YEARS OF EUROPEAN ONLINE ANNÉES DE EN LIGNE ...
YEARS OF EUROPEAN ONLINE ANNÉES DE EN LIGNE ... YEARS OF EUROPEAN ONLINE ANNÉES DE EN LIGNE ...
FINLAND A system called PtJ (Government Decision-making System) is the network for electronic legislative procedures. the irst PtJ was established in 1995 and the new PtJ2 was introduced in 2005, based on Documentum software. the draft laws are transferred within the system from the ministries to government sessions and on to the Parliament in structured XmL format. the tool for the actual drafting is microsoft word, with tailor-made templates and macros. 6. thE USE Of SECURE SERVERS AND CERtIfICAtES IN thE DELIVERy Of ELECtRONIC LEGAL GAZEttES the use of secure servers or secure protocol in the delivery of electronic legal gazettes ensures the reliability of any electronic document source and the transfer of data from the server, e.g. from the server of the legal gazette. A secure server provides secure connections and the data in the in-transit process between the user and the server is encrypted. SSL (secure socket layer) server authentication allows users to conirm a web server’s identity. SSL-enabled client software, such as a web browser, can automatically check that a server’s certiicate and public ID are valid and have been issued by a certiicate authority (CA) — such as VeriSign, thawte or Geotrust — listed in the client software’s list of trusted CAs. SSL server authentication is essential for secure e-commerce or e-government transactions. An encrypted SSL connection requires all information sent between a client and a server to be encrypted by the sending software and decrypted by the receiving software, protecting private information from interception over the Internet. In addition, all data sent over an encrypted SSL connection is protected with a mechanism for detecting tampering — that is, for automatically determining whether the data has been altered in transit. Secure sessions and server IDs work in the following way. 1. A user contacts the site of the legal gazette (‘LG’) and accesses a secured URL — a page secured by a Server ID (indicated by a URL that begins with ‘https:’ instead of just ‘http:’ or by a message from the browser). 2. the LG server responds, automatically sending the user the digital certiicate of the LG site, which authenticates the site. 3. the web browser of the user generates a unique ‘session key’ to encrypt all communications with the LG site. 4. the browser encrypts the session key itself with the site’s public key so that only the site can read the session key. 01_2007_5222_txt_ML.indd 120 6-12-2007 15:13:58
WORKSHOP 5. A secure session is now established. It all takes only seconds and requires no action by the user. Depending on the browser, the user may see a key icon becoming whole or a padlock closing, indicating that the session is secure. A secure server is a web server that supports any of the major security protocols, like SSL, which encrypt and decrypt messages to protect them against third-party tampering. major security protocols include SSL, ShttP (Secure httP), PCt, and IPSec (Internet Protocol Security). A secure protocol (e.g. httPS) can be used to protect the transfer of data from a secure server, with a security protocol such as SSL, tLS or PCt. Usually the use of certiicates (by thawte, VeriSign, multicert, etc.) is recommended, in order to verify that the address of the web server actually belongs to the publisher of the legal gazette. the SSL protocol runs above tCP/IP and below higher-level protocols such as httP or ImAP. It uses tCP/IP on behalf of the higher-level protocols, and allows an SSL-enabled server to authenticate itself to an SSL-enabled client, the client to authenticate itself to the server, and both machines to establish an encrypted connection. the client uses the public key from the certiication authority’s certiicate to validate the CA’s digital signature on the server certiicate being presented. If the information in the server certiicate has changed since it was signed by the CA, or if the CA certiicate’s public key does not correspond to the private key used by the CA to sign the server certiicate, the client will not authenticate the server’s identity. At this point, the client has determined that the server certiicate is valid. 120 | 121 01_2007_5222_txt_ML.indd 121 6-12-2007 15:13:58
- Page 69 and 70: MEETING OF THE COUNCIL WORKING PART
- Page 71 and 72: MEETING OF THE COUNCIL WORKING PART
- Page 73 and 74: CONCLUSIONS first, I would like to
- Page 75 and 76: En tant que déléguée de la Grèc
- Page 77 and 78: LEGAL XML — USE OF XML FOR THE PR
- Page 79 and 80: WORKSHOP • publishing technologie
- Page 81 and 82: WORKSHOP • NiR and the NiR editor
- Page 83 and 84: WORKSHOP tors, thus providing the o
- Page 85 and 86: WORKSHOP 3. SCOPE the expected resu
- Page 87 and 88: WORKSHOP gestützt auf die Verordnu
- Page 89 and 90: WORKSHOP which describe general com
- Page 91 and 92: WORKSHOP Arithmetic Poetry. Ameri
- Page 93 and 94: WORKSHOP Metadata fields collected
- Page 95 and 96: WORKSHOP tion of the common metadat
- Page 97 and 98: ELECTRONIC PUBLISHING OF LEGISLATIO
- Page 99 and 100: WORKSHOP the working group has focu
- Page 101 and 102: WORKSHOP • the integrity of a rec
- Page 103 and 104: WORKSHOP Examples of different appr
- Page 105 and 106: WORKSHOP conidence uses certiicatio
- Page 107 and 108: WORKSHOP 3. LEGISLAtIVE ISSUES CONC
- Page 109 and 110: WORKSHOP signature, is only publish
- Page 111 and 112: WORKSHOP 3.2.4. ARE THERE ACTS, DEC
- Page 113 and 114: WORKSHOP Electronic signature of PD
- Page 115 and 116: WORKSHOP formats are available: htm
- Page 117 and 118: WORKSHOP the chain of conidence is
- Page 119: WORKSHOP the object of SOLON is to
- Page 123 and 124: WORKSHOP ESTONIA A certiicate-based
- Page 125 and 126: WORKSHOP ertheless, some assistance
- Page 127 and 128: WORKSHOP (b) If the system is XmL-b
- Page 129 and 130: COHERENCE OF TERMINOLOGY AND SEARCH
- Page 131 and 132: WORKSHOP nym for legal categories,
- Page 133 and 134: WORKSHOP Article 4(2) of Directive
- Page 135 and 136: WORKSHOP the tool could prove to be
- Page 137 and 138: EUR-LEX: FROM DATA STRUCTURES TO LE
- Page 139 and 140: WORKSHOP duces a ‘magic result’
- Page 141 and 142: WORKSHOP sion of the current one, i
- Page 143 and 144: WORKSHOP for test and demonstration
- Page 145 and 146: WORKSHOP focus on text representati
- Page 147 and 148: WORKSHOP As a irst step, the existi
- Page 149 and 150: WORKSHOP REfERENCES Bench-Capon, t.
- Page 151 and 152: TEXT MINING 1. INtRODUCtION the gro
- Page 153 and 154: WORKSHOP uments. the tasks and obje
- Page 155 and 156: WORKSHOP In order to create more ef
- Page 157 and 158: WORKSHOP jects. the problem, howeve
- Page 159 and 160: WORKSHOP space and their maintenanc
- Page 161 and 162: WORKSHOP the success of the impleme
- Page 163 and 164: WORKSHOP Thesauri thesauri are cont
- Page 165 and 166: WORKSHOP knowledge which are reusab
- Page 167 and 168: WORKSHOP fuhr, Norbert. 2004. Infor
- Page 169 and 170: WORKSHOP Oberle, Daniel; Staab, Ste
FINLAND<br />
A system called PtJ (Government Decision-making System) is the network<br />
for electronic legislative procedures. the irst PtJ was established in 1995 and<br />
the new PtJ2 was introduced in 2005, based on Documentum software. the<br />
draft laws are transferred within the system from the ministries to government<br />
sessions and on to the Parliament in structured XmL format. the tool for the<br />
actual drafting is microsoft word, with tailor-made templates and macros.<br />
6. thE USE Of SECURE SERVERS AND CERtIfICAtES IN thE<br />
<strong>DE</strong>LIVERy Of ELECtRONIC LEGAL GAZEttES<br />
the use of secure servers or secure protocol in the delivery of electronic<br />
legal gazettes ensures the reliability of any electronic document source and the<br />
transfer of data from the server, e.g. from the server of the legal gazette. A secure<br />
server provides secure connections and the data in the in-transit process<br />
between the user and the server is encrypted.<br />
SSL (secure socket layer) server authentication allows users to conirm a<br />
web server’s identity. SSL-enabled client software, such as a web browser, can<br />
automatically check that a server’s certiicate and public ID are valid and have<br />
been issued by a certiicate authority (CA) — such as VeriSign, thawte or<br />
Geotrust — listed in the client software’s list of trusted CAs. SSL server authentication<br />
is essential for secure e-commerce or e-government transactions.<br />
An encrypted SSL connection requires all information sent between a client<br />
and a server to be encrypted by the sending software and decrypted by the<br />
receiving software, protecting private information from interception over the<br />
Internet. In addition, all data sent over an encrypted SSL connection is protected<br />
with a mechanism for detecting tampering — that is, for automatically<br />
determining whether the data has been altered in transit.<br />
Secure sessions and server IDs work in the following way.<br />
1. A user contacts the site of the legal gazette (‘LG’) and accesses a secured<br />
URL — a page secured by a Server ID (indicated by a URL that begins with<br />
‘https:’ instead of just ‘http:’ or by a message from the browser).<br />
2. the LG server responds, automatically sending the user the digital certiicate<br />
of the LG site, which authenticates the site.<br />
3. the web browser of the user generates a unique ‘session key’ to encrypt<br />
all communications with the LG site.<br />
4. the browser encrypts the session key itself with the site’s public key so<br />
that only the site can read the session key.<br />
01_2007_5222_txt_ML.indd 120 6-12-2007 15:13:58