The top public-key certificate (typically a CA certificate) must be issued by a trust anchor recognized by the relying party. This is illustrated in Figure 13. Trust anchor information Issued by trust anchor Certification path CA certificates Relying PKI party End-entity public-key certificate Legend: CA signing Chain of CA certificates Trust anchor signing Trust relationship Figure 13 – Certification path Each public-key certificate on the certification path needs to be validated. (...) When validating a public-key certificate, a relying party may consult the appropriate trust broker to check its validity. – Some relying parties may communicate only with a limited set of other entities and they may be required to observe restrictions on the communications, e.g., to accept only communications over a limited set of communications protocols. The necessary information is supplied to a relying party in an authorization and validation list (AVL).
Language:English
Score: 721661.23
-
https://www.itu.int/wftp3/Publ...l/files/basic-html/page66.html
Data Source: un
Modern PERs also tend to rely on the methods
of performance-based budgeting.
(...) All stakeholders should be treated as legitimate
owners of the process
All stakeholders should be encouraged to commit to
the recommendations and proposals of the review
process.
Core Methods Cont’d
Rely on Basic Tenets of PER The manual would clarify why and how to rely on the basic
tenets of the PER. Many of these support the United Nations
Development Assistance Framework (UNDAF). These are
1. Rely on scientific analysis, as advised by Rio+20.
Language:English
Score: 711314.3
-
https://www.cepal.org/sites/de...anual_design_-_nov_24_2014.pdf
Data Source: un
ICC-02/05-01/20 5/6 12 May 20201
The Defence’s notice of its reliance on all evidence disclosed by the Prosecution
should be denied and it should be instructed to itemise the evidence on which it
intends to rely
8. By simply notifying the Chamber that it would rely on the evidence disclosed
by the Prosecution8 without proper specification or itemisation of the evidence it
intends to rely on, the Defence fails to meet its obligation as required by rule 121(6) of
Rules. Pursuant to this rule, the Defence is required to provide a list of the evidence it
intends to rely on regardless of whether it originates from the Prosecution or from
the Defence.
9. (...) The Prosecution therefore requests that the Chamber find the general notice of
the Defence insufficient and order it to indicate the specific evidentiary items on
which it intends to rely for the purpose of the confirmation hearing from the
evidence disclosed by the Prosecution.
Language:English
Score: 706111.1
-
https://www.icc-cpi.int/sites/.../CourtRecords/CR2021_04489.PDF
Data Source: un
Because DIDs reside on a distrib- prove control over a DID during its interaction with uted ledger, each entity may serve as its own root a relying party. The following general steps to be authority – an architecture referred to as DPKI executed by the relying party include: (decentralized PKI). 1. The relying party retrieves the DID Document In general, DID design goals are the following [10]: associated with the DID Subject 2. (...) The relying party executes the authentication and other metadata. mechanism provided 2.
Language:English
Score: 703519.6
-
https://www.itu.int/en/publica...h/files/basic-html/page39.html
Data Source: un
PAUL GICHERU
Public
Prosecution’s urgent request to order the Defence to file a list of evidence it
intends to rely upon in the confirmation proceedings
Source: Office of the Prosecutor
ICC-01/09-01/20-131 09-04-2021 1/6 EC PT
No. (...) The Prosecution submits that this obligation exists regardless of whether the
evidence upon which the Defence intends to rely originates from the Prosecution
or from the Defence. (...) Thus, it is not enough for the Defence to say – in effect – you should know your
evidence, so we are not going to tell you what items we will rely upon. Rather, the
Defence must indicate which specific items of evidence it will rely upon – at least
insofar as these items are not included in the Prosecution’s list of evidence.
11.
Language:English
Score: 703446.14
-
https://www.icc-cpi.int/sites/.../CourtRecords/CR2021_03335.PDF
Data Source: un
We rely on cryptography for our internal processes
In addition to providing cryptographic tools for the greater good, we rely on those tools internally for our organizations to function effectively. Our organizations are geographically diverse, and we rely on strong, secure communications both for members’ internal communications and workflows, and for our public-facing presence on the Internet. (...) Cryptography is a requirement for people to control their own communications
We provide and rely on these cryptographic tools because people are entitled to fundamental control over their communications.
Language:English
Score: 700441.2
-
https://www.ohchr.org/sites/de...unications/MultipleAuthors.pdf
Data Source: un
Search Close
Search UNICEF
Fulltext search
Max
Page
Why UNICEF India relies on voluntary contributions
UNICEF India relies on the support and donations from businesses and individuals to sustain and expand health, nutrition, water and sanitation, education, and child protection programmes for all girls and boys in India.
(...) In that regard UNICEF relies on donations from people as well as from the private and public sector. In India we rely on donations, including from people of all walks of life, and all the money raised in India stays in India to help reach vulnerable girls and boys across India.
Language:English
Score: 698260.55
-
https://www.unicef.org/india/f...relies-voluntary-contributions
Data Source: un
Further, in this Chamber’s view, the term ‘to present’, used
in article 61(6) of the Statute and rule 121(6) of the Rules, only refers to the fact that
the Defence wishes to rely on an item of evidence, irrespective of its origin. Therefore,
the indication that the Defence wishes to rely on an item of Prosecution evidence falls
within the purpose of the list of evidence.
11. (...) FOR THESE REASONS, THE CHAMBER HEREBY
FINDS that the Defence has the duty to provide a list of the specific pieces of evidence
it intends to rely on in its Written Submissions;
FINDS that, for that purpose, the Defence can make a general reference to the
Prosecutor’s list of evidence; and
ORDERS the Defence to indicate any further evidence disclosed by the Prosecutor
which it intends to rely on by 14 April 2021.
Language:English
Score: 694042.9
-
https://www.icc-cpi.int/sites/.../CourtRecords/CR2021_03393.PDF
Data Source: un
Provides regional coverage (100% reach)
Reaches an unlimited number of end- users
Offers quality services to all population, quickly and affordably
Complement terrestrial infrastructures
Continue to innovate Not “just” on new satellites
On the entire ecosystem
Spectrum and efficiency
Satellite is critical infrastructure
In the fixed-satellite service (FSS), satellite spe ctrum is used ubiquitously
Corporate Networks
Peace Keeping Disaster
Relief
Wireless Extension Services
Telemedicine
Internet Connectivity
Maritime Communications
Distance Education
TV contribution
Aviation Security
3
Satellites’ Role, Present and Future
Satellite applications drive communications for acr oss multiple sectors
• Satellites provide cellular backhaul, broadband to consumers, and other services that leverage its ubiquity
• Maritime, oil and gas are a significant customer base
4
Satellites are a basic component of our integrated telecommunications infrastructure
• Dispersed communities rely on VSATs for broadband access
• Enterprises rely on VSATs for broadband access, even in regions where submarine cables, fiber optic lines, and terrestrial infrastructure are broadly deployed
• Civic functions like civil aviation, weather-monitoring, distance education and disaster relief all rely on satellites
Disaster Recovery and Relief
5
Emergency.lu Team Leader Recaps Disaster Response Lessons Learned in the Philippines (January 6, 2014, Satellite TODAY)
Emergency.lu
• Luxembourg government-executed consortium of Luxembourg companies: SES TechCom, Hitec, and Luxembourg Air Ambulance, together with Skype, Ericsson, the World Food Programme and the Emergency Telecommunication Cluster (ETC)
• Enables a rapid response solution to re-establish broadband access for disaster relief and humanitarian missions on a global level
• Platform provides a satellite infrastructure and satellite capacity, communication terminals, and rapid deployment logistics
Satellites’ Role, Present and Future
Broadcast technologies all rely on satellite
• Satellite platforms allow scalability in deploying networks, with low incremental costs for additional users
• SES’s global satellite network carries 44 Direct-to-Home platforms, 6,200 channels, and reaches 291 million TV homes
• 106m satellite homes • 153m cable homes • 31m IPTV homes
6
Satellites’ Role, Present and Future
Broadcast technologies all rely on satellite
• SES invests in new technology development, like Ultra HD and Sat-IP – a pioneering technology for linking in-home networks via satellite connection
7
Via Satellite , April 9, 2014 – “SES Working with Over 30 Manufacturers to Create SAT>IP Products” “[SAT>IP] enables satellite operators to transport live linear satellite television over an in-home IP network via Ethernet, power line or Wi-Fi.
Language:English
Score: 691028.6
-
https://www.itu.int/en/ITU-R/s...ations/RRS-14-Americas-SES.pdf
Data Source: un
ID related activities in ITU-T
• JCA-NID – http://www.itu.int/ITU-T/jca/nid/index.html – ID terminal, public network & services
• JCA-IdM/ IdM-GSI – http://www.itu.int/ITU-T/jca/idm/index.html – Entity, Identity Provider & Relying Party
Terminal
Entity Public Network
Identity Provider
Relying Party
Service
(10)
(11) (11)
Transaction & Service
A Composed Architecture Model
The terminal/end user equipment accesses to the public network via the User Network Interface UNI (10). (...) Terminal
Entity Public Network
Relying Party
Service
(10)
(11)
Transaction & Service
Identity Provide & Resource/Service Routing
A New Approach of the Architecture
ID Network
Relationship between IdM and NID
Management by Trusted providers of Trusted attributes of
Entity
Network aspects of Applications or Services of RFID and
Sensor systems
RFID USN
Various ID Systems
Compensate each other: Management & Network Aspect
IdM NID
ID Network (International Institute to coordinate,
evaluate and analyze data)
Reference
NID Reference Architecture
JCA -NID High Level Ref. (...) Terminal equipment (9)
General IdM Architectural Model
• Entity - a User or a Requestor, who seeks Service from a Relying Party, and provides a claimed Identity to that Party.
• Relying Party (RP) - Needs to have this Identity authenticated before providing the Service.
Language:English
Score: 689370.26
-
https://www.itu.int/dms_pub/it.../06/0F/T060F0000090044PDFE.pdf
Data Source: un