Inne dokumenty
- D13.1\tProject Quality Plan
- D11.3\tEvents, conferences and workshops- Dec 2011
- D11.5\tSupporting community - Dec 2009
- D11.4\tScientific and policy publications - July 2008
- D6.3.1\tControlled Natural Language Policies
- D6.1.2\tLegal requirements 2
- D6.2.4\tPractitioner's guide to the Legal and Policy handbook for TAS³ implementations
- D11.3\tEvents, conferences and workshops- Dec 2008
- D6.2.4\tLegal and Policy handbook for TAS³
- D1.4.3\tDesign requirements of an adjusted, process driven trust and security environment 3
- D6.1.4 Practitioner's guide to the Legal and Policy handbook for TAS³ implementations
- D8.1\tSoftware documentation system: Repository services
- D3.1\tDesign of a semantic underpinned, secure, adaptable process management platform
- D11.5\tSupporting community - Dec 2008
- D2.2.2\tUpper Common Ontologies 2
- D8.2\tBackoffice services
- D11.2\tCommunication: public website, newsletter, etc. - Jan 2010
- D5.3\tNovel Sources of Trust
- D2.4.2\tConcrete Architecture
- D4.1.3\tSpecification of an identifiers engine 3
- D11.5\tSupporting community - Dec 2011
- D2.3.4\tLower Common Ontologies 4
- D7.2\tOpen Source Software and Documentation implementing the Design
- D11.8\tInternal training for pilots - Nov 2010
- D4.3\tReference implementation
- D8.3\tClient software
- D2.2.3\tUpper Common Ontologies 3
- D11.4\tScientific and policy publications - Dec 2011
- D4.2.2\tSpecification of information containers and authentic repositories 2
- D4.2.3\tSpecification of information containers and authentic repositories 3
- D4.2\tSpecification of information containers and authentic repositories
- D11.3\tEvents, conferences and workshops- Dec 2009
- D3.2.3\tOpen Source software and documentation implementing the design 3
- D2.1.3\tTAS3 Architecture 3
- D11.3\tEvents, conferences and workshops- Dec 2010
- D12.1.3\tInterface management report 3
- D11.2\tCommunication: public website, newsletter, etc. - Dec 2010
- D6.1\tRequirements: Privacy, governance and contractual options
- D4.3.2\tReference implementation 2
- D11.5\tSupporting community - Dec 2010
- D5.2\tBehavioral Trust Management Engine
- D7.2.3\tOpen Source Software and Documentation implementing the Design 3
- D6.2.2\tContractual framework 2
- D12.1\tInterface management report
- D11.1bis\tCommunication Handbook
- D9.2.1\tPilot Evaluation Report 2
- D1.3.2\tSelf-evaluation report 2
- D6.1.4\tLegal requirements 4
- D11.8\tInternal training for pilots - Dec 2011
- D11.1\tDissemination Plan & Communication Handbook appendix
- D11.4\tScientific and policy publications - Dec 2010
- D11.7.2\tInternal Training requirements and setup 2
- D10.1\tTrustworthiness State-of-the-art
- D2.2.4\tUpper Common Ontologies 4
- D11.8\tInternal training for pilots - Dec 2009
- D2.3.3\tLower Common Ontologies 3
- D3.1.2\tDesign of a semantic underpinned, secure, adaptable process management platform 2
- D5.1\tTrust Management Architecture Design
- D11.2\tCommunication: public website, newsletter, etc. - Nov 2008
- D4.3.4\tIntegrated secure repositories 3
- D9.1\tPilots Specifications and Use Case Scenarios
- D2.3\tLower Common Ontologies
- D9.1.3\tPilots Specifications and Use Case Scenarios 3 Final
- D11.2\tCommunication: public website, newsletter, etc. - Dec 2011
- D11.9\tExternal training (community) - Dec 2010
- D4.1\tSpecification of an identifiers engine
- D5.2.2\tBehavioral Trust Management Engine 2
- D4.1.2\tSpecification of an identifiers engine 2
- D1.2\tRequirements assessments report
- D1.3\tSelf-evaluation report
- D11.7\tInternal Training requirements and setup
- D6.2\tContractual framework
- D7.1.2\tDesign of IdM, Authentication and Authorization Infrastructure 2
- D2.3.2\tLower Common Ontologies 2
- D3.1.3\tDesign of a semantic underpinned, secure, adaptable process management platform 3
- D2.1.2\tTAS3 architecture 2
- D3.2\tOpen Source software and documentation implementing the design
- D9.2.3\tPilot Evaluation Report 3
- D6.2.3\tContractual framework 3
- D11.1\tDissemination Plan & Communication Handbook
- D1.2.2\tRequirements assessments report 2
- D8.1.3\tRepository services 3
- D7.2.2\tOpen Source Software and Documentation implementing the Design 2
- D12.1.2\tInterface management report 2
- D2.1\tTAS3 architecture
- D11.9\tExternal training (community) - Dec 2011
- D1.4.2\tDesign requirements of an adjusted, process driven trust and security environment 2
- D2.4\tProtocols, API, and Concrete Architecture
- D6.1.3\tLegal requirements 3
- D9.1.2\tPilots Specifications and Use Case Scenarios 2
- D8.3.3\tClient software 3
- D8.2.3\tBackoffice services 3
- D5.4\tTrust Tool Set
- D11.4\tScientific and policy publications - Dec 2009
- D1.4\tDesign requirements of an adjusted, process driven trust and security environment
- D3.2.2\tOpen Source software and documentation implementing the design 2
- D7.1.3\tDesign of IdM, Authentication and Authorization Infrastructure 3
- D3.3.3\tIntegration with TAS3 trust applications of employment and eHealth processes 3
- D2.4\tProtocols, API, and Concrete Architecture
- D6.3.2\tControlled Natural Language Policies 2
- D5.4.3\tTrust Tool Set 3
- D9.1.3\tPilots Specifications and Use Case Scenarios 3
- D1.1\tState of the art report
- D5.4.2\tTrust Tool Set 2
- D3.3.2\tIntegration with TAS3 trust applications of employment and eHealth processes 2
- D2.2\tUpper Common Ontologies
- D11.4\tScientific and policy publications - Dec 2008
- D11.2\tCommunication: public website, newsletter, etc. - July 2008
- D7.1\tDesign of IdM, Authentication and Authorization Infrastructure