Invitatie De Participare – 11.07.2008

Total Page:16

File Type:pdf, Size:1020Kb

Invitatie De Participare – 11.07.2008 ANUNT DE PARTICIPARE NR. 20/9187/G.B/11.07.2008 Sectiunea I: AUTORITATEA CONTRACTANTA I.1) Denumirea, adresa si punct(e) de contact: SECRETARIATUL GENERAL AL GUVERNULUI Adresa postala: Piata Victoriei nr. 1, sector1, Localitatea: Bucuresti , Cod postal: 011754 , Romania , Punct(e) de contact: Marin Militaru , Tel. 313.98.25 , Email: [email protected] , Fax: 319.15.36. Adresa internet (URL): www.sgg.ro Adresa profilului cumparatorului (URL): www.e-licitatie.ro Adresa de la care se pot obtine informatii suplimentare: Punctul (punctele) de contact mentionat(e) anterior. Caietul de sarcini si documentele suplimentare (inclusiv documentele pentru dialogul competitiv si sistemul de achizitie dinamic) pot fi obtinute la: Punctul (punctele) de contact mentionat(e) anterior. Ofertele sau solicitarile de participare trebuie trimise la: Punctul (punctele) de contact mentionat(e) anterior. I.2) Tipul autoritatii contractante si activitatea principala (activitatile principale) Minister sau orice alta autoritate nationala sau federala, inclusiv subdiviziuni regionale sau locale ale acestora Activitate (activitati) Servicii generale ale administratiilor publice. Autoritatea contractanta actioneaza in numele altor autoritati contractante Nu Sectiunea II: OBIECTUL CONTRACTULUI II.1) Descriere. II.1.1) Denumirea data contractului de autoritatea contractanta. Achizitia de statii de lucru fixe, statii de lucru mobile, echipamente multifunctionale, imprimante de retea, echipamente active de retea, servere, echipamente periferice PC. II.1.2) Tipul contractului si locul de executare a lucrarilor, de livrare a produselor sau de prestare a serviciilor: Produse . Cumparare . Locul principal de livrare: SECRETARIATUL GENERAL AL GUVERNULUI, Piata Victoriei nr. 1 , sector 1, Bucuresti , Romania. II.1.3) Anuntul implica: Un contract de achizitii publice . II.1.4) Informatii privind acordul-cadru : nu este cazul. II.1.5) Descrierea succinta a contractului sau a achizitiei/achizitiilor Achizitia de statii de lucru fixe, statii de lucru mobile, echipamente multifunctionale, imprimante de retea, echipamente active de retea, servere, echipamente periferice PC conform fisei de date si a caietului de sarcini. II.1.6) Clasificare CPV (vocabularul comun privind achizitiile) 30231100-8- computere ; 30120000-6 – fotocopiatoare si echipamente de tiparire ; 32420000-3 – echipamente de retea; 30261000-6 – servere de retea; 30231220-5 – periferice informatice; II.1.7) Contractul intra sub incidenta acordului privind contractele de achizitii publice Nu. II.1.8) Impartire in loturi. Da. (Daca DA, este necesar sa se depuna oferte pentru: unul sau mai multe loturi) II.1.9) Vor fi acceptate variante. Nu. II.2) Cantitatea sau domeniul contractului. II.2.1) Cantitatea totala sau domeniul. LOT1 din care: a) Staţii de lucru fixe (unitate centrală / PC desktop): 27 buc. b) Monitoare (monitor / PC desktop): 27 buc. c) Staţie de lucru mobilă (PC / Laptop ): 7 buc. d) Monitoare ( monitor TFT-LCD 19”): 25 buc. LOT2 din care: a)Echipamente multifuncţionale desktop (copiator/printer/scanner): 7 buc. b)Echipamente multifuncţionale (copiator/printer/scanner): 2 buc. c)Imprimante de reţea (imprimante laser de reţea alb-negru ) 5 buc. d)Imprimante de reţea (imprimante laser de reţea color ) 7 buc e)Imprimantă de reţea (imprimantă laser de reţea color A3) 1 buc LOT3: Echipament multifuncţionaL - (Copiator/ Printer/Scanner echipament multifuncţional A4/A3 alb-negru) 1 buc. LOT4 din care: a)ECHIPAMENTE ACTIVE DE REŢEA (switch 8 porturi) 2 buc; (switch 24 porturi 10/100, 2 uplink Gigabit) 2 buc; (switch 24 porturi 10/100/1000, 2 uplink dual purpose) 5 buc; (switch 24 porturi 10/100/1000, 2 uplink X2 10 Gigabit Ethernet ) 2 buc; (router modular pentru servicii integrate cu accelerator hardware de VPN) 1 buc; b) ECHIPAMENTE ACTIVE DE REŢEA WIRELESS (router wireless) 2 buc; c) ECHIPAMENTE HARDWARE DE AUTENTIFICARE (token de autentificare cu interfaţă USB) 170 buc; d) SURSE NEINTRERUPTIBILE DE TENSIUNE (UPS 1.000VA 230V) 15 buc; (UPS 5.000VA 230V) 2 buc; LOT5 din care: a)SERVERE (server 2U rackmount 19") 8 buc; (server 2U rackmount 19") 1 buc; b)SOLUŢIE STORAGE REŢEA (echipament stocare date 3U rackmount 19") 1 buc; (unitate de banda 2U rackmount 19") 1 buc; (SAN switch optic 16 porturi) 2 buc; c)RACK SERVERE 19" (rack 19" accesorizat cu:1 x monitor TFT 17” cu tastatură, 2 x server console switch KVM, 4 x bare distribuţie alimentare, 2 x UPS) – 1 buc; LOT6 din care: ECHIPAMENTE PERIFERICE PC - videoproiector cu ecran de proiecţie - 2 buc Valoarea estimata fara TVA: 971075.62 LEI Moneda: RON II.2.2) Optiuni Nu. II.3) Durata contractului sau termenul pentru finalizare: 90 zile incepand de la data atribuirii contractului. Sectiunea III: INFORMATII JURIDICE, ECONOMICE, FINANCIARE SI TEHNICE III.1) Conditii referitoare la contract: III.1.1) Depozite valorice şi garantii solicitate. 3.061,18 lei pentru Lotul 1, 2.478,32 lei pentru Lotul 2, 3.000,00 lei pentru Lotul 3, 4.251,43 lei pentru Lotul 4, 6.442,35 lei pentru Lotul 5, 188,24 - lei pentru Lotul 6. III.1.2) Principalele modalitati de finantare si plata si/sau trimitere la dispozitiile relevante. Sursa de finantare: credite bugetare alocate in anul 2008. Plata se va efectua pe baza facturii emise de furnizor in conditiile stipulate in contract. III.1.3) Forma juridica pe care o va lua grupul de operatori economici caruia i se atribuie contractul Asociere/subcontractare. In cazul in care oferta comuna a grupurilor de operatori economici este declarata castigatoare, se solicita ca asocierea sa fie legalizata. III.1.4) Executarea contractului este supusa altor conditii speciale. Nu. III.2) Conditii de participare: Situatia personala a operatorilor economici, inclusiv cerintele referitoare la inscrierea in registrul comertului III.2.1) sau al profesiei. Informatii si formalitati necesare pentru evaluarea respectarii cerintelor mentionate . Declaratie privind eligibilitatea conform art. 180 din O.U.G. nr. 34/2006 ( formular 1). Declaratie privind neincadrarea in situatiile prevazute la art. 181 din O.U.G. nr. 34/2006 (formular 2). Certificat fiscal eliberat de Directia de Impozite si Taxe Locale. Certificat de atestare fiscala. Certificatul constatator eliberat de Oficiul Registrului Comertului. Certificatul de înregistrare fiscală eliberat de Oficiul Registrului Comerţului. III.2.2) Capacitatea economica si financiara . Fisa de informatii generale (formular 3). Bilantul contabil din anul precedent, vizat si inregistrat de organele competente. Document din care sa reiasa cifra de afaceri pe ultimii 2 ani. III.2.3) Capacitatea tehnica . Informatii si formalitati necesare pentru evaluarea respectarii cerintelor mentionate Document privind experienta similara (formular 4). Declaratie privind dotarile. Informatii referitoare la personalul de specialitate. Certificate emise de organisme abilitate în acest sens, care sa ateste conformitatea produselor. Autorizare pt. livrarea produselor (formular 5). Recomandari din partea altor beneficiari/clienti. Obligatii contractuale in desfasurare, fata de alti beneficiari/clienti. Documente, emise de organisme acreditate, care confirma certificarea sistemului calitatii. III.2.4) Contracte rezervate Nu . III.3) Conditii specifice pentru contractele de servicii III.3.1) Prestarea serviciilor in cauza este rezervata unei anumite profesii Nu . Persoanele juridice au obligatia sa indice numele si calificarile profesionale ale membrilor personalului III.3.2) responsabili pentru prestarea serviciilor respective Nu. SECTIUNEA IV: PROCEDURA IV.1) TIPUL PROCEDURII . IV.1.1) Tipul procedurii . Licitatie deschisa. IV.2) CRITERII DE ATRIBUIRE. IV.2.1) Criterii de atribuire Oferta cea mai avantajoasa din punct de vedere economic in ceea ce priveste : Criteriile enuntate in caietul de sarcini, in invitatia de a prezenta o oferta sau de a participa la negociere sau in documentul descriptiv. IV.2.2) Se va organiza o licitatie electronica. Nu. IV.3) Informatii administrative IV.3.1) Numar de referinta atribuit dosarului de autoritatea contractanta: 20/9186/GB/2008 IV.3.2) Anunturi publicate (anunt publicat) anterior privind acelasi contract: Nu. Conditii de obtinere a caietului de sarcini si a documentatiei suplimentare (cu exceptia unui SAD) sau a IV.3.3) documentului descriptiv (in cazul unui dialog competitiv) Termenul limita pentru depunerea cererilor de documente sau pentru acces la documente: Data: 22 08 2008 Ora: 17:00 Documente de plata: NU IV.3.4) Termen limita pentru primirea ofertelor sau a cererilor de participare: Data: 27 08 2008 Ora 17:00 IV.3.6) Limba sau limbile in care poate fi redactata oferta sau cererea de participare: Romana. IV.3.7) Perioada minima pe parcursul careia ofertantul trebuie sa isi mentina oferta: 45 de zile (de la termenul limita de primire a ofertelor). IV.3.8) Conditii de deschidere a ofertelor Data: 28 08 2008 Ora 10:00 Locul: Secretariatul General al Guvernului - Piata Victoriei nr. 1 , sector 1, Bucuresti, Romania. Persoane autorizate sa asiste la deschiderea ofertelor: Comisia de evaluare a ofertelor, experti cooptati si cate un reprezentant imputernicit din partea ofertantilor. SECTIUNEA VI: INFORMATII SUPLIMENTARE VI.1) Contractul este periodic: Nu. VI.2) Contractul se inscrie intr-un proiect/program finantat din fonduri comunitare: Nu. Alte informatii: Accesul la documentatia de atribuire este direct si nerestrictionat de la data publicarii pe www.e-licitatie.ro si pe adresa de internet www.sgg.ro. VI.3) Ofertantii vor putea depune oferte pentru unul sau mai multe loturi . Evaluarea ofertelor
Recommended publications
  • Vmware Vrealize Configuration Manager Installation Guide Vrealize Configuration Manager 5.8
    VMware vRealize Configuration Manager Installation Guide vRealize Configuration Manager 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-001815-00 vRealize Configuration Manager Installation Guide You can find the most up-to-date technical documentation on the VMware Web site at: Copyright http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2006–2015 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 5 Preparing to Install VCM 7 Typical or Advanced Installation 7 VCM Installation Configurations 8 Create VCM Domain Accounts 8 VCM Account Configuration 9 VCM Administrator Account 10 VCM User Accounts 10 Service Accounts 10 Network Authority Account 11 ECMSRSUser Account 12 SQL Server Permissions and Constructs 12 Gather Supporting Software
    [Show full text]
  • Curriculum Vitae Di Tommaso Cucinotta
    Curriculum Vitae: Prof. Tommaso Cucinotta Personal data Birth date and place: April 1974, Potenza (Italy) Phone: +39 (0)50 882 028 Skype Id: t.cucinotta E-mail: Home page: http:// retis . santannapisa .it/~tommaso Current status Dec 2015 to date: Associate Professor at the Real-Time Systems Laboratory (ReTiS) of Scuola Superiore Sant'Anna RESEARCH TOPICS & COMPETENCIES ❑ Real-time and reliable NoSQL Database systems for cloud services ❑ Adaptive resource management and scheduling in Cloud Computing & Network Function Virtualization infrastructures ❑ Artificial Intelligence and Machine Learning to support Data Center Operations in Cloud & NFV infrastructures ❑ Platforms for real-time data streaming and analytics ❑ Quality of service control for adaptive soft real-time applications, including multimedia and IMS systems ❑ Operating Systems for real-time and embedded applications and many-core and massively distributed systems ❑ Trusted computing and confidentiality in cloud computing ❑ Smart-cards: interoperability, protocols and architectures ❑ Digital signatures, biometrics identification, multicast security Experience highlights (details below) ❑ 7 Granted and 25 Filed EU and US Patents in the areas of security, resource management and scheduling ❑ 25 International Journal Publications, including IEEE Transaction on Computers, IEEE Transaction on Industrial Informatics and ACM Transactions on Embedded and Computing Systems ❑ 65 International Conference and Workshop Peer-reviewed Publications and 13 Book Chapters ❑ 3 EU Projects scientific
    [Show full text]
  • Microsoft Windows Server 2008 PKI and Deploying the Ncipher Hardware Security Module
    This is a joint nCipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the nCipher Hardware Security Module Abstract This paper discusses the benefits that are unique to deploying the integrated solution of the Windows Server 2008 PKI and the nCipher nShield and netHSM hardware security modules (HSM). This includes the essential concepts and technologies used to deploy a PKI and the best practice security and life cycle key management features provided by nCipher HSMs.. MicrosofT WIndoWs server 2008 PKI and dePloyIng The nCipher hardWare seCurity Module Introduction...............................................................................................................................................................................................3 PKI – A Crucial Component to Securing e-commerce ......................................................................................................................4 Microsoft Windows Server 2008 ...............................................................................................................................................................4 nCipher Hardware Security Modules ......................................................................................................................................................4 Best.Practice.Security.–.nCipher.HSMs.with.Windows.Server.2008.PKI................................................................................5 Overview...............................................................................................................................................................................................................5
    [Show full text]
  • Invisimole: the Hidden Part of the Story Unearthing Invisimole’S Espionage Toolset and Strategic Cooperations
    ESET Research white papers TLP: WHITE INVISIMOLE: THE HIDDEN PART OF THE STORY UNEARTHING INVISIMOLE’S ESPIONAGE TOOLSET AND STRATEGIC COOPERATIONS Authors: Zuzana Hromcová Anton Cherepanov TLP: WHITE 2 InvisiMole: The hidden part of the story CONTENTS 1 EXECUTIVE SUMMARY � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 4 2 ATTACKS AND INVESTIGATION � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 4 2.1 InvisiMole’s toolset ������������������������������������������������������������������������������������������������������������������������ 5 2.2 Cooperation between InvisiMole and Gamaredon . 5 3 BUILDING BLOCKS � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 6 3.1 Structure ������������������������������������������������������������������������������������������������������������������������������������������6 3.1.1 InvisiMole blobs . 6 3.1.2 Execution guardrails with DPAPI ���������������������������������������������������������������������������������7 3.2 Payload ��������������������������������������������������������������������������������������������������������������������������������������������8 3.2.1 TCP downloader ��������������������������������������������������������������������������������������������������������������9 3.2.2 DNS downloader . 9 3.2.3 RC2CL backdoor �������������������������������������������������������������������������������������������������������������13
    [Show full text]
  • Game Programming Gems 7
    Game Programming Gems 7 Edited by Scott Jacobs Charles River Media A part of Course Technology, Cengage Learning Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Publisher and General Manager, © 2008 Course Technology, a part of Cengage Learning. Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: ALL RIGHTS RESERVED. No part of this work covered by the copyright Sarah Panella herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to Heather Manager of Editorial Services: photocopying, recording, scanning, digitizing, taping, Web distribution, Talbot information networks, or information storage and retrieval systems, except Marketing Manager: Jordan Casey as permitted under Section 107 or 108 of the 1976 United States Copyright Senior Acquisitions Editor: Emi Smith Act, without the prior written permission of the publisher. Project/Copy Editor: Kezia Endsley CRM Editorial Services Coordinator: Jen Blaney For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 Interior Layout Tech: Judith Littlefield Cover Designer: Tyler Creative Services For permission to use material from this text or product, CD-ROM Producer: Brandon Penticuff submit all requests online at cengage.com/permissions Further permissions questions can be emailed to Valerie Haynes Perry Indexer: [email protected] Proofreader: Sue Boshers Library of Congress Control Number: 2007939358 ISBN-13: 978-1-58450-527-3 ISBN-10: 1-58450-527-3 eISBN-10: 1-30527-676-0 Course Technology 25 Thomson Place Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan.
    [Show full text]
  • Mastering Windows XP Registry
    Mastering Windows XP Registry Peter Hipson Associate Publisher: Joel Fugazzotto Acquisitions and Developmental Editor: Ellen L. Dendy Editor: Anamary Ehlen Production Editor: Elizabeth Campbell Technical Editor: Donald Fuller Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nanette Duffy, Emily Hsuan, Laurie O'Connell, Yariv Rabinovitch, Nancy Riddiough Book Designer: Maureen Forys, Happenstance Type-O-Rama Indexer: Ted Laux Cover Designer: Design Site Cover Illustrator: Sergie Loobkoff Copyright © 2002 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as the author is attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand-alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. First edition copyright © 2000 SYBEX Inc. Library of Congress Card Number: 2002100057 ISBN: 0-7821-2987-0 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc. in the United States and/or other countries. Mastering is a trademark of SYBEX Inc. Screen reproductions produced with FullShot 99. FullShot 99 © 1991-1999 Inbit Incorporated. All rights reserved.FullShot is a trademark of Inbit Incorporated.
    [Show full text]
  • Table of Contents
    A Comprehensive Introduction to Vista Operating System Table of Contents Chapter 1 - Windows Vista Chapter 2 - Development of Windows Vista Chapter 3 - Features New to Windows Vista Chapter 4 - Technical Features New to Windows Vista Chapter 5 - Security and Safety Features New to Windows Vista Chapter 6 - Windows Vista Editions Chapter 7 - Criticism of Windows Vista Chapter 8 - Windows Vista Networking Technologies Chapter 9 -WT Vista Transformation Pack _____________________ WORLD TECHNOLOGIES _____________________ Abstraction and Closure in Computer Science Table of Contents Chapter 1 - Abstraction (Computer Science) Chapter 2 - Closure (Computer Science) Chapter 3 - Control Flow and Structured Programming Chapter 4 - Abstract Data Type and Object (Computer Science) Chapter 5 - Levels of Abstraction Chapter 6 - Anonymous Function WT _____________________ WORLD TECHNOLOGIES _____________________ Advanced Linux Operating Systems Table of Contents Chapter 1 - Introduction to Linux Chapter 2 - Linux Kernel Chapter 3 - History of Linux Chapter 4 - Linux Adoption Chapter 5 - Linux Distribution Chapter 6 - SCO-Linux Controversies Chapter 7 - GNU/Linux Naming Controversy Chapter 8 -WT Criticism of Desktop Linux _____________________ WORLD TECHNOLOGIES _____________________ Advanced Software Testing Table of Contents Chapter 1 - Software Testing Chapter 2 - Application Programming Interface and Code Coverage Chapter 3 - Fault Injection and Mutation Testing Chapter 4 - Exploratory Testing, Fuzz Testing and Equivalence Partitioning Chapter 5
    [Show full text]
  • Technical Specification of Cryptomate64 USB Cryptographic
    CryptoMate64 USB Cryptographic Token Technical Specifications V1.06 Subject to change without prior notice [email protected] www.acs.com.hk Table of Contents 1.0. Introduction ............................................................................................................. 3 2.0. Features ................................................................................................................... 4 2.1. Cryptographic Smart Card and Crypto-processor Features .................................................. 4 2.2. Token Features ...................................................................................................................... 4 3.0. Typical Applications ................................................................................................ 5 4.0. Middleware ............................................................................................................... 6 5.0. Technical Specifications ......................................................................................... 7 List of Figures Figure 1 : CryptoMate64 System Block Diagram ................................................................................... 3 Figure 2 : Middleware Diagram .............................................................................................................. 6 Page 2 of 8 CryptoMate64 – Technical Specifications [email protected] Version 1.06 www.acs.com.hk 1.0. Introduction CryptoMate64 is a lightweight USB token that provides users with strong authentication solutions and the CCID-compliant
    [Show full text]
  • Security Policy for FIPS 140-2 Validation
    Enhanced Cryptographic Provider Security Policy for FIPS 140‐2 Validation Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows RT Microsoft Surface Windows RT Microsoft Surface Windows 8 Pro Microsoft Windows Phone 8 Microsoft Windows Storage Server 2012 Enhanced Cryptographic Provider (RSAENH.DLL) DOCUMENT INFORMATION Version Number 1.2 Updated On December 17, 2014 © 2014 Microsoft. All Rights Reserved Page 1 of 25 This Security Policy is non‐proprietary and may be reproduced only in its original entirety (without revision). Enhanced Cryptographic Provider The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Administrator's Guide
    OVERLAPS 3.0.11.0 Administrator’s Guide 1 Copyright ©2018-2020 Int64 Software Ltd. | Last Updated 22nd October 2020 OVERLAPS 3.0.11.0 1 System Requirements ........................................................................................................... 5 2 Installation .............................................................................................................................. 6 2.1 Running the Installer .................................................................................................................. 6 2.2 Installing your Licence File......................................................................................................... 8 3 First Configuration ................................................................................................................. 9 3.1 Configuration Tools .................................................................................................................... 9 3.1.1 olconfig.exe Command Line Interface ................................................................................................. 9 3.1.2 OVERLAPS Configuration Utility (GUI) ................................................................................................ 10 3.2 Configuring Kerberos ............................................................................................................... 15 3.2.1 Configuring Kerberos using the Configuration Utility ..................................................................... 16 3.2.2 Configuring Kerberos using
    [Show full text]
  • A Smart Card Solution for Access Control and Trust Management for Nomadic Users
    A Smart Card Solution for Access Control and Trust Management for Nomadic Users Daniel D´ıaz S´anchez, Andr´es Mar´ın Lopez, and Florina Almen´arez Mendoza Telematic Engineering Department, Carlos III University of Madrid, Avda. Universidad, 30, 28911 Legan´es (Madrid), Spain {dds, amarin, florina}@it.uc3m.es Abstract. Increasing efforts are placed on security solutions for no- madic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security. Nevertheless, such solutions concentrate only on offering the cryptographical capabilities of the smart card, together with key and user certificate storage. Advanced trust management and access control are not addressed. In this article, we propose a scheme to include trust management and attribute certifi- cates for authorization in two widely used cryptographic APIs: Microsoft CryptoAPI and RSA labs PKCS#11. 1 Introduction Increasing efforts are placed on security solutions for nomadic users. VPN clients and https support can be found in mobile devices such as phones and PDAs. The popularity of applications using cryptographic APIs is growing fast, specially in e-business, but also in e-government, e-learning, or e-health. Solutions based on smart cards offer portability (size, weight), robustness (humidity, temperature), wide support (standards, operating systems, readers), low cost, and high security due to their tamper-proof nature. Smart cards are convenient wallet solutions for average user needs. They are used in a number of applications like e-purse applications, or as the basis of cryptographic APIs to store keys, or user certificates([1], [2, 3]). Similar efforts and solutions are needed for trust management, security cornerstone.
    [Show full text]
  • Visual C# .NET Developer's Handbook
    Visual C# .NET Developer's Handbook John Paul Mueller Associate Publisher: Richard Mills Acquisitions and Developmental Editor: Denise Santoro Lincoln Editor: Colleen Wheeler Strand Production Editor: Kylie Johnston Technical Editor: Ross Russell Mullen Graphic Illustrator: Tony Jonick Electronic Publishing Specialist: Nila Nichols Proofreaders: Amey Garber, Dave Nash, Laurie O'Connell, Yariv Rabinovitch, Nancy Riddiough Indexer: Ron Strauss CD Coordinator: Dan Mummert CD Technician: Kevin Ly Cover Designer: Carol Gorska/Gorska Design Cover Photographer: Glen Allison/PhotoDisc Copyright © 2002 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. The author created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as the author is attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand-alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. Library of Congress Card Number: 2002103166 ISBN: 0-7821-4047-5 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc. in the United States and/or other countries.Screen reproductions produced with FullShot 99. FullShot 99 © 1991-1999 Inbit Incorporated. All rights reserved.FullShot is a trademark of Inbit Incorporated. The CD interface was created using Macromedia Director, COPYRIGHT 1994, 1997-1999 Macromedia Inc.
    [Show full text]