signature (XADES-EPES)

Instance-1

Instance-n

Package & Compress (zip)

Feedback

instance1.xml

instance2.xml

instancen.xml

Eurofiling

Test

Validator

(Arelle)

Anonymous









Thanks for your attention
Thanks for your attention Vocabulary

[email protected] (as back up of [email protected])

Comments or questions?


ad