e-Government Program (Yesser) YEsser Framework Interoperability (YEFI) YEFI Technical Standards Version 1.1 Date: 27/05/2007 e-Government Program (Yesser) Version 1.1 - Page 2 / 63 Document Description Document Title Document version Document Status YEFI Technical Standards 1.1 Final Versioning Version 0.1 1.0 1.1 Date 01-Apr-07 27-May-07 24-Nov-07 Description of changes made First Draft created Final Update with government agencies’ comments Document Validation Version Author Review by Version Error! Unknown document property name. Date Status Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 3 / 63 Table of Contents 1. Introduction ....................................................................................................................... 7 1.1. Definitions .................................................................................................................... 7 1.1.1. 1.1.2. 1.1.3. 1.2. E-Government in Saudi Arabia ..................................................................................... 7 1.2.1. 1.2.2. 1.2.3. 1.3. 1.4. 1.5. 1.6. The e-Government Concept ................................................................................................................ 7 Yesser ................................................................................................................................................. 7 Yesser Interoperability Framework (YEFI) .......................................................................................... 7 The Program Philosophy ..................................................................................................................... 7 Yesser and ICT in Government ........................................................................................................... 8 Rationale for YEFI ............................................................................................................................... 9 Document Purpose ...................................................................................................... 9 Scope ......................................................................................................................... 10 Target Audience ......................................................................................................... 10 Guiding Principles ...................................................................................................... 10 1.6.1. 1.6.2. 1.6.3. 1.6.4. 1.6.5. 1.6.6. 1.6.7. 1.6.8. 1.6.9. Resolution no. 40, March 2006.......................................................................................................... 10 YEFI is a Living Framework............................................................................................................... 10 Yesser Interoperability Committee .................................................................................................... 10 Use of Open Standards ..................................................................................................................... 11 Publication ......................................................................................................................................... 11 Do not reinvent the wheel .................................................................................................................. 11 Government should not be adversely affected .................................................................................. 11 Reference to Other International Interoperability Frameworks .......................................................... 11 Change Control ................................................................................................................................. 11 1.7. Document Structure ................................................................................................... 12 1.8. Document Assumptions ............................................................................................. 12 1.9. Glossary ..................................................................................................................... 13 2. Summary – Standards Snapshot ................................................................................... 14 2.1. Classification .............................................................................................................. 14 2.2. Approved Standards................................................................................................... 15 2.3. Candidate Standards.................................................................................................. 19 2.4. Emerging Standards................................................................................................... 20 2.5. Deprecated Standards ............................................................................................... 21 3. Policies ............................................................................................................................ 22 3.1. Technical Policies ...................................................................................................... 22 3.1.1. 3.1.2. 3.1.3. 3.1.4. 3.1.5. 3.1.6. 3.1.7. 4. Adoption ............................................................................................................................................ 23 Compliance ....................................................................................................................................... 23 Open Standards ................................................................................................................................ 23 Procurement ...................................................................................................................................... 23 Redesigning Service Delivery............................................................................................................ 23 The Internet is Key ............................................................................................................................ 23 Minimizing the Reliance on Manual Services .................................................................................... 23 Technical Standards ....................................................................................................... 24 4.1. Introduction to Technical Standards ........................................................................... 24 4.2. Presentation and User Interface Standards ................................................................ 24 4.2.1. 4.2.2. 4.2.3. 4.2.4. 4.2.5. 4.2.6. 4.2.7. 4.2.8. 4.2.9. 4.3. HTML ................................................................................................................................................ 24 XHTML .............................................................................................................................................. 25 JPEG ................................................................................................................................................. 25 GIF .................................................................................................................................................... 25 PNG .................................................................................................................................................. 26 TIFF................................................................................................................................................... 26 Ecma Script / Javascript .................................................................................................................... 26 Atom .................................................................................................................................................. 26 WAI ................................................................................................................................................... 27 Multimedia .................................................................................................................. 28 4.3.1. 4.3.2. 4.3.3. MPEG-1/2 Audio Layer 3 .................................................................................................................. 28 AAC ................................................................................................................................................... 28 WMA ................................................................................................................................................. 28 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 4 / 63 4.3.4. 4.3.5. 4.3.6. 4.3.7. 4.3.8. 4.3.9. 4.3.10. 4.4. Standards for web based and electronic services ....................................................... 32 4.4.1. 4.4.2. 4.4.3. 4.4.4. 4.4.5. 4.4.6. 4.4.7. 4.4.8. 4.4.9. 4.5. 4.6. Unicode ............................................................................................................................................. 35 UTF-16 .............................................................................................................................................. 35 UTF-8 ................................................................................................................................................ 35 RTF ................................................................................................................................................... 35 .txt ..................................................................................................................................................... 36 PDF ................................................................................................................................................... 36 Microsoft Office binary formats .......................................................................................................... 36 ODF ................................................................................................................................................... 37 UML ................................................................................................................................................... 37 XMI .................................................................................................................................................... 37 UBL ................................................................................................................................................... 37 Xpath ................................................................................................................................................. 38 ISO 11179-5 ...................................................................................................................................... 38 Core Component Technical Specification ......................................................................................... 38 DCMI ................................................................................................................................................. 39 XNAL ................................................................................................................................................. 39 ISO 639 - Language Codes ............................................................................................................... 39 ISO 4217 - Currency Codes .............................................................................................................. 40 ISO Country Codes ........................................................................................................................... 40 Connectivity Standards .............................................................................................. 41 4.7.1. 4.7.2. 4.7.3. 4.7.4. 4.7.5. 4.7.6. 4.7.7. 4.7.8. 4.7.9. 4.7.10. 4.7.11. 4.7.12. 4.7.13. 4.7.14. 4.7.15. 4.8. XML ................................................................................................................................................... 32 SOAP ................................................................................................................................................ 32 WSDL ................................................................................................................................................ 32 UDDI ................................................................................................................................................. 32 EbXML .............................................................................................................................................. 33 XML Schema ..................................................................................................................................... 33 XSL ................................................................................................................................................... 33 BPMN ................................................................................................................................................ 34 EDI .................................................................................................................................................... 34 WS - I ......................................................................................................................... 34 Information and Data Exchange Standards ................................................................ 35 4.6.1. 4.6.2. 4.6.3. 4.6.4. 4.6.5. 4.6.6. 4.6.7. 4.6.8. 4.6.9. 4.6.10. 4.6.11. 4.6.12. 4.6.13. 4.6.14. 4.6.15. 4.6.16. 4.6.17. 4.6.18. 4.6.19. 4.7. Real Audio ......................................................................................................................................... 29 MPEG-4 Part 2 .................................................................................................................................. 29 H.264/MPEG-4 part 10/AVC.............................................................................................................. 29 Real Video ......................................................................................................................................... 29 WMV ................................................................................................................................................. 30 MPEG-4 ............................................................................................................................................ 31 ASF ................................................................................................................................................... 30 S/MIME ............................................................................................................................................. 41 POP ................................................................................................................................................... 41 IMAP ................................................................................................................................................. 41 HTTP ................................................................................................................................................. 41 HTTPS .............................................................................................................................................. 42 LDAP ................................................................................................................................................. 42 DNS ................................................................................................................................................... 42 FTP ................................................................................................................................................... 43 FTPS ................................................................................................................................................. 43 IP ....................................................................................................................................................... 43 TCP ................................................................................................................................................... 43 UDP ................................................................................................................................................... 44 IEEE 802.11 ...................................................................................................................................... 44 SMTP ................................................................................................................................................ 44 VPN ................................................................................................................................................... 44 Security Standards ..................................................................................................... 46 4.8.1. 4.8.2. 4.8.3. 4.8.4. 4.8.5. 4.8.6. 4.8.7. 4.8.8. 4.8.9. 4.8.10. PKCS #7 (RFC 2315) ........................................................................................................................ 46 IpSec ................................................................................................................................................. 46 SSL ................................................................................................................................................... 46 TLS.................................................................................................................................................... 46 TDES ................................................................................................................................................. 47 AES ................................................................................................................................................... 47 RSA ................................................................................................................................................... 47 SAML ................................................................................................................................................ 47 WPA .................................................................................................................................................. 48 WS-security ....................................................................................................................................... 48 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 5 / 63 5. Other standards............................................................................................................... 49 5.1. Candidate Standards.................................................................................................. 49 5.1.1. 5.1.2. 5.1.3. 5.1.4. 5.1.5. 5.1.6. 5.1.7. 5.2. Emerging Standards................................................................................................... 52 5.2.1. 5.3. Pending YIC Approval ....................................................................................................................... 49 XBRL ................................................................................................................................................. 49 XHTML Mobile Profile ....................................................................................................................... 49 MPLS ................................................................................................................................................ 49 Saudi Post National Address Profile.................................................................................................. 50 XML Encryption ................................................................................................................................. 50 XML Signature................................................................................................................................... 50 Office Open XML ............................................................................................................................... 52 Deprecated standards ................................................................................................ 53 5.3.1. 5.3.2. 5.3.3. 5.3.4. 5.3.5. 5.3.6. 5.3.7. 5.3.8. 5.3.9. 5.3.10. 5.3.11. 5.3.12. WML .................................................................................................................................................. 53 EPS ................................................................................................................................................... 53 ISO/IEC 8859-1:1998 ........................................................................................................................ 53 ASCII ................................................................................................................................................. 54 WAP .................................................................................................................................................. 54 DES ................................................................................................................................................... 54 RSS ................................................................................................................................................... 54 DTD ................................................................................................................................................... 55 MPEG-1 ............................................................................................................................................ 55 MPEG-2 ............................................................................................................................................ 30 AVI .................................................................................................................................................... 55 Quicktime .......................................................................................................................................... 56 6. Choosing Standards ....................................................................................................... 57 6.1. International Standards Bodies .................................................................................. 57 6.2. Standards per International body ............................................................................... 59 7. Acknowledgements......................................................................................................... 63 7.1. Copyright Notices ....................................................................................................... 63 Copyright Notice This document is a working draft or committee draft and is copyright-protected by MCIT. While the reproduction of working drafts or committee drafts in any form for use by participants in the YEFI standards development process is permitted without prior permission from MCIT, neither this document nor any extract from it may be reproduced, stored or transmitted in any form for any other purpose without prior written permission from MCIT. Reproduction for sales purposes may be subject to royalty payments or a licensing agreement. Violators may be prosecuted. List of Tables Table 1: Document Structure .................................................................................................... 12 Table 2: Glossary ..................................................................................................................... 13 Table 3: Presentation & User Interface approved standards ..................................................... 15 Table 3: Presentation & User Interface approved standards..................................................... 15 Table 4: Web Based & Electronic Services approved standards ............................................. 16 Table 5: Information & Data Exchange approved standards ..................................................... 17 Table 6: Connectivity approved standards ................................................................................ 17 Table 7: Security approved standards ...................................................................................... 18 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 6 / 63 Table 8: Candidate Application Integration Standards .............................................................. 19 Table 9: Information Access and Interchange candidate standards .......................................... 19 Table 10: Interconnectivity candidate standards ....................................................................... 19 Table 11: Security candidate standards .................................................................................... 19 Table 12: Emerging Standards ................................................................................................. 20 Table 13: Deprecated Standards .............................................................................................. 21 Table 14: SSO list .................................................................................................................... 59 Table 15: OpenGIS and Ecma standrads ................................................................................. 59 Table 16: W3C & OASIS standards .......................................................................................... 60 Table 17: W3C standards ......................................................................................................... 62 List of Figures Figure 1 Yesser Program ........................................................................................................... 8 Figure 2 YEFI, YESSER and outside interactions....................................................................... 9 Figure 3 YEFI High Level Architecture...................................................................................... 24 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 7 / 63 1. 1.1. Introduction Definitions 1.1.1.The e-Government Concept1 E-Government may be defined as the effective, integrated utilization of all information and communication technologies to ease and speed up transactions in government organizations (G2G), between government organizations and customers (G2C), between government organizations and their employees (G2E) and between government organizations and business organizations (G2B). 1.1.2.Yesser The e-Government Program - Yesser - was launched with the following objectives: o Raising the public sector's productivity and efficiency o Providing better and more easy-to-use services for individual and business customers o Increasing return on investment (ROI) o Providing the required information in a timely and highly accurate fashion. 1.1.3.Yesser Interoperability Framework (YEFI)2 It’s a unified framework to implement e-government. It includes cross – governmental specifications and policies, to enable cross – governmental integration and facilitate G2G transactions and data sharing. 1.2. E-Government in Saudi Arabia The Government of Saudi Arabia attaches high significance to the e-government concept and the transformation process that leads to its realization. It strongly believes in the huge benefits such concept of e-government entails for the national economy. Transformation to an information society cannot be achieved without comprehensive collaboration and concerted efforts to realize the set objectives. 1.2.1. The Program Philosophy Yesser plays the role of enabling the implementation of e-government. It reduces, as much as possible, centralization in e-government implementation while ensuring the minimum level of coordination between government departments. The program's work methodology is based on the following main principles: 1 2 Principle 1 Unified vision, priorities, standards and frameworks Principle 2 Not only technology, but much more Principle 3 Reduce centralization as much as possible Referenced from the YESSER website: http://www.yesser.gov.sa/english/what_is_gov.asp?id=item2 Referenced from the YESSER website: http://www.yesser.gov.sa/english/YEFI.asp?id=item4 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 8 / 63 Principle 4 Develop once, use many times 1.2.2.Yesser and ICT in Government ICT applications in government organizations have three categories: 1. Applications common to all government organizations (common applications) such as personnel systems, financial systems, document management systems, etc. 2. Applications that are jointly used by multiple government organizations such as recruitment applications 3. Applications that are specifically used by one government organization. Internet E-Services YEFI GSB YIC GRP Portal YESSER Agency Agency Agency Agency Agency Agency Agency Figure 1 Yesser Program Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 9 / 63 1.2.3. Rationale for YEFI o o o Enable electronic cross – governmental integration. Facilitate cross – governmental data sharing. Facilitate cross – governmental transactions. It is clear that in order to achieve cross-governmental integration and data sharing, a standards framework defining common technical policies and standards is necessary. In the context of e-Government, the standards framework will be encompassed and delivered by the YESSER Framework for Interoperability (YEFI) which will provide the necessary standards required to guarantee interoperability, integration, portability and reusability of systems. YEFI shall be a foundation framework for achieving the overall e-Government strategy and help to ensure that all government systems, processes and electronic services (i.e. eServices) are fit for their purpose. YEFI GSB YESSER Security / Firewalls Figure 2 YEFI, YESSER and outside interactions 1.3. Document Purpose The purpose of this document is to present Version 1.0 of the Technical Standards for YEFI. The intention of this document is that it should be used for consultation purposes within the Yesser Interoperability Committee (YIC) and for consultation purposes across the government agencies in Saudi Arabia. The technical standards document aims to inform which technology and engineering standards will be applicable for cross-governmental integration and data sharing. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 10 / 63 It is expected that the next version of this document, once consultation is complete, will form the basis for the first publicly available YEFI documentation. 1.4. Scope This document provides Technical standards for the following areas: 1.5. Presentation and User interface Multimedia Web based and Electronic service Information and Data Exchange Connectivity Security Target Audience This document is aimed at the prospective users of the YEFI framework, namely, Ministries and other government entities Decision makers and policy analysts ICT managers and Business analysts Businesses and Vendors Other stakeholders involved in interoperability projects or strategies 1.6. Guiding Principles 1.6.1.Resolution no. 40, March 2006 Resolution no. 40 of the Council of Ministers, dated March 2006, provides the baseline mandate for how agencies should approach information and data management to secure an interoperability solution for the delivery of electronic services to the users of government. 1.6.2.YEFI is a Living Framework YEFI is a living framework subject to formal review cycles. To minimize impacts brought about by changes to YEFI, all reasonable efforts will be taken to provide agencies with upfront communications about changes and requisite responses. 1.6.3.Yesser Interoperability Committee YEFI and any recommended changes are subject to approval by the members of the Yesser Interoperability Committee (YIC). Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 11 / 63 1.6.4.Use of Open Standards Wherever possible, YEFI will build upon international open standards. Where these standards do not exist or do not meet the needs for KSA, existing best practices and local industry standards may be adopted. The intention of this principle is that YEFI does not “re-invent the wheel”. 1.6.5.Publication All materials, which constitute the latest version of YEFI, will be published on the Internet and will be freely available to the public including stakeholders involved in interoperability projects or strategies. 1.6.6.Do not reinvent the wheel Any experiences relating to Interoperability standards and/or policies relevant to YEFI and arising from work that a government agency has already conducted will be reviewed and incorporated where possible. The intention of this principle is to not re-invent the wheel. 1.6.7.Government should not be adversely affected Where an organization is negatively affected by the adoption of YEFI, a Working Group may be appointed to work directly to resolve any issues. 1.6.8.Reference to Other International Interoperability Frameworks Interoperability frameworks from other countries will be used as reference where applicable. Regular checks for compatibility with other countries' interoperability frameworks should be part of the revision cycle for YEFI 1.6.9.Change Control All major changes to YEFI shall be subject to a change management and consultation process with all stakeholders, businesses and YIC members. Minor changes shall be subject to change management process and consultation with YIC members. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 12 / 63 1.7. Document Structure This document has the following structure: Section 1. Introduction 2. Summary 3. Policies 4. Technical Standards 5. Other Standards 6. Choosing Standards 7. Acknowledgements Description This section provides information about the purpose and background to the YEFI In this section, the classification of the standards is explained and the Approved and Candidate Standards are provided in a simple tabular form for visual reference. ICT policies relevant to the development and delivery of YEFI as a foundation framework for YESSER In this section, all the recommended standards for YEFI 1.0 are described. This section includes commentaries about the use of the Standards In this section, the Candidate, Emerging and Deprecated standards. This section provides a small discussion primer on what each Standards Body brings to the table and the focus area for each body / organization. The expectation is that this section will be removed from later versions of the Technical Standards. Acknowledgements, copyright notices etc. Table 1: Document Structure 1.8. Document Assumptions This document makes the following assumptions: Assumption 1 MCIT and YIC have people available to review and critique this document before it is distributed for wider review across government. Assumption 2 Delivery of this document is part of the consultation phase for Version 1.0. It is expected that the consultation phase may take up to 4 months to complete pending the amount of feedback and revisions needed to formalize the final version. Assumption 3 YIC is the body that formally accepts the YEFI as delivered. Assumption 4 This document will be replaced by a web-based HTML and/or PDF version available via either the Yesser website or the new, yet to be developed, YEFI portal. Assumption 5 Delivery of this document to MCIT and YIC signals the end of the Technical Standards stream for the current YEFI project. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 13 / 63 1.9. Glossary Abbreviation Description YIC YEFI Interoperability Committee YEFI YEsser Framework for Interoperability Table 2: Glossary Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 14 / 63 2. Summary – Standards Snapshot It is clear that in order to achieve cross-governmental integration and data sharing, a standards framework defining common technical policies and standards is necessary. In the context of e-Government, the standards framework will be encompassed and delivered by the YESSER Framework for Interoperability (YEFI) which will provide the necessary standards required to guarantee interoperability, integration, portability and reusability of systems. YEFI shall be a foundation framework for achieving the overall e-Government strategy and help to ensure that all government systems, processes and electronic services (i.e. eServices) are fit for their purpose. Snapshots The remainder of this section provides a snapshot list of the proposed Technical Standards for YEFI. The standards are described in detail in Section 3 and have hyperlinks to the respective authoritative sources for each standard. 2.1. Classification The standards are grouped in to four categories: Approved Those Standards (International or De Facto) agreed by YIC for inclusion in the YEFI Candidate Standards waiting YIC approval for inclusion as Approved Standards in the YEFI Emerging Standards and/or protocols coming through either the standardization process or are market driven and that bear watching by the YEFI team Deprecated Those standards and/or protocols that should not now be used Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 15 / 63 2.2. Approved Standards Presentation & User Interface Acronym and Version Hypertext Mark-up Language HTML 4.01 Extensible Hypertext Mark-up Language XHTML 1.0 Joint Photographic Experts Group JPEG Graphics Interchange Format GIF Portable Network Graphics PNG Tag Image File Format TIFF ECMA Script ECMA 262 Script 3rd Ed Atom Atom 1.0 Web Accessibility Initiative WAI Table 3: Presentation & User Interface approved standards Multimedia Acronym and Version MPEG-1/2 Audio Layer 3 MP3 Advanced Audio Codec AAC Windows Media Audio WMA 9.0 Real Audio Real Audio MPEG-4 Part 2 MPEG-4 Part 2 H.264/MPEG-4 part 10/AVC H.264/MPEG-4 part 10/AVC Real Video Real Video Windows Media Video WMV 9.0 Moving Picture Experts Group 4 MPEG-4 Advanced Systems Format ASF Table 4: Multimedia approved standards Web Based & Electronic Services Version Error! Unknown document property name. Acronym and Version Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 16 / 63 Extensible markup language XML 1.1 Simple Object Access Protocol SOAP 1.1 Web Services Definition Language WSDL 2.0 Universal Description, Discovery and Integration UDDI 2.0 E-business Extensible Mark-up Language EbXML 1.0 Extensible Mark-up Language Schema XML Schema 1.0 Extensible Stylesheet Language XSL Business Process Modeling Notation BPMN Electronic Document Interchange EDI Web Services Interoperability WS-I Table 5: Web Based & Electronic Services approved standards Information & Data Exchange Acronym and Version Unicode UNICODE ISO/IEC 106461:2000 5.0 Unicode Transformation Format 16 bit UTF-16 Unicode Transformation Format 8 bit UTF-8 Rich Text Format RTF 1.6 Text .txt Portable Document Format PDF Microsoft Office 1997 MS Office 97 binary formats OpenDocument Format ODF 1.1 Unified Modeling Language UML Extensible Metadata Interchange XMI Universal Business Language UBL XML Path Language Xpath ISO 11179-5 ISO 11179-5 Core Component Technical Specification Core Component Technical Specification Dublin Core Metadata Initiative DCMI Extensible Name and Address mark-up Language ISO 639 - Language Codes ISO 4217 - Currency Codes Version Error! Unknown document property name. XNAL ISO 639 ISO 4217 Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 17 / 63 ISO Country Codes ISO 3166-1, 3166-2 Table 6: Information & Data Exchange approved standards Connectivity Acronym and Version Secure / Multipurpose Internet Mail Extensions Post Office Protocol S/MIME 3.0 POP 3.0 Internet Message Access Protocol Hypertext Transfer Protocol Secure Hypertext Transfer Protocol Lightweight Directory Access Protocol Domain Name Server IMAP 4.0 HTTP 1.1 HTTPS LDAP v3 DNS File Transfer Protocol FTP File Transfer Protocol over Secure Socket Layer Internet Protocol FTPS IP v4 Transmission Control Protocol User Datagram Format TCP UDP Wireless Channel G IEEE 802.11g Simple Mail Transfer Protocol Virtual Private Network SMTP VPN Table 7: Connectivity approved standards Security Acronym and Version Public-Key Cryptography Standard Internet Protocol Security Secure Socket Layer Transport Layer Security Triple Data Encryption Standard Advanced Encryption Standard RSA Algorithm Version Error! Unknown document property name. PKCS #7 (RFC 2315) 1.5 IPsec SSL 3.0 TLS 1.1 TDES AES RSA Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 18 / 63 Security Assertion Mark-up Language Wi-Fi Protected Access SAML 2.0 WPA 2 Web Services Security WS-security Table 8: Security approved standards Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 19 / 63 2.3. Candidate Standards Application Integration candidate Standards Acronym and Version Extensible Business Reporting Language XBRL Table 9: Application Integration candidate Standard Information Access and Interchange Acronym and Version Extensible Hypertext Mark-up Language for Mobile Profile XHTML Mobile Profile 1.1 Saudi Post National Address File Table 10: Information Access and Interchange candidate standards Interconnectivity Acronym and Version Multi-protocol Label Switching MPLS Table 11: Interconnectivity candidate standard Security Acronym and Version Extensible Mark-up Language Encryption XML Encryption Extensible Mark-up Language Signature XML Signature Table 12: Security candidate standards Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 20 / 63 2.4. Emerging Standards Emerging Standards Acronym and Version Office Open XML OOXML Table 13: Emerging Standard Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 21 / 63 2.5. Deprecated Standards Deprecated standards Acronym and Version Wireless Markup Language WML Encapsulated PostScript EPS ISO/IEC 8859-1:1998 ISO/IEC 8859-1:1998 American Standard Code for Information Interchange ASCII Wireless Application Protocol WAP Data Encryption Standard DES Really Simple Syndication / Rich Site Summary RSS Document Type Definition DTD Moving Picture Experts Group 1 MPEG 1 Moving Picture Experts Group 2 MPEG 2 Audio Video Interleave AVI Table 14: Deprecated Standards Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 22 / 63 3. Policies The key policy decisions that will serve to shape YEFI include: 1. Alignment with the Internet: the universal adoption of common specifications used on the Internet and World Wide Web for all public sector information systems; 2. Adoption of XML as the primary standard for data integration and data management for all public sector systems; 3. Adoption of the browser as the key interface: all public sector information systems are to be accessible through browser-based technology; other interfaces are permitted but only in addition to browser-based ones; 4. The development and adoption of the metadata standards, based on the international Dublin Core model (ISO 15836) as well as direct experiences from benchmarking studies from other country e-Government experiences; 5. Interfaces between government information systems and intermediaries providing eGovernment services shall conform to the standards in YEFI; 6. Interfaces between intermediaries and the public are outside the scope of YEFI. Adherence to YEFI standards and technical policies shall be mandatory for each Ministry. Other government agencies are strongly encouraged to adopt the YEFI. Full compliance with YEFI is required within 18 months of publication of YEFI version 1.1. 3.1. Technical Policies All Technical Standards will use either “Shall”, “Should”, “May” and “Can” as defined by the IEEE when describing expected behaviors with regard to the utilization and usage of technical standards.3 The use of the terms “Must” and “Will” is not permitted. Rationale The word shall is used to indicate mandatory requirements strictly to be followed in order to conform to the standard and from which no deviation is permitted (shall equals is required to). The use of the word must is deprecated and shall not be used when stating mandatory requirements; must is used only to describe unavoidable situations. The use of the word will is deprecated and shall not be used when stating mandatory requirements; will is only used in statements of fact. 3 http://standards.ieee.org/guides/style/section5.html Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 23 / 63 The word should is used to indicate that among several possibilities one is recommended as particularly suitable, without mentioning or excluding others; or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain course of action is deprecated but not prohibited (should equals is recommended that). The word may is used to indicate a course of action permissible within the limits of the standard (may equals is permitted to). The word can is used for statements of possibility and capability, whether material, physical, or causal (can equals is able to). 3.1.1. Adoption The adoption of the Yesser Framework for Interoperability (YEFI) shall allow for a sensible transition. 3.1.2. Compliance Any new information system, software application, or electronic data/information resource (or current instances of these being redeveloped or replaced), or systems for interfacing with these, shall comply with YEFI 3.1.3. Open Standards YEFI will employ Open Standards wherever possible; where Open Standards do not meet the needs of the Saudi government, preference should be given to industry best practice then Saudi Government approved protocols 3.1.4. Procurement All tenders / procurement of new systems (hardware and/or software) shall specify the need for compliance with YEFI 3.1.5. Redesigning Service Delivery All government entities shall redesign their services for delivery using telecommunications and information technology applications4 3.1.6. The Internet is Key Each government entity shall use the Internet eg e-mail and ecommunication media in performing its activities 5 3.1.7. Minimizing the Reliance on Manual Services Each government entity shall minimize reliance on traditional manual and/or paper based methods in providing government services6 4 5 6 Taken from Resolution 40, March 2006 Taken from Resolution 40, March 2006 Taken form Resolution 40, March 2006 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 24 / 63 4. Technical Standards 4.1. Introduction to Technical Standards This paper provides for a common overview of the technical infrastructure and standards recommended for the establishment of interoperability between ICT systems in the SaudiArabian public sector. The establishment of an interoperability framework provides a platform for agencies to select products that comply with open standards and interoperability. In turn, the adoption of interoperable products provides for improved connections between agencies, allows better data sharing practices and makes it easier to commence the process of standardization across agencies, with the purpose of providing better service to agencies and citizens. YESSER Interoperability Committee (YIC) Security Web Services E-Service Models XSD Registry User Interface Data Exchange Repository Connectivity Policies Governance YEFI Figure 3 YEFI High Level Architecture 4.2. Presentation and User Interface Standards 4.2.1. HTML Name: Hypertext Markup Language Version Error! Unknown document property name. Abbreviation: HTML Version: 4.01 Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 25 / 63 Owner: W3C Alternatives: XHTML 1.0 Status: Approved Usage areas: Publishing web content Link: http://www.w3.org/TR/html401/ Description: HTML is used to display web content Explanation for status: HTML is the basis of a lot of communication over the internet and the preferred way to display content in many applications, including browsers. It is compatible with many different kinds of software. In development of new applications, specifying XHTML as a standard should be considered 4.2.2. XHTML Name: Extensible HyperText Markup Language Abbreviation: XHTML Version: 1.0 Owner: W3C Alternatives: HTML 4.01 Status: Approved Usage areas: Publishing web content Link: http://www.w3.org/TR/xhtml1/ Description: For displaying structured web content in a human and machine-readable format. XHTML is the next generation of HTML, using stricter syntax to make it machine-readable Explanation for status: XHTML is recommended as a standard for delivering web content, since its strict format makes it easier to use on different platforms, with different software and devices. 4.2.3. JPEG Name: Joint Photographic Experts Group Abbreviation: JPEG Version: - Owner: ISO Alternatives: PNG Status: Approved Usage areas: Graphics Link: http://www.w3.org/Graphics/JPEG/itu-t81.pdf Description: JPEG is an image format, well suited for displaying pictures that will tolerate information loss Explanation for status: JPEG is a patented format, where the patent has expired in the US. For Europe the patent status remains unclear. The format is widely used and most applications recognize JPEG images 4.2.4. GIF Name: Graphics Interchange Format Abbreviation: GIF Version: - Owner: - Alternatives: PNG Status: Approved Usage areas: Graphics Link: http://www.w3.org/Graphics/GIF/spec-gif89a.txt Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 26 / 63 Description: GIF is an image format, useful for web purposes because of its small size. It supports animation. Explanation for status: GIF used to be patented, but patents have now expired. This means that the format can be used royalty-free. 4.2.5. PNG Name: Portable Network Graphics Abbreviation: PNG Version: - Owner: W3C Alternatives: GIF Status: Approved Usage areas: Graphics Link: http://www.w3.org/Graphics/PNG/ Description: PNG is an image format, developed as an open alternative to GIF. It does not have the same adoption rate and support though. PNG is suited for displaying graphics, less so for displaying photographic content on the internet because of substantially larger file size Explanation for status: Does not support animation, like GIF does. If this functionality is needed, consider using the GIF image format 4.2.6. TIFF Name: Tagged Image File Format Abbreviation: TIFF Version: 6.0 Owner: - Alternatives: JPEG Status: Approved Usage areas: Graphics Link: http://partners.adobe.com/public/developer/tiff/index.html Description: TIFF is an image format with a wide range of options, well-suited for exchanging images between professional image editing applications Explanation for status: TIFF has a complicated specification that makes it difficult to use in web applications. For applications in this category, alternatives should be considered. 4.2.7.Ecma Script / Javascript Name: ECMA 262 Script Abbreviation: - Version: 3rd edition Owner: ECMA Alternatives: Status: Approved Usage areas: Building dynamic web pages Link: http://www.ecma-international.org/publications/standards/Ecma-262.htm Description: ECMA is the standardized version of JavaScript, a scripting language that makes it possible to construct dynamic web pages Explanation for status: Dynamic functionality in web pages can make them more user-friendly. JavaScript is a good way of building dynamic functionality and the scripting language is recognized on most modern platforms. 4.2.8. Atom Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 27 / 63 Name: Atom Abbreviation: - Version: 1.0 Owner: IETF Alternatives: RSS Status: Approved Usage areas: Content publishing Link: http://tools.ietf.org/html/rfc4287 Description: The Atom standard, like RSS, is used to publish and syndicate web content. The Atom standard has been developed as a more open and XML-compliant alternative to the RSSstandard. Explanation for status: The Atom standard has a more open change process than the RSS standards and is more focused on complying with existing XML-standards. It is not yet as widely used as RSS though. 4.2.9. WAI Name: Web accessibility initiative Abbreviation: -WAI Version: 2.0 Owner: W3C Alternatives: Status: Approved Usage areas: Usability, accessibility Link: http://www.w3.org/TR/WCAG20/ Description: WAI is a set of guidelines to make web content more accessible to people who have difficulties using normal interfaces, e.g. disabled users. The guidelines are also used to ensure that content can be delivered on a number of different platforms, for example mobile devices with limited screen resolution and bandwidth. There are also guidelines for accessibility in developer tools (such as HTML editors) and guidelines for user agents (such as browsers or media players) Explanation for status: WAI is standardized through W3C and is the most widely used set of guidelines for accessibility, ensuring that vendors and developers are familiar with the standard. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 28 / 63 4.3. Multimedia 4.3.1. MPEG-1/2 Audio Layer 3 Name: MPEG-1/2 Audio Layer 3 Abbreviation: MP3 Version: - Owner: ISO/IEC Alternatives: AAC Status: Approved Usage areas: Audio codec Link: http://www.mp3licensing.com/ Description: MPEG-1/2 Audio Layer 3 is an audio lossy compression format. It uses an advanced type of audio compression, which reduces the file size with little reduction in audio quality. Explanation for status: The MP3 format has been an ISO standard since 1993. MP3 is backward and forward compatible ensuring that every mp3-file created in the past can be played on all current and future digital audio players. 4.3.2. AAC Name: Advanced Audio Codec Abbreviation: AAC Version: - Owner: ISO/IEC Alternatives: Status: Approved Usage areas: Audio codec Link: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43026 Description: AAC is a standardized, lossy compression and encoding scheme for digital audio. AAC audio is placed in a MP4 container, but raw AAC files is also an option, although not advised Explanation for status: AAC is specified both as Part 7 of the MPEG-2 standard, and Part 3 of the MPEG-4 standard. It is a successor format of MP3 for audio coding at medium to high bit rates. It has a number of improvements over MP3, in coding efficiency and frequency handling. 4.3.3. WMA Name: Windows Media Audio Abbreviation: WMA Version: 9 Owner: Microsoft Alternatives: AAC Status: Approved Usage areas: Audio codec Link: http://www.microsoft.com/windows/windowsmedia/forpros/codecs/audio.aspx Description: WMA is a proprietary audio compression technology. WMA can refer to the audio file format or the audio codec. Explanation for status: WMA is one of the most popular codecs. WMA Lossless codec compresses audio data without loss of audio fidelity. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 29 / 63 4.3.4. Real Audio Name: Real Audio Abbreviation: RA Version: 10 Owner: RealNetworks Alternatives: AAC Status: Approved Usage areas: Audio codec Link: http://www.realnetworks.com/products/index.html Description: RealAudio codec is a proprietary audio format developed by RealNetworks. It can be used as a streaming media format over HTTP. Real Audio can be played from a Real Media container. Explanation for status: Real Audio is RealNetworks proprietary audio format. It is possible to obtain the source code to Reals codecs. There exist both a free player for Windows and an open source player for Linux/UNIX. 4.3.5. MPEG-4 Part 2 Name: MPEG-4 Part 2 Abbreviation: MPEG-4 Part2 Version: - Owner: ISO/IEC Alternatives: MPEG-4 Part 10 Status: Approved Usage areas: Video codec Link: http://www.iso.org/iso/fr/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39259 Description: Mpeg-4 part 2 is a DCT (Discrete Cosine Transform) video compression standard. Explanation for status: Several popular codecs including DivX, Xvid and Nero Digital are implementations of Mpeg-4 part 2 standard. 4.3.6. H.264/MPEG-4 part 10/AVC Name: Advanced Audio Codec Abbreviation: H.264 Version: - Owner: ISO/IEC, ITU-T Alternatives: Status: Approved Usage areas: Video codec Link: http://www.itu.int/rec/T-REC-H.264/en Description: H.264, MPEG-4 Part 10, or AVC is a standard for video compression. allowing to compress video much more effectively and to provide more flexibility for application to a wide variety of network environments Explanation for status: H.264 experienced widespread adoption within a few years of the completion of the standard. It is employed widely in applications ranging from television broadcast to video for mobile devices 4.3.7. Real Video Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 30 / 63 Name: Real Video Abbreviation: Real Video Version: 10 Owner: RealNetworks Alternatives: H.264 Status: Approved Usage areas: Video codec Link: http://www.realnetworks.com/products/index.html Description: Real Video codec is a proprietary video format developed by RealNetworks. Real Video can be played from a Real Media container. Explanation for status: RealVideo uses a proprietary video format making it difficult to use with other player or server software 4.3.8. WMV Name: Windows Media Video Abbreviation: WMV Version: 9 Owner: Microsoft Alternatives: Status: Approved Usage areas: Audio/Video file container Link: http://www.microsoft.com/windows/windowsmedia/forpros/codecs/video.aspx Description: WMV is a compressed video file format for several proprietary codecs developed by Microsoft. Explanation for status: Windows Media Video is a proprietary and closed codec from Microsoft. The codec is normally used in Advanced Systems Format file. 4.3.9. ASF Name: Advanced Systems Format Abbreviation: ASF Version: - Owner: Microsoft Alternatives: MP4 Status: Approved Usage areas: Audio/Video file container Link: http://www.microsoft.com/windows/windowsmedia/forpros/format/asfspec.aspx Description: ASF is Microsoft's proprietary digital audio/video container format, especially meant for streaming media. Explanation for status: ASF container format can technically include any codec. 4.3.10. MPEG-2 Name: MPEG-2 Abbreviation: MPEG-2 Version: - Owner: ISO/IEC Alternatives: MPEG-4 Status: Approved Usage areas: Audio/Video Link: http://www.chiariglione.org/mpeg/standards/mpeg-2/mpeg-2.htm Description: MPEG-2 is a set of audio/video coding and compression standards. MPEG-2 is the core of most digital television and DVD format. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 31 / 63 Explanation for status: MPEG-2 enhances many features of the MPEG-1 standard. MPEG-2 Audio Layer-3 is the standard for the popular MP3 format. Part 7 of the MPEG-2 standard is referred to as MPEG-2 AAC or AAC. 4.3.11. MPEG-4 Name: MPEG-4 Abbreviation: MP4 Version: - Owner: ISO/IEC Alternatives: Status: Approved Usage areas: Audio/Video file container Link: http://www.chiariglione.org/mpeg/standards/mpeg-4/mpeg-4.htm Description: MPEG-4 is a set of standards used primarily to compress audio and visual (AV) digital data. MP4 is the official container for MPEG-4 multimedia. Explanation for status: MPEG-4 absorbs many of the features of MPEG-1 and MPEG-2 and other related standards, adding new features such as (extended) VRML support for 3D rendering, objectoriented composite files (including audio, video and VRML objects), support for externally-specified Digital Rights Management and various types of interactivity. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 32 / 63 4.4. Standards for web based and electronic services 4.4.1. XML Name: Extensible markup language Abbreviation: XML Version: 1.1 Owner: W3C Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture Link: http://www.w3.org/TR/xml11/ Description: XML is a markup language designed to describe data. It uses a Document Type Definition (DTD) or an XML Schema. XML tags are not predefined. Explanation for status: XML is an internationally approved W3C standard and is widely used and supported. 4.4.2. SOAP Name: Simple Object Access Protocol Abbreviation: SOAP Version: 1.1 Owner: W3C Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.w3.org/TR/soap/ Description: For remote service invocation and XML data exchange. It uses SMTP and HTTP and is therefore widely deployable Explanation for status: SOAP is a widely used standard for XML data exchange. It is an open standard, standardized by W3C and uses HTTP or SMTP as transport protocol, making it compatible with existing infrastructure 4.4.3. WSDL Name: Web Services Description Language Abbreviation: WSDL Version: 2.0 Owner: W3C Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.w3.org/TR/wsdl20/ Description: For remote service description. Describes what functions are available in a service. WSDL is often used in conjunction with SOAP when building web services. It describes how to use web services available on a server. Explanation for status: The World Wide Web Consortium (W3C) has not endorsed Version 1.1. Version 2.0, for which several drafts have been released, become a W3C recommendation. 4.4.4. UDDI Name: Universal Description, Discovery and Integration Abbreviation: UDDI Version: 3 Owner: OASIS Alternatives: ebXML Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.uddi.org/specification.html Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 33 / 63 Description: For the publication and discovery of remote service descriptions, UDDI works as a directory of web services, allowing organizations to connect to each other’s web services. UDDI is vendor-driven, being developed by Microsoft, IBM etc. The focus is on helping large organizations manage their network of customers. Explanation for status: UDDI is one of the core web services standards. It is designed to work with SOAP and WSDL. UDDI is an OASIS standard 4.4.5. EbXML Name: Electronic Business using eXtensible Markup Language Abbreviation: EbXML Version: 1 Owner: OASIS / UNCEFACT Alternatives: UDDI Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.ebxml.org/specs/ Description: Similar to UDDI, EbXML is a set of specifications for the publication and discovery of remote service descriptions. EbXML is more focused on building a universal solution than UDDI, focusing on establishing general B2B XML integration. It is supported by many of the same vendors that are behind UDDI. Explanation for status: EbXML is widely adopted and is standardized by OASIS/UNCEFACT. It is able to use a number of different application-level transport protocols, including SMTP, HTTP etc. The header is XML, but the body of the document may be XML, MIME or other formats. 4.4.6. XML Schema Name: Extensible markup language schema Abbreviation: XML Schema Version: 1 Owner: W3C Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.w3.org/XML/Schema Description: For data-oriented message DTD as defined in the corresponding XML specification – for textual document-oriented applications Explanation for status: XML Schema is an internationally approved W3C standard and is widely used and supported. 4.4.7. XSL Name: Extensible Stylesheet Language Abbreviation: XSL Version: Owner: W3C Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.w3.org/Style/XSL/ Description: XSL is a collection of ways to transform and format XML. It consists of XML transformations, XSL formatting objects and XML path language. Explanation for status: XSL is W3C standardized, making it widely applicable Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 34 / 63 4.4.8. BPMN Name: Business Process Modeling Notation Abbreviation: BPMN Version: 1.0 Owner: OMG Alternatives: Status: Approved Usage areas: Process modeling Link: http://www.bpmn.org/ Description: BPMN is a standardized way for graphically displaying business processes in a workflow. The purpose of the standard is to establish one common way of describing business processes, understood by both people on the design side and on the development side, on both the business side and the IT side. Explanation for status: Using a standardized way of describing processes can make it easier to integrate processes between different agencies. BPMN is a well-suited candidate for a common way of describing business processes because of its wide use and open status. 4.4.9. EDI Name: Electronic Data Interchange Abbreviation: EDI Version: Owner: XBRL consortium Alternatives: Status: Approved Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.xbrl.org/Home/ Description: EDI is a widely used standard for exchanging electronic information between businesses. It is the predecessor of XML Explanation for status: The standard is maintained and developed by the international XBRL consortium and is not subject to license restrictions. It is widely used 4.5. WS - I Name: Web Services Interoperability Abbreviation: WS-I Version: Owner: Web Organization Alternatives: Status: Approved Services Interoperability Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.ws-i.org/ Description: WS-I is a consortium of vendors, working to promote interoperability between web services. This is done by developing a set of profiles that specify how web services are used (for example WS-I basic profile that provides interoperability guidelines for standards such as SOAP, WSDL and UDDI) Explanation for status: WS-I has the backing and participation of the key vendors of web services solutions, such as Microsoft, IBM, BEA, SAP and Sun, ensuring that the profiles will be implemented in a wide number of solutions. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 35 / 63 4.6. Information and Data Exchange Standards 4.6.1. Unicode Name: Unicode Abbreviation: UNICODE ISO/IEC 10646-1:2000 Version: 5.0 Owner: Unicode Consortium Alternatives: Status: Approved Usage areas: Character encoding Link: http://unicode.org/ Description: Unicode is a standard describing how to represent characters in computer systems. It covers nearly all writing systems, including Arabic. Explanation for status: Unicode is the continuation of the work started on ISO/IEC 8859-1. Unicode includes support for all languages, not just the Latin alphabet 4.6.2. UTF-16 Name: Unicode Transformation Format 16 Abbreviation: UTF-16 Version: Owner: Unicode Consortium Alternatives: UTF-8 Status: Approved Usage areas: Character encoding Link: http://tools.ietf.org/html/rfc2781 Description: UTF-16 is a subset of Unicode. It uses variable length character encoding and can be used to represent any character in Unicode. UTF-16 is used by Windows and Java Explanation for status: UTF-16 is widely used and is the native encoding in the Windows operating system 4.6.3. UTF-8 Name: Unicode Transformation Format 8 Abbreviation: UTF-8 Version: Owner: Unicode Consortium Alternatives: UTF-16 Status: Approved Usage areas: Character encoding Link: http://tools.ietf.org/html/rfc3629 Description: UTF-8 is a subset of Unicode. It uses variable length character encoding and can be used to represent any character in Unicode. Explanation for status: UTF-8 is a byte-oriented encoding, capable of error-handling if the byte stream is corrupted. UTF-8 is commonly used on the web 4.6.4.RTF Name: Rich Text Format Abbreviation: RTF Version: 1.6 Owner: Microsoft Alternatives: .txt, OpenXML, ODF, binary formats Status: Approved Usage areas: Office productivity Link: http://msdn2.microsoft.com/en-us/library/aa140277(office.10).aspx Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 36 / 63 Description: Proprietary document format, developed by Microsoft. It is cross-platform and is being used on most systems Explanation for status: The format can be used on many different systems, and is well-suited for exchanging documents. Basic formatting options are possible, but advanced functionality is not available 4.6.5. .txt Name: Text format Abbreviation: .txt Owner: - Alternatives: OpenXML, ODF, formats Version: RTF, binary Status: Approved Usage areas: Office productivity Link: Description: Open format for basic data exchange Explanation for status: Data in .txt format is basic and unformatted, and can not contain for example formulas from spreadsheets 4.6.6. PDF Name: Portable Document Format Abbreviation: PDF Owner: Adobe Alternatives: OpenXML, ODF, formats, .txt Version: RTF, binary Status: Approved Usage areas: Office productivity Link: http://partners.adobe.com/public/developer/pdf/index_reference.html Description: The "de facto" standard for printable documents, PDF is a format capable of generating self-contained documents, containing fonts and layout Explanation for status: PDF can be generated and read on all platforms, which makes it a very useful format for sharing documents. A PDF document is not editable; other formats must be used if this is a requirement. 4.6.7. Microsoft Office binary formats Name: Microsoft Office binary formats Abbreviation: - Owner: Microsoft Alternatives: OpenXML, ODF, .txt Version: RTF, Status: Approved Usage areas: Office productivity Link: Description: The binary formats are used in Microsoft Office, making them the "de facto" standard for the majority of office documents. They include presentation documents (PowerPoint), word processing (Word) and spreadsheet functionality (Excel). Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 37 / 63 Explanation for status: The binary format specifications are made and owned by Microsoft, and are used everywhere due to the widespread use of Microsoft Office. Other XML-based formats are taking the place of the binary formats as productivity software is upgraded, but a large number of legacy documents will remain in this format and backwards compatibility with this format is important. 4.6.8. ODF Name: OpenDocumentFormat Abbreviation: ODF Owner: OASIS Alternatives: OpenXML, PDF, .txt Version: 1.1 RTF, Status: Approved Usage areas: Office productivity Link: v1.1.html http://docs.oasis-open.org/office/v1.1/OS/OpenDocument-v1.1-html/OpenDocument- Description: OpenDocument format is used in the OpenOffice software package. It has uses similar to Microsoft Office in presentation (Impress), word processing (Writer), spreadsheet functionality (Calc) etc. Explanation for status: The OpenDocument format is XML-based. It is released under GPLlicense terms. This makes it a very interoperable format that is beyond vendor control. 4.6.9. UML Name: Unified Modeling Language Abbreviation: UML Version: 2.0 Owner: OMG Alternatives: Status: Approved Usage areas: Software modeling, business process modeling Link: http://www.omg.org/docs/ad/97-08-11.pdf Description: UML is a standardized language for modeling software artifacts, describing business processes, modeling organizational structures and many other things. It is extensible in different ways, to suit custom purposes. Explanation for status: UML is widely used in the described areas, and is widely supported in many different kinds of software. 4.6.10. XMI Name: XML Metadata Interchange Abbreviation: XMI Version: 2.1 Owner: OMG Alternatives: Status: Approved Usage areas: Metadata Link: http://www.omg.org/technology/documents/formal/xmi.htm Description: XMI is an XML-based standard that allows developers to exchange UML models and other metadata. Explanation for status: XMI used other standards, such as UML and MOF to handle metadata, making it an open and easily implementable standard. 4.6.11. UBL Name: Universal Business Language Version Error! Unknown document property name. Abbreviation: UBL Version: - Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 38 / 63 Owner: OASIS Alternatives: Status: Approved Usage areas: XML, web services Link: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ubl Description: UBL is a standard developed by an OASIS committee, aimed at making exchange of purchase orders and invoices easier and more standardized. Explanation for status: The standard is developed by OASIS in an open process. It is based on normal XML, making it widely applicable. It is possible to develop a country-specific subset of UBL (done in Denmark) or a region-specific subset (currently being done in Scandinavia and in Spain). 4.6.12. Xpath Name: XML Path Language Abbreviation: Xpath Version: 2.0 Owner: W3C Alternatives: Status: Approved Usage areas: XML, web services Link: http://www.w3.org/TR/xpath Description: Xpath is an expression language for navigating XML documents, describing a way to locate and process items in the document. Explanation for status: Xpath makes it easier for developers to navigate XML documents in a standardized way, without knowing the specifics of each XML implementation. It is a W3C recommendation and use of Xpath is increasing. 4.6.13. ISO 11179-5 Name: ISO 11179-5 Abbreviation: ISO 11179-5 Version: - Owner: ISO Alternatives: Status: Approved Usage areas: Metadata, web services Link: http://metadata-standards.org/11179 Description: ISO 11179-5 is a standard for representing metadata for an organization in a Metadata Registry Explanation for status: Currently the only ISO standard in this area, ISO 11179-5 is the best approach to use when organizing metadata in a common repository. It is used by some American government agencies and is supported by some vendor solutions. 4.6.14. Core Component Technical Specification Name: Core Component Technical Specification Abbreviation: CCTS Version: 2.01 Owner: UN/CEFACT Alternatives: Status: Approved Usage areas: Metadata, web services Link: http://www.unece.org/cefact/ebxml/CCTS_V2-01_Final.pdf Description: The CCTS standard is the result of UN/CEFACT’s work to establish a common set of business semantics, meaning a common set of expressions used in business. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 39 / 63 Explanation for status: Using CCTS can help systems using different syntaxes (like ebXML and UN/CEFACT) communicate better with each other by bridging some inconsistencies and highlighting others. 4.6.15. DCMI Name: Dublin Core Metadata Initiative Abbreviation: DCMI Version: - Owner: DCMI Alternatives: Status: Approved Usage areas: Metadata Link: http://dublincore.org/documents/usageguide/ Description: Dublin Core is a collection of metadata definitions, a defined set of metadata that can be used to describe various types of data, such as video, text, sound or images. Explanation for status: Dublin Core is an open standard that is flexible, expandable and widely accepted. 4.6.16. XNAL Name: eXtensible Name and Address markup Language Abbreviation: XNAL Version: 2.0 Owner: OASIS Alternatives: Status: Approved Usage areas: XML, web services, metadata, data standardization Link: http://www.oasis-open.org/committees/ciq/ciq.html#4 Description: XNAL are two different standards: one for describing names in a standardized way, and one for doing the same with addresses. The standards are XML-based and are built to accommodate a large number of different international ways of handling names and addresses. Explanation for status: While XNAL is not yet widely used, the use of a standardized address and name format is increasingly seen as an important prerequisite for data exchange. XNAL is the most well-known international standard in this area. 4.6.17. ISO 639 - Language Codes Name: ISO 639 - Language Codes Abbreviation: ISO 639 Version: ISO 6393 Owner: ISO Alternatives: Status: Approved Usage areas: Metadata, data standardization Link: http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39534&ICS1=1&IC S2=140&ICS3=20 Description: ISO 639 is a standardized way of representing language codes, consisting of three letters from the Latin alphabet (e.g. Arabic is “arb”). ISO 639 can be used to describe dialects as well (“arb” is standard Arabic) Explanation for status: ISO 639 is used widely in applications and on the web Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 40 / 63 4.6.18. ISO 4217 - Currency Codes Name: ISO 4217 - Currency Codes Abbreviation: ISO 4217 Version: Owner: ISO Alternatives: Status: Approved Usage areas: Metadata, data standardization Link: http://www.iso.org/iso/en/prods-services/popstds/currencycodeslist.html Description: ISO 4217 is an international standard for representing currency codes. It consists of three letters, the first two letters of a countries ISO 3166-1 alpha-2 country code and the letter of the country’s currency (Saudi Arabian Riyals become “SAR”). Explanation for status: The currency codes are ISO standardized and are widely used. No standardized alternatives exist. 4.6.19. ISO Country Codes Name: ISO Country Codes Abbreviation: ISO 3166-1 Version: Alpha-2, alpha-3 Owner: ISO Alternatives: Status: Approved Usage areas: Metadata, data standardization Link: http://www.iso.org/iso/en/prods-services/iso3166ma/index.html Description: The ISO country codes are used to uniquely identify different countries. The ISO 3166-1 alpha 2 version is a two-letter country code that is used, for example, for internet top-level domains. Alpha 3 is a three-letter code, used in passports, among other places. Explanation for status: Both the two-letter and the three-letter country codes are widely used, the two-letter version in currency codes, bank SWIFT codes etc., the three-letter version in machinereadable passports etc. This means that most IT-systems already support this way of representing a country. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 41 / 63 4.7. Connectivity Standards 4.7.1. S/MIME Name: Secure/Multipurpose Internet Mail Extensions Owner: IETF Abbreviation: S/MIME Version: 3.0 Alternatives: Status: Approved Usage areas: E-mail, connectivity, character encoding Link: http://www.faqs.org/rfcs/rfc2633.html Description: MIME is an extension of the basic SMTP e-mail protocol. The extension allows for sending text in languages other than English and file types such as images and sound. S/MIME is the secure version of the MIME standard, using public key encryption to sign e-mails. Explanation for status: Not all e-mail applications are compatible with S/MIME. Especially webbased e-mail is incompatible, resulting in error messages. 4.7.2. POP Name: Post Office Protocol Abbreviation: POP Version: 3 Owner: IETF Alternatives: IMAP Status: Approved Usage areas: E-mail, connectivity Link: http://tools.ietf.org/html/rfc1939 Description: POP is an application layer internet standard protocol that specifies how e-mail clients retrieve e-mail from servers. Explanation for status: Using POP downloads e-mails to a local client. If more people or clients access the same mailbox, it is preferable to leave e-mails on the server, using IMAP. 4.7.3. IMAP Name: Internet Message Access Protocol Abbreviation: IMAP Version: 4 Owner: IETF Alternatives: POP Status: Approved Usage areas: E-mail, connectivity Link: http://tools.ietf.org/html/rfc3501 Description: IMAP is an application layer internet standard protocol that specifies how e-mail clients retrieve e-mail from servers. Explanation for status: Using IMAP retrieves messages stored on a server, but does not download them. This makes it possible for multiple users or clients to use the same mailbox. Multiple users make IMAP a more complicated protocol to implement than POP3 4.7.4. HTTP Name: Hypertext Transfer Protocol Abbreviation: HTTP Version: 1.1 Owner: W3C / IETF Alternatives: Status: Approved Usage areas: Connectivity, web Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 42 / 63 Link: http://tools.ietf.org/html/rfc2616 Description: HTTP is a transport protocol for sending information via the web Explanation for status: HTTP is used as the basis for the modern internet, and is therefore extremely pervasive. HTTP traffic is allowed to pass through most routers and firewalls, making it a good protocol for making connections that would otherwise be blocked or require specialized setups. 4.7.5. HTTPS Name: Hypertext Transfer Protocol secure Abbreviation: HTTPS Version: - Owner: - Alternatives: Status: Approved Usage areas: Connectivity, web, security, encryption Link: Description: HTTPS is the method of securing HTTP traffic using SSL or TLS. It works by using a public key certificate on the accessed web server that is recognized by the user’s browser. Explanation for status: HTTPS is an easy-to-implement way of securing sensitive traffic, like users signing in on a website. It is not flawless however, and the effectiveness of the method relies on the security of the server, as HTTPS only encrypts traffic and does nothing to secure data stored on a server. 4.7.6. LDAP Name: Lightweight Directory Access Protocol Abbreviation: LDAP Version: 3 Owner: IETF Alternatives: Status: Approved Usage areas: User management Link: http://tools.ietf.org/html/rfc4510 Description: LDAP is a network protocol for accessing and modifying a directory, for example an employee directory Explanation for status: LDAP is widely supported, making it a good choice for directory networking. It is standardized through IETF. 4.7.7. DNS Name: Domain Name System Abbreviation: DNS Version: Owner: IETF Alternatives: Status: Approved Usage areas: Connectivity, web Link: http://tools.ietf.org/html/rfc1035 (and more) Description: DNS is the system that handles the mapping between IP-addresses and domain names on the internet Explanation for status: The de-facto (and only) standard for handling the mapping between IPaddresses and domain names, using DNS is essentially unavoidable Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 43 / 63 4.7.8. FTP Name: File Transfer Protocol Abbreviation: FTP Version: Owner: IETF Alternatives: HTTP Status: Approved Usage areas: Connectivity, web Link: http://tools.ietf.org/html/rfc959 Description: FTP is a file transfer protocol, used for uploading and downloading files from a server. Explanation for status: FTP is an open standard and is supported by most operating systems. It is not an especially secure protocol though, therefore FTPS is recommended for secure purposes 4.7.9. FTPS Name: Abbreviation: FTPS Version: Owner: IETF Alternatives: Status: Approved Usage areas: Connectivity, web Link: http://tools.ietf.org/html/rfc4217 Description: FTPS is the secure version of FTP, using the SSL/TLS layer to ensure security Explanation for status: FTPS is a fairly easy way to secure FTP using public key certificates 4.7.10. IP Name: Internet Protocol Abbreviation: IP Version: 4 Owner: Alternatives: Status: Approved Usage areas: Connectivity, web Link: http://www.faqs.org/rfcs/rfc791.html Description: The internet protocol (IP) is the standard used to assign IP-addresses to devices connected to the internet. Explanation for status: Version 4 of the internet protocol is being replaced by version 6 that has a larger number of addresses. It is recommended that new solutions be specified to support both version 6 and 4, since version 4 is going to be needed for a long time because of legacy solutions. 4.7.11. TCP Name: Transmission Control Protocol Abbreviation: TCP Version: Owner: IETF Alternatives: UDP Status: Approved Usage areas: Connectivity, web Link: http://tools.ietf.org/html/rfc793 Description: TCP is the layer between IP and an application. It controls how connections are made. It adds a layer of reliability to a connection, making sure that all packets arrive. This is important for loading web pages for example and web browsers use TCP for fetching web pages. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 44 / 63 Explanation for status: TCP is not suited for streaming applications, since a lost packet has to be re-sent before the following packets can be transmitted. For streaming applications like VoIP, UDP is better suited. 4.7.12. UDP Name: User Datagram Protocol Abbreviation: UDP Version: Owner: IETF Alternatives: TCP Status: Approved Usage areas: Connectivity, web Link: http://tools.ietf.org/html/rfc768 Description: UDP is a transport layer, like TCP. It is not as reliable, but more lightweight and more fault tolerant, making it suitable for streaming applications Explanation for status: If reliability and correct ordering of data packages is an important requirement, TCP might be the better choice. 4.7.13. IEEE 802.11 Name: - Abbreviation: IEEE 802.11 Version: g Owner: IEEE Alternatives: IEEE 802.11g / IEEE 802.11n Status: Approved Usage areas: Networking, connectivity, web Link: http://standards.ieee.org/getieee802/802.11.html Description: IEEE 802.11g is a networking protocol, used for establishing a wireless network between a computer and a router. It has a theoretical maximum speed of 54 mbps. Explanation for status: IEEE 802.11g is currently the most-used standard for wireless networking. Its predecessor 802.11b is being phased out. Eventually 802.11g will be replaced with 802.11n, with a theoretical maximum speed of over 100 mbps. Compatibility with this standard would be a good thing to take into consideration when choosing routers and other networking hardware. 4.7.14. SMTP Name: Simple Mail Transfer Protocol Abbreviation: SMTP Version: Owner: IETF Alternatives: Status: Approved Usage areas: Networking, connectivity, web, e-mail Link: http://tools.ietf.org/html/rfc821 Description: SMTP is a text-based protocol for exchanging mail messages Explanation for status: SMTP is the commonly used standard for transmitting e-mail over the internet. A wide range of software supports it. 4.7.15. VPN Name: Virtual Private Network Abbreviation: VPN Version: Owner: IETF Alternatives: Status: Approved Usage areas: Networking, connectivity, web Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 45 / 63 Link: http://tools.ietf.org/html/rfc2764 Description: VPN is a way of using the open Internet to establish a connection to a private network. This allows a person to access the intranet of a company from the outside for example. Explanation for status: VPN is not standardized through an official standardization organization, but is widely used and I supported by many different tools and many different kinds of software Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 46 / 63 4.8. Security Standards 4.8.1. PKCS #7 (RFC 2315) Name: Public Key Cryptography Standards Abbreviation: PKCS #7 Version: 1.5 Owner: RSA Security Alternatives: Status: Approved Usage areas: Security, encryption Link: http://www.rsasecurity.com/rsalabs/node.asp?id=2124 Description: One of several cryptography standards in PKCS, PKCS #7 is used to encrypt messages under a PKI. Explanation for status: The PKC standards are not, despite the name, standardized through a standardization body, but are owned by the company RSA. 4.8.2. IpSec Name: IP security Abbreviation: Ipsec Version: Owner: IETF Alternatives: TLS Status: Approved Usage areas: Security, encryption, connectivity Link: http://tools.ietf.org/html/rfc4301 Description: IPsec provides a way to encrypt or authenticate IP packets in a data stream Explanation for status: The use of IPsec is optional in IP version 4, but is mandatory in IP version 6. This must be taken into consideration when choosing IP standards. For transversing NATs and firewalls, IPsec might not be the best choice. TLS should be considered instead. 4.8.3. SSL Name: Secure Sockets Layer Abbreviation: SSL Version: 3.0 Owner: IETF Alternatives: TLS Status: Approved Usage areas: Security, encryption, connectivity Link: http://wp.netscape.com/eng/ssl3/ Description: SSL is the predecessor of TLS. It is a cryptographic protocol. An industry standard for encrypting TCP traffic. SSL is commonly used to encrypt HTTP data before it is delivered over TCP. Explanation for status: SSL is widely supported, but has been super-seeded by TLS version 1.0. 4.8.4. TLS Name: Transport Layer Security Abbreviation: TLS Owner: IETF Alternatives: Encryption Version: 1.1 XML Status: Approved Usage areas: Security, encryption, connectivity Link: http://tools.ietf.org/html/rfc4346 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 47 / 63 Description: TLS is a cryptographic protocol, securing applications using HTTP, FTP etc. when communicating over IP (e.g. HTTPS) Explanation for status: TLS is best suited for establishing connections between two parties (for example client/server). For web services, that require multiple connections, XML encryption should be considered. 4.8.5. TDES Name: Triple Data Encryption Standard Abbreviation: TDES Version: - Owner: - Alternatives: AES Status: Approved Usage areas: Security, encryption Link: Description: TDES is a non-standard implementation of the DES encryption, using the DES algorithm with three keys. Explanation for status: TDES is practically secure, since the effort to break the encryption requires substantial resources. It is still widely used and will probably remain in use for a while, even though it is inferior to AES performance-wise. 4.8.6. AES Name: Advanced Encryption Standard Abbreviation: AES Version: Owner: National Institute of Science and Technology Alternatives: Status: Approved Usage areas: Security, encryption Link: Security, encryption Description: AES is the successor of the DES encryption algorithm Explanation for status: AES is the current encryption standard in the US public sector, making it widely used. No successful attacks on the AES encryption currently exist. 4.8.7. RSA Name: RSA Abbreviation: RSA Version: Owner: RSA Laboratories Alternatives: Status: Approved Usage areas: Security, encryption Link: http://www.rsa.com/rsalabs/node.asp?id=2125 Description: RSA is an encryption algorithm, used for public-key encryption. Explanation for status: RSA is currently believed to be secure, due to the infeasibility of breaking the encryption. It is not however impossible that RSA can be broken in the future. 4.8.8. SAML Name: Security Assertion Markup Language Abbreviation: SAML Version: 2.0 Owner: OASIS Alternatives: Status: Approved Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 48 / 63 Usage areas: Security, user management Link: http://www.oasis-open.org/committees/download.php/22553/sstc-saml-tech-overview2%200-draft-13.pdf Description: SAML is an XML-based standard for exchanging information on authentication and authorization Explanation for status: SAML is an open standard, and part of OASIS. It is a widely used standard for identity management. 4.8.9. WPA Name: Wi-fi protected access Abbreviation: WPA Version: 2 Owner: Wi-fi Alliance Alternatives: Status: Approved Usage areas: Security, encryption, connectivity, networking Link: http://www.wi-fi.org/knowledge_center/wpa/ Description: WPA is the successor of the WEP wireless encryption standard. WPA is used to encrypt data sent over a wireless connection. Explanation for status: WPA version 2 implements IEEE 802.11i, a standard specifying security for wireless networks. WPA2 is widely used and most modern wireless networking equipment supports it. 4.8.10. WS-security Name: Web Services Security Abbreviation: WS-Security Version: 1.1 Owner: OASIS Alternatives: Status: Approved Usage areas: Security, networking, building web applications Link: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss Description: WS-security is a communications protocol, describing how to implement security when using web services Explanation for status: WS-security describes enhancements to the SOAP protocol, a standardized way of using open standards to implement web services security, such as SAML and TLS. Using WS-security can ensure interoperability with other solutions using the same specifications Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 49 / 63 5. Other standards 5.1. Candidate Standards 5.1.1. Pending YIC Approval These standards are in use as international standards. Their use in the Kingdom of Saudi Arabia requires some discussion before adoption regarding the practicality of setting these as standards that shall be complied with. 5.1.2. XBRL Name: Extensible Business Reporting Language Abbreviation: XBRL Version: Owner: XBRL consortium Alternatives: Status: Candidate Usage areas: Building web applications, establishing a service-oriented architecture, XML Link: http://www.xbrl.org/Home/ Description: XBRL is an XML-based standard for describing and exchanging financial and business information. Explanation for status: The standard is maintained and developed by the international XBRL consortium and is not subject to license restrictions. It is widely used 5.1.3. XHTML Mobile Profile Name: XHTML Mobile Profile Abbreviation: - Version: 1.1 Owner: W3C Alternatives: XHTML Status: Candidate Usage areas: Publishing mobile web content Link: http://www.w3.org/TR/xhtml11/ Description: XHTML Mobile Profile is used to present XHTML on devices with limited bandwidth and screen resolution Explanation for status: XHTML MP is useful for delivering content to mobile devices, but due to increasing bandwidth and processing power of mobile devices, it might not be necessary. Normal XHTML or HTML might be useable instead. 5.1.4. MPLS Name: MultiProtocol Label Switching Abbreviation: MPLS Version: Owner: IETF Alternatives: Status: Candidate Usage areas: Networking, connectivity, web Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 50 / 63 Link: http://tools.ietf.org/html/rfc3031 Description: MPLS is a way of routing data packages from the network in a more efficient way than normal. The increased efficiency is achieved by adding labels to the packets, making it easier to route the through the network. Explanation for status: MPLS is an open standard and can be used by anyone without licensing costs. It has advantages in multiple areas compared to similar standards like frame relay and ATM and is therefore becoming the preferred standard in this area. 5.1.5. Saudi Post National Address Profile Name: Saudi Post National Address Profile Abbreviation: SP NAF Version: Owner: Saudi Post Alternatives: Status: Candidate Usage areas: Link: Description: The way of representing an address, as specified by Saudi Post Explanation for status: Saudi Post is the governing body on address in Saudi Arabia, this way of representing an address can be used as the national address standard. 5.1.6. XML Encryption Name: XML Encryption Abbreviation: - Owner: W3C Alternatives: signature Version: XML Status: Candidate Usage areas: Security, encryption, xml Link: http://www.w3.org/TR/xmlenc-core/ Description: XML encryption is a W3C specification on how to encrypt XML data. W3C recommends that XML encryption and XML not be used at the same time, as that might make it easier to perform guessing attacks. Explanation for status: XML encryption is useful in web services, where the interaction is between multiple parties and not just client/server. It is also useful because it has the ability to encrypt only part of a message, something SSL/TLS cannot do. W3C recommends that XML encryption and XML signature not be used at the same time, as it might make it easier to perform guessing attacks. 5.1.7. XML Signature Name: XML signature Abbreviation: Owner: W3C Alternatives: encryption Version: XML Status: Candidate Usage areas: Security, encryption, xml Link: http://www.w3.org/TR/xmldsig-core/ Description: XML is the W3C standard for digital signatures in XML format Explanation for status: W3C recommends that XML encryption and XML signature not be used at the same time, as it might make it easier to perform guessing attacks. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 51 / 63 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 52 / 63 5.2. Emerging Standards Standards and/or protocols coming through either the standardization process or are market driven and that bear watching by the YEFI team 5.2.1. Office Open XML Name: Office Open XML Abbreviation: OOXML Version: Owner: Microsoft Alternatives: RTF, ODF, PDF, .txt, binary formats Status: Emerging Usage areas: Office productivity Link: Description: Office Open XML is the format used in the new version of Microsoft 2007, Office 2007. It is XML-based. Explanation for status: Under pressure from the competition from OpenOffice, Microsoft has decided to have the formats in Office 07 standardized through the standardization body ECMA. Despite this, it is still uncertain if Microsoft really has relinquished control of the format or if it is still able to make its own proprietary extensions to the formats. Compared to the ODF specification, OOXML is very complicated, weighing in a more than 6000 pages, making it difficult for nonMicrosoft developers to use. OOXML is currently being evaluated by ISO as a standard. Its status will be decided later in 2007. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 53 / 63 5.3. Deprecated standards The following standards should no longer be used: 5.3.1. WML Name: Wireless Markup Language Abbreviation: WML Version: 1.3 Owner: - Alternatives: XHTML Status: Deprecated Usage areas: Publishing mobile web content Link: Description: WML is a markup language, designed to deliver content to devices that use WAP Explanation for status: Due to increases in bandwidth and processing power of mobile devices, WML (and WAP) is being phased out, giving way to XHTML and HTML 5.3.2. EPS Name: Encapsulated PostScript Abbreviation: EPS Version: - Owner: - Alternatives: PDF Status: Deprecated Usage areas: Graphics Link: http://partners.adobe.com/public/developer/tiff/index.html Description: EPS is a way to encapsulate PostScript data, to make it readable as an image format. The format is not platform-independent, but has different implementations for Mac and PC (EPSF and EPSI). Explanation for status: EPS is not recommended, due to its platform dependent specifications. Alternatives should be used where available 5.3.3. ISO/IEC 8859-1:1998 Name: - Abbreviation: ISO/IEC 8859-1:1998 Version: Owner: - Alternatives: Unicode Status: Deprecated Usage areas: Character encoding Link: Description: The standard way to encode characters in the Latin alphabet Explanation for status: This encoding is no longer under active development and has been replaced by Unicode encoding. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 54 / 63 5.3.4. ASCII Name: American Standard Code for Information Interchange Abbreviation: ASCII Version: Owner: Unicode Consortium Alternatives: UTF-8 Status: Deprecated UTF-16 and Usage areas: Character encoding Link: http://www.unicode.org/charts/PDF/U0000.pdf Description: ASCII is the original encoding for encoding content in English. Explanation for status: ASCII has not been updated since 1986, and has been replaced by Unicode and UTF-8. 5.3.5. WAP Name: Wireless Application Protocol Abbreviation: WAP Version: 2.0 Owner: Alternatives: XHTML Mobile profile Status: Deprecated Usage areas: Publishing mobile web content Link: Description: WAP is a standard for web access for wireless devices. It is designed to present content in a way that fits the limited screen resolution and bandwidth of wireless/portable devices. Explanation for status: The WAP protocol has never been especially successful, but is offered by a number of content providers. New solutions are expected to be in other formats, due to an increase of resolution and bandwidth in wireless/portable devices. 5.3.6. DES Name: Data Encryption Standard Abbreviation: DES Version: Owner: National Institute of Science and Technology Alternatives: AES Status: Deprecated Usage areas: Security, encryption Link: http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf Description: DES is an encryption algorithm, used to encrypt data. It was widely used in the 1970's and 1980's before being deemed insecure. Explanation for status: The DES encryption has been broken and is not recommended. Alternatives include the AES cipher. 5.3.7. RSS Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 55 / 63 Name: Really Simple Syndication / Rich Site Summary Abbreviation: RSS Version: 1.0/2.0 Owner: - Alternatives: Atom Status: Deprecated Usage areas: Content publishing Link: Description: RSS is an XML-based format, used publish and syndicate web content. It is developed in two different branches (1.x and 2.x). Explanation for status: The different branches of development of the RSS standard and the fact that a standards body does not undertake the development should be taken into consideration when choosing RSS. Version 2.0 had diverged from being an update of Version 1.0 causing some interoperability issues for systems. It is recommended that the Atom standard is used instead. 5.3.8. DTD Name: Document Type Definition Abbreviation: DTD Version: 1.0/2.0 Owner: W3C Alternatives: XSD Status: Deprecated Usage areas: XML Link: http://www.w3.org/TR/REC-xml/#dt-doctype Description: DTD is used to describe an XML schema via a set of declaration that conforms to particular markup syntax. Explanation for status: DTD faced many criticisms such as using none XML syntax and no support for newer XML features (i.e. Namespaces). 5.3.9. MPEG-1 Name: MPEG-1 Abbreviation: MPEG-1 Version: - Owner: ISO/IEC Alternatives: MPEG-4 Status: Deprecated Usage areas: Audio/Video Link: http://www.chiariglione.org/mpeg/standards/mpeg-1/mpeg-1.htm Description: Mpeg-1 is a set of audio/video compression standards. MPEG-1 video part is used by the Video CD (VCD format) and less commonly by DVD-Video format. MPEG-1 Audio layer 3 is the popular MP3 audio format. Explanation for status: MPEG-1 has been outdated by much advanced standards such as MPEG-2 and MPEG-4. 5.3.10. AVI Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 56 / 63 Name: Audio Video Interleave Abbreviation: AVI Version: - Owner: Microsoft Alternatives: MP4 Status: Deprecated Usage areas: Audio/Video Link: http://msdn2.microsoft.com/en-us/library/ms779631.aspx Description: AVI stands for Audio Video Interleave and is a container file format for audio and video content. While it does not define how the audio and video information itself is encoded, it defines how the video and the audio are saved next to each other. Explanation for status: AVI is considered by some to be an outdated container format. There is significant overhead when used with popular MPEG-4 codecs (Xvid and DivX, for example), increasing file size more than necessary. 5.3.11. Quicktime Name: Quicktime Abbreviation: MOV Version: - Owner: Apple Alternatives: MP4 Status: Deprecated Usage areas: Audio/Video Link: http://developer.apple.com/documentation/QuickTime/QTFF/index.html Description: QuickTime (.mov) file format functions as a multimedia container file capable of handling various formats of digital video, media clips, sound, text, animation, music, and several types of interactive panoramic images. Explanation for status: Quicktime is Apple’s proprietary format Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 57 / 63 6. Choosing Standards This section is provided as a discussion reader about the various standards setting bodies apparent in the ICT environment. 6.1. International Standards Bodies There are a number of reasons for proliferation of standards setting bodies or organizations for ICT; the main reason though has been the dissatisfaction by many vendors with slow, bureaucratic processes. The ICT environment is by nature, a fast moving environment with new protocols and products reaching the market each month. In comparison, developing international standards through a Standards Development Organization (e.g. ISO) often takes a 3-6 year timeframe. During the 1990s, ISO gained a reputation for being slow, bureaucratic, congested, and insensitive to feedback from both vendors and their customers. Attention then turned to the volunteer-based, open-process and non-profit Internet Engineering Task Force (IETF), which develops a number of the standards necessary for the Internet to function. When IETF also appeared too slow for some vendors, they began funding more focused, agile consortia like the W3C and OASIS. This gap between market driven need and the bureaucratic standards development process is a main reason for the emergence and differentiation of the new Standard Setting Organizations (SSO). There are now five (5) main groupings of ICT SSO’s: 1) trade associations, 2) Standards Developing Organizations (SDOs), 3) consortia, 4) alliances, and 5) the Open Source software movement. From a big picture perspective, the main players today for setting standards for ICT (and particularly web services) are: International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) Institute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) Organization for the Advancement of Structured Information Systems (OASIS) World Wide Web Consortium (W3C) Open Geospatial Consortium (OGC) Open Liberty Alliance Ecma International A good background paper on the history of the emerging complexity of the Standards Setting Organizations environment can be found at: http://www.ftc.gov/opp/intellect/020418cargill.pdf (Carl Cargill, Sun Microsystems, 27 March 2002). NOTE: the purpose of this paper is to explore the ICT standards environment in terms of intellectual property rights. It does not describe the emergence of each separate SSO. The table on the following page provides a brief synopsis for each of the main standards setting bodies and shows where each body focuses their attention: Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 58 / 63 SSO Year Focus Mission International Organization for Standardization (ISO) 1947 International Trade To be the leading value adding platform and partner for the production of global and market relevant International Standards covering products, services, good conformity assessment, management and organizational practices International Electro technical Commission (IEC) 1906 International Trade To be recognized as the leader in the development of globally accepted standards for products and services in the fields of electricity, electronics and associated technologies that are market relevant and in the best interests of the industry and the users of its products and services. Institute of Electrical Engineers (IEEE) 1963 Engineering The IEEE promotes the engineering process of creating, developing, integrating, sharing, and applying knowledge about electro and information technologies and sciences for the benefit of humanity and the profession. 1986 Internet connectivity To produce high quality, relevant technical and engineering documents that influence the way people design, use, and manage the Internet in such a way as to make the Internet work better. 1993 E-business To drive the development, convergence, and adoption of ebusiness standards. and Electronics Internet Engineering Task Force (IETF) Organization for the Advancement Structured Information Systems (OASIS) of E-commerce World Wide Web Consortium (W3C) 1994 Internet Open Geospatial Consortium (OGC) 1994 Geospatial Location Ecma International 1994 Software Languages To develop, in co-operation with the appropriate National, European and International organizations Standards and Technical Reports in order to facilitate and standardize the use of Information Communication Technology (ICT) and Consumer Electronics (CE). 2001 Federated Identity The Liberty Alliance is committed to creating technical standards that solve ECMA (1961) Open Liberty Alliance Version Error! Unknown document property name. To lead the World Wide Web to its full potential by developing protocols and guidelines that ensures long-term growth for the Web. and To serve as a global forum for the collaboration of developers and users of spatial data products and services, and to advance the development of international standards for geospatial interoperability. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 59 / 63 Management global identity management needs and can be easily implemented by the widest possible audience. Table 15: SSO list 6.2. Standards per International body The following tables provide a listing of 161 standards from 4 of the main SSO’s. This information is provided purely to show the richness of the standards environment – noting that this is the first version of the KSA Interoperability Framework (YEFI) and it only draws on a small subset of the following standards AT THIS POINT IN TIME. OpenGIS® Specifications 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Catalogue Service Coordinate Transformation Filter Encoding Geographic Objects Geography Markup Language GML in JPEG 2000 Grid Coverage Service Location Services (OpenLS) Simple Feature Access 1 Simple Feature Access 2 Simple Features CORBA Simple Features OLE/COM Styled Layer Descriptor Symbology Encoding Web Coverage Service Web Feature Service Web Map Context Web Map Service Web Service Common Ecma International standards 1 2 3 4 5 6 7 8 C# Language Specification C++/CLI Language Specification Common Language Infrastructure (CLI) ECMAScript Language Specification Eiffel: Analysis, design and programming Language Environmental design considerations for electronic products Universal 3D File Format Microsoft Office Open XML Table 16: OpenGIS & Ecma standards W3C Standards OASIS Standards 1 2 3 4 Architecture of the World Wide Web, Volume One Associating Style Sheets with XML documents Authoring Tool Accessibility Guidelines 1.0 Canonical XML Version 1.0 1 2 3 4 Directory Services Markup Language (DSML) v2.0 DocBook v4.1 DocBook v4.5 ebXML Business Process Specification Schema Technical Specification v2.0.4 5 Cascading Style Sheets (CSS1) Level 1 Specification 5 6 7 Cascading Style Sheets, level 2 (CSS2) Specification Character Model for the World Wide Web 1.0: Fundamentals Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 6 7 ebXML Collaborative Partner Profile Agreement (CPPA) v2 ebXML Message Service Specification v2.0 ebXML Registry Information Model (RIM) v2.0 8 ebXML Registry Information Model (RIM) v3.0 Decryption Transform for XML Signature Document Object Model (DOM) Level 1 Document Object Model (DOM) Level 2 Core Specification Document Object Model (DOM) Level 2 Events Specification 9 10 11 ebXML Registry Services Specification (RS) v2.0 ebXML Registry Services Specification (RS) v3.0 Extensible Access Control Markup Language (XACML) v1.0 eXtensible Access Control Markup Language (XACML) v2.0 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) 8 9 10 11 12 12 This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 60 / 63 13 Document Object Model (DOM) Level 2 HTML Specification Document Object Model (DOM) Level 2 Style Specification Document Object Model (DOM) Level 2 Traversal and Range Specification 13 16 Security Assertion Markup Language (SAML) v1.0 17 Security Assertion Markup Language (SAML) v1.1 18 Security Assertion Markup Language (SAML) V2.0 19 Universal Business Language (UBL) v1.0 20 21 23 Document Object Model (DOM) Level 2 Views Specification Document Object Model (DOM) Level 3 Core Specification Document Object Model (DOM) Level 3 Load and Save Specification Document Object Model (DOM) Level 3 Validation Specification Exclusive XML Canonicalization Version 1.0 Extensible Markup Language (XML) 1.0 (Fourth Edition) Extensible Markup Language (XML) 1.1 (Second Edition) Extensible Stylesheet Language (XSL) Version 1.0 24 25 Extensible Stylesheet Language (XSL) Version 1.1 HTML 3.2 Reference Specification 24 25 Universal Business Language (UBL) v2.0 Universal Business Language Naming & Design Rules (UBL NDR) v1.0 Universal Description, Discovery and Integration (UDDI) v2.0 Universal Description, Discovery and Integration (UDDI) v3.0.2 Web Services for Remote Portlets (WSRP) v1.0 Web Services Security SAML Token Profile v 1.0 and REL Token Profile v1.0 26 27 28 HTML 4.01 Specification Internationalization Tag Set (ITS) Version 1.0 Mathematical Markup Language (MathML) 1.01 Specification Mathematical Markup Language (MathML) Version 2.0 (Second Edition) 26 27 28 Web Services Security v1.0 (WS-Security 2004) Web Services Security v1.1 WS-Reliability (WS-R) v1.1 29 WS-Trust v1.3 14 15 16 17 18 19 20 21 22 29 14 15 22 23 OpenDocument Format for Office Applications (OpenDocument) v1.0 OpenDocument Format for Office Applications (OpenDocument) v1.1 Reference Model for Service Oriented Architecture v1.0 Table 17: W3C & OASIS standards W3C Standards 30 31 32 33 34 35 36 37 38 39 Mobile SVG Profiles: SVG Tiny and SVG Basic Namespaces in XML 1.0 (Second Edition) Namespaces in XML 1.1 (Second Edition) OWL Web Ontology Language Guide OWL Web Ontology Language Overview OWL Web Ontology Language Reference OWL Web Ontology Language Semantics and Abstract Syntax OWL Web Ontology Language Test Cases OWL Web Ontology Language Use Cases and Requirements PICS 1.1 Label Distribution -- Label Syntax and Communication Protocols 40 PICS 1.1 Rating Services and Rating Systems -- and Their Machine Readable Descriptions 41 42 43 44 45 46 47 48 49 50 51 PICS Signed Labels (DSig) 1.0 Specification PICSRules 1.1 Specification Portable Network Graphics (PNG) Specification (Second Edition) QA Framework: Specification Guidelines RDF Primer RDF Semantics RDF Test Cases RDF Vocabulary Description Language 1.0: RDF Schema RDF/XML Syntax Specification (Revised) Resource Description Framework (RDF): Concepts and Abstract Syntax Resource Representation SOAP Header Block Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 61 / 63 52 53 54 55 56 Ruby Annotation Scalable Vector Graphics (SVG) 1.1 Specification Semantic Interpretation for Speech Recognition (SISR) Version 1.0 SMIL Animation SOAP Message Transmission Optimization Mechanism W3C Standards 57 58 59 60 SOAP Version 1.2 Part 0: Primer (Second Edition) SOAP Version 1.2 Part 1: Messaging Framework (Second Edition) SOAP Version 1.2 Part 2: Adjuncts (Second Edition) SOAP Version 1.2 Specification Assertions and Test Collection (Second Edition) 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 Speech Recognition Grammar Specification Version 1.0 Speech Synthesis Markup Language (SSML) Version 1.0 Synchronized Multimedia Integration Language (SMIL 2.1) Synchronized Multimedia Integration Language (SMIL) 1.0 Specification The Platform for Privacy Preferences 1.0 (P3P1.0) Specification User Agent Accessibility Guidelines 1.0 Voice Extensible Markup Language (VoiceXML) Version 2.0 Web Content Accessibility Guidelines 1.0 Web Services Addressing 1.0 - Core Web Services Addressing 1.0 - SOAP Binding WebCGM 1.0 Second Release WebCGM 2.0 XForms 1.0 (Second Edition) XHTML-Print XHTML™ 1.0 The Extensible HyperText Markup Language (Second Edition) 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 XHTML™ 1.1 - Module-based XHTML XHTML™ Basic XML Base XML Encryption Syntax and Processing XML Events XML Inclusions (XInclude) Version 1.0 (Second Edition) XML Information Set (Second Edition) XML Key Management Specification (XKMS 2.0) XML Key Management Specification (XKMS 2.0) Bindings XML Linking Language (XLink) Version 1.0 XML Path Language (XPath) 2.0 XML Path Language (XPath) Version 1.0 XML Schema Part 0: Primer Second Edition XML Schema Part 1: Structures Second Edition XML Schema Part 2: Datatypes Second Edition XML Syntax for XQuery 1.0 (XQueryX) xml:id Version 1.0 XML-binary Optimized Packaging XML-Signature Syntax and Processing XML-Signature XPath Filter 2.0 XPointer element() Scheme XPointer Framework XPointer xmlns() Scheme XQuery 1.0 and XPath 2.0 Data Model (XDM) XQuery 1.0 and XPath 2.0 Formal Semantics XQuery 1.0 and XPath 2.0 Functions and Operators XQuery 1.0: An XML Query Language XSL Transformations (XSLT) Version 1.0 XSL Transformations (XSLT) Version 2.0 Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 62 / 63 105 XSLT 2.0 and XQuery 1.0 Serialization Table 18: W3C standards Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER) e-Government Program (Yesser) Version 1.1 - Page 63 / 63 7. 7.1. Acknowledgements Copyright Notices The YEFI team acknowledges the current document is based on the work published through a number of leading international efforts. In particular, the YEFI has drawn on material from the following documents and acknowledges the rights of these publishers: United Kingdom Interoperability Framework United Kingdom GovTalk New Zealand e-Government Interoperability Framework Danish Interoperability Framework Western Australia E-government Interoperability Framework Ireland REACH Program Malaysian e-Government Initiative In the interests of international cooperation, the Kingdom of Saudi Arabia allows all parties to use the materials in this document so long as reference is acknowledged and published. Version Error! Unknown document property name. Confidential e-Government Program (YESSER) This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)