1 / 24

Transboundary Trust Space

Transboundary Trust Space. Regional Commonwealth in the field of communications www.en.rcc.org.ru. Ministry of Communications and Mass Media of the Russian Federation www.minsvyaz.ru. Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states).

Download Presentation

Transboundary Trust Space

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Transboundary Trust Space Regional Commonwealth in the field of communications www.en.rcc.org.ru Ministry of Communications and Mass Media of the Russian Federation www.minsvyaz.ru Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National Certification Authority Alexander Sazonov February 16, 2012

  2. Activity on forming of the Transboundary trust space • Description of the Transboundary trust space architecture. Common trust infrastructure services • Transboundary trust space standardization issues Transboundary Trust Space Presentation plan • Introduction. Brief information about the RCC. Primary tasks and directions of activities

  3. Introduction Regional Commonwealth in the field of communications (RCC) December 1991 – heads of CIS states’ Communications Administrations signedAgreement on Establishment of RCC - an organization called upon to carry out cooperation between new independent states in the field of telecommunication and postal communication based on their free will, principles of mutual respect and sovereignty. October 1992 - the Heads of Government of the CIS countries signed the Agreement on coordination of interstate relations in the field of postal and telecommunication- the RCC is vested with the authority of an interstate coordinating body in the field of postal and telecommunication.

  4. Introduction RCC primary tasks • extension of mutually beneficial relations between the RCC Administrations in harmonization of development of networks and communication means • coordination of issues in scientific and technical policy, radio spectrum management, tariff policy on communications and mutual settlement services, personnel training • interaction with international organizations in communications and informatization • mutual information exchange etc.

  5. Introduction RCC activity directions • The Strategy of CIS member states in informatization field: • creation of an enabling environment for cooperation in the field of ICT • harmonization of legislation and development of standards regulations • development of new ICT directions • development of ICT sphere

  6. Activity on TTS Model of the forming and functioningof the CIS member-states’ transboundary trust spacein the Internet network (TTS Model) Cardinal problem of the international electronic interactionisto ensure electronic documents validity

  7. Activity on TTS Basic concept of the TTS Model • What is the best way to ensure trust in information exchange? – To have a opportunity to check trust. How to do it ? • Through direct access to a data base. In practical terms this means an access for an agency in state A to a data base of an agency in state B. Ideally it allows to interact without documents exchange at all. • If direct access is not possible, then the solution is to have states A and B appoint trusted parties through which such an access could be done. • In our opinion, this is the only way to solve the problem of trust in information exchange (other suggested solutions do not offer a universal approach). • We are open to ideas how the TTS Model can be improved and to other universal approaches to this problem.

  8. Activity on TTS Basic stages of TTS forming stated in the TTS Model • System engineering • Development of normative, legal and technical drafts set, necessary for TTS creation and functioning • Harmonization of the Commonwealth states’ national legislations, adaptation of national software and hardware existing, creation of the transboundary system segment, organization of operators’ activity, other practical actions to ensure functioning of the TTS as an integrated interstate information system

  9. Activity on TTS Methodology of the transboundary trust spaceforming and functioning in the Internet network(TTS Methodology) • Conceptual framework description • TTS architecture description • Preliminary variants of TTS architecture performance and their selection algorithm • Approach to working out of requirements for a reliable identification of information interaction participants

  10. TTS architecture TTS architecture components • The common trust infrastructure (CTI), consisting of specialized services • Register systems (information systems of various state bodies (institutions)), which interact among themselves directly via electronic transferable records, herewith, interaction validity is ensured by CTI services • Operators of register systems and CTI services • Auditors of register systems and CTI services operators’ activity

  11. TTS architecture Ensuring of e-document’s validity function

  12. TTS architecture Services groups in the common trust infrastructure Documentation services Additional services Access service

  13. TTS architecture Document in the common trust infrastructure

  14. TTS architecture Support for distributed access control

  15. TTS architecture Advantages of using attribute certificates for a distributed access control • no necessity to re-issue a public key certificate at subject’s powers alteration • a subject can have several attribute certificates, with each being responsible for one or another type of powers • subject’s powers can be stated in an attribute certificate in encrypted form

  16. TTS architecture Using attribute certificates to manage rights vested in negotiable instruments • An endorsement is an attribute certificate containing the following data: • identification data of the attribute certificate itself • hash value of a bill of lading content • identification data of an endorsee’s public key certificate • Hash value of a bill of lading content ensures its integrity • while public key certificate identification data univocally • identifies an endorsee.

  17. TTS architecture Using attribute certificates to manage rights vested in negotiable instruments

  18. TTS standardization issues Primary standardization directions • ensuring of terminology unification • ensuring of electronic document’s format • ensuring of information systems interoperability • ensuring of electronic interaction validity • The principle of technological neutrality is to be observed

  19. TTS standardization issues Standardizationvs. Technological neutrality

  20. TTS standardization issues Common trust infrastructure

  21. TTS standardization issues What guidelines should be observed when selecting a performance of service?

  22. TTS standardization issues Optimal variant – combinationof different services’ performances

  23. TTS standardization issues Conclusions and suggested way forward • RCC would be grateful to have UN/CEFACT opinion on the concept of the TTS Methodology and suggested mechanism of its implementation and evaluation of its efficiency in trusted information exchange. • We suggest starting a discussion at UN/CEFACT and exchange of experience on the ways used by countries to achieve trust in information exchange. • We suggest including this task in the programme of UN/CEFACT work and to prepare a recommendation on this subject (Russia is ready to start this work).

  24. Transboundary Trust Space Thank you for attention! We are open to you views, ideas and critics! Latest versions of the TTS Model andTTS Methodologyare published at the RCC website in section RCC activities –> Informatization ->The transboundary trust space of the CIS member-states http://www.en.rcc.org.ru/index.php/rcc-activities/informatization-/261211 Speaker Alexander Sazonov www.nucrf.ru sazonov@nucrf.ru Any questions? National Certification Authority

More Related