Login with password
Forgotten password

Assets

Here you can explore assets
such as strategies, good practicies, domain models, ontologies, thesauri  and code lists listed on our NIO online repository.

IMPORTANT! Since 9.12.2016, the "DATA" are being published on our NEW OPEN DATA PORTAL "OPSI": https://podatki.gov.si/data/search .

FILTERS


FIELD

Public administration, administrative procedures and information security (42)
General (31)
Information Society (27)
Environment, INSPIRE (11)
Protection of personal data and public information (8)
Statistics (5)
Economy (4)
Transport (3)
Culture (3)
Internal affairs (2)
Environment (2)
Agriculture, fisheries, forestry and food (2)
Education (2)
Finance (2)
Science and Technology (2)
Health care (1)
Justice (section attorneys, prosecutors and criminal sanctions) (1)
Judiciary and civil proceedings (1)
Taxation (1)
International issues (1)
All fields

BUILDING BLOCK

Central IT building blocks (18)
Common methodologies and policies (18)
Digital identities, electronic signiture and e-Documents (16)
Interoperability framework, central applications (15)
Central building blocks, e-Government architecture (11)
Central software distribution (3)
All building blocks

INTEROPERABILITY LEVEL

E-Services (39)
Organizational interoperability (30)
Technical interoperability (21)
Semantic interoperability (8)
Legislative interoperability (7)

INTEROPERABILITY SUBLEVEL

E-services (37)
Policy of National interoperability framework (11)
National interoperability framework (10)
Cross-sectorial agreements (9)
Semantic assets (6)
Data presentation and exchange (5)
Distributed Application Architecture (5)
Interconnection Services (4)
Web Services (3)
Law (Act) (3)
Contract (2)
Other (2)
Data interfaces (1)
File type and document formats (1)
XML-based standards (1)
XML schemas (1)
Regulation (Decree) (1)
Decision (1)
File and message transfer protocols (1)
Network Services (1)
All interoperability sublevels

STATUS

Recommended (56)
Mandatory (36)
Adopted (13)

FORMAT

PDF (43)
DOC (12)
DOCX (5)
ZIP (4)
PPT (4)
BINARY (3)
TXT (2)
XLSX (2)
XLS (1)
PPTX (1)
Vsi formati

INSTITUTION

MINISTRSTVO ZA JAVNO UPRAVO (47)
Ministrstvo za javno upravo (15)
Ministrstvo za notranje zadeve (11)
Informacijski pooblaščenec (6)
Geodetska uprava Republike Slovenije (6)
Statistični urad Republike Slovenije (4)
REPUBLIKA SLOVENIJA, MINISTRSTVO ZA KMETIJSTVO IN OKOLJE, AGENCIJA REPUBLIKE SLOVENIJE ZA OKOLJE (4)
Univerza v Mariboru - Fakulteta za elektrotehniko, računalništvo in informatiko (2)
Finančna uprava Republike Slovenije (2)
GEODETSKI INŠTITUT SLOVENIJE (1)
MINISTRSTVO ZA INFRASTRUKTURO IN PROSTOR, GEODETSKA UPRAVA REPUBLIKE SLOVENIJE (1)
Ministrstvo za kulturo (1)
USTAVNO SODIŠČE REPUBLIKE SLOVENIJE (1)
Protokol Republike Slovenije (1)
Komisija za preprečevanje korupcije (1)
Vrhovno sodišče Republike Slovenije (1)
Služba Vlade Republike Slovenije za zakonodajo (1)
Narodna in univerzitetna knjižnica Ljubljana (1)
Urad Vlade Republike Slovenije za komuniciranje (1)
Ministrstvo za kulturo (1)
All institutions

105 Results in catalogue

Sort by

The primary purpose of SI-CAS is to integrate the functionality of the electronic identification into IT solutions of the public sector. It is established as a central service for identity verification that is available to web applications. Central service makes sense, since it is a universal solution for all services in order to ensure security and trust that are needed for a reliable user identification. The central support enables easier management and allows the usage of different electronic identifiers of various issuers and the support of various technical solutions (eg. support for the reliable authentication via mobile phones) and their development. Users can authenticate using different e-identities of domestic and foreign identity providers. E-identities can have different trust assurance levels from the lowest level (user names and passwords, FB profile, ...) to the highest levels (e-identity on a secure token, eg. on a smart card) provided by different identity providers. The required trust assurance level is always determined by the service provider that uses the SI-CAS for authentication purposes. The only user data stored in SI-CAS are his e-mail address and appropriately protected (encrypted or protected by the hash function) basic identifiers. Instead, only the information of the registered identity providers and available attributes providers are stored in the system. If the service provider decides to use the SI-CAS it doesn’t have to integrate with each identity provider and attribute provider separately but only with SI-CAS. In the process of authentication SI-CAS acts as a trusted intermediary. On the service provider’s request it verifies the user's identity at the relevant identity provider and, where necessary, obtains further identification attributes from identity provider or attribute providers. For this purpose SI-CAS has established direct trust with service providers, identity providers and attribute providers. Trust is established both on the technological and on a formal level.

Available as: DOCX ZIP PDF
Asset | Release: 0.1 | Last change date: 04.09.2020 | 1916 views

Available as: PDF
Asset | Release: 0.1 | Last change date: 06.04.2020 | 523 views

HKOM network is used by those institutions (central government, part of local government and other) that have legal mandate to access internal information resources only available inside the network. Government communication network consists of "connecting part of the network", designed to rapidly connect various parts of the network and segment it (core, access, servers) and the "service part of the network" providing additional support services such as: - ensuring the quality of services in LAN, WAN and MAN network - providing security by firewalls to control traffic inside and between the institutions, - providing security by the IPS-IDS system for proactive control of network traffic flows, - ensuring the high availability of services and the managing of user sessions by load balancing devices, - providing internet access services, - providing centralized control, - management and control of wireless networks, - services for connection of server segments, - remote VPN access. Connectivity in the HKOM network is provided in one of the following ways: - using the Internet and VPN technology, - using own or leased optical connections, - using IP VPN connections. Government communication network HKOM is owned, controlled and managed by ministry responsible for public administration. Users of HKOM network can access the internet and networks of European union, to provide electronic services and general information on public administration. For users who are not connected via permanent connections, an effective security system is in place in the HKOM network to identify users. For this method of connection to the HKOM network, the data recognition system is used. For users who are connected via permanent connections, a more convenient way of connecting to the HKOM network is by establishing Virtual Private Networking (VPN).

Asset | Release: 0.1 | Last change date: 18.03.2020 | 2410 views