yesser.gov.sa · Web viewThe word shall is used to indicate mandatory requirements strictly to be...
Transcript of yesser.gov.sa · Web viewThe word shall is used to indicate mandatory requirements strictly to be...
e-e-GovernmentGovernment Program (Yesser) Program (Yesser)YEsser Framework Interoperability (YEFI)YEsser Framework Interoperability (YEFI)
YEFI Technical StandardsYEFI Technical Standards
Version 1.1Date: 27/05/2007
e-Government Program (Yesser)
Version 1.1 - Page 2 / 62
Document Description
Document TitleDocument version 1.1Document Status Final
Versioning Version Date Description of changes made
0.1 01-Apr-07 First Draft created 1.0 27-May-07 Final1.1 24-Nov-07 Update with government agencies’ comments
DOCUMENT VALIDATION
Version Author Review by Date Status
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 3 / 62
Table of Contents
1. Introduction..........................................................................................................................71.1. Definitions.......................................................................................................................7
1.1.1. The e-Government Concept.................................................................................................................71.1.2. Yesser................................................................................................................................................... 71.1.3. Yesser Interoperability Framework (YEFI)............................................................................................7
1.2. E-Government in Saudi Arabia.......................................................................................71.2.1. The Program Philosophy......................................................................................................................71.2.2. Yesser and ICT in Government............................................................................................................81.2.3. Rationale for YEFI.................................................................................................................................9
1.3. Document Purpose.........................................................................................................91.4. Scope............................................................................................................................101.5. Target Audience............................................................................................................101.6. Guiding Principles.........................................................................................................10
1.6.1. Resolution no. 40, March 2006...........................................................................................................101.6.2. YEFI is a Living Framework................................................................................................................101.6.3. Yesser Interoperability Committee......................................................................................................111.6.4. Use of Open Standards......................................................................................................................111.6.5. Publication..........................................................................................................................................111.6.6. Do not reinvent the wheel...................................................................................................................111.6.7. Government should not be adversely affected...................................................................................111.6.8. Reference to Other International Interoperability Frameworks...........................................................111.6.9. Change Control...................................................................................................................................11
1.7. Document Structure......................................................................................................121.8. Document Assumptions................................................................................................121.9. Glossary........................................................................................................................13
2. Summary – Standards Snapshot......................................................................................142.1. Classification.................................................................................................................142.2. Approved Standards.....................................................................................................152.3. Candidate Standards....................................................................................................192.4. Emerging Standards.....................................................................................................202.5. Deprecated Standards..................................................................................................21
3. Policies................................................................................................................................223.1. Technical Policies.........................................................................................................22
3.1.1. Adoption..............................................................................................................................................233.1.2. Compliance.........................................................................................................................................233.1.3. Open Standards..................................................................................................................................233.1.4. Procurement.......................................................................................................................................233.1.5. Redesigning Service Delivery.............................................................................................................233.1.6. The Internet is Key..............................................................................................................................233.1.7. Minimizing the Reliance on Manual Services.....................................................................................23
4. Technical Standards..........................................................................................................244.1. Introduction to Technical Standards..............................................................................244.2. Presentation and User Interface Standards..................................................................25
4.2.1. HTML.................................................................................................................................................. 254.2.2. XHTML................................................................................................................................................254.2.3. JPEG................................................................................................................................................... 254.2.4. GIF...................................................................................................................................................... 264.2.5. PNG.................................................................................................................................................... 264.2.6. TIFF.................................................................................................................................................... 264.2.7. Ecma Script / Javascript.....................................................................................................................264.2.8. Atom.................................................................................................................................................... 274.2.9. WAI..................................................................................................................................................... 27
4.3. Multimedia.....................................................................................................................284.3.1. MPEG-1/2 Audio Layer 3....................................................................................................................284.3.2. AAC..................................................................................................................................................... 284.3.3. WMA................................................................................................................................................... 28
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 4 / 62
4.3.4. Real Audio..........................................................................................................................................294.3.5. MPEG-4 Part 2....................................................................................................................................294.3.6. H.264/MPEG-4 part 10/AVC...............................................................................................................294.3.7. Real Video..........................................................................................................................................304.3.8. WMV................................................................................................................................................... 304.3.9. MPEG-4..............................................................................................................................................304.3.10. ASF..................................................................................................................................................... 31
4.4. Standards for web based and electronic services........................................................324.4.1. XML..................................................................................................................................................... 324.4.2. SOAP.................................................................................................................................................. 324.4.3. WSDL..................................................................................................................................................324.4.4. UDDI................................................................................................................................................... 324.4.5. EbXML................................................................................................................................................334.4.6. XML Schema......................................................................................................................................334.4.7. XSL..................................................................................................................................................... 334.4.8. BPMN..................................................................................................................................................344.4.9. EDI...................................................................................................................................................... 34
4.5. WS - I............................................................................................................................344.6. Information and Data Exchange Standards..................................................................35
4.6.1. Unicode...............................................................................................................................................354.6.2. UTF-16................................................................................................................................................354.6.3. UTF-8.................................................................................................................................................. 354.6.4. RTF..................................................................................................................................................... 354.6.5. .txt....................................................................................................................................................... 364.6.6. PDF..................................................................................................................................................... 364.6.7. Microsoft Office binary formats...........................................................................................................364.6.8. ODF.................................................................................................................................................... 374.6.9. UML.................................................................................................................................................... 374.6.10. XMI...................................................................................................................................................... 374.6.11. UBL..................................................................................................................................................... 384.6.12. Xpath...................................................................................................................................................384.6.13. ISO 11179-5........................................................................................................................................384.6.14. Core Component Technical Specification...........................................................................................384.6.15. DCMI................................................................................................................................................... 394.6.16. XNAL................................................................................................................................................... 394.6.17. ISO 639 - Language Codes................................................................................................................394.6.18. ISO 4217 - Currency Codes................................................................................................................404.6.19. ISO Country Codes.............................................................................................................................40
4.7. Connectivity Standards.................................................................................................414.7.1. S/MIME...............................................................................................................................................414.7.2. POP.................................................................................................................................................... 414.7.3. IMAP................................................................................................................................................... 414.7.4. HTTP................................................................................................................................................... 414.7.5. HTTPS................................................................................................................................................424.7.6. LDAP................................................................................................................................................... 424.7.7. DNS.................................................................................................................................................... 424.7.8. FTP..................................................................................................................................................... 434.7.9. FTPS................................................................................................................................................... 434.7.10. IP......................................................................................................................................................... 434.7.11. TCP..................................................................................................................................................... 434.7.12. UDP.................................................................................................................................................... 444.7.13. IEEE 802.11........................................................................................................................................444.7.14. SMTP.................................................................................................................................................. 444.7.15. VPN..................................................................................................................................................... 45
4.8. Security Standards........................................................................................................464.8.1. PKCS #7 (RFC 2315).........................................................................................................................464.8.2. IpSec................................................................................................................................................... 464.8.3. SSL..................................................................................................................................................... 464.8.4. TLS..................................................................................................................................................... 464.8.5. TDES.................................................................................................................................................. 474.8.6. AES..................................................................................................................................................... 474.8.7. RSA..................................................................................................................................................... 474.8.8. SAML.................................................................................................................................................. 484.8.9. WPA.................................................................................................................................................... 484.8.10. WS-security.........................................................................................................................................48
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 5 / 62
5. Other standards..................................................................................................................495.1. Candidate Standards....................................................................................................49
5.1.1. Pending YIC Approval.........................................................................................................................495.1.2. XBRL................................................................................................................................................... 495.1.3. XHTML Mobile Profile.........................................................................................................................495.1.4. MPLS.................................................................................................................................................. 495.1.5. Saudi Post National Address Profile...................................................................................................505.1.6. XML Encryption...................................................................................................................................505.1.7. XML Signature....................................................................................................................................50
5.2. Emerging Standards.....................................................................................................525.2.1. Office Open XML................................................................................................................................52
5.3. Deprecated standards...................................................................................................535.3.1. WML.................................................................................................................................................... 535.3.2. EPS..................................................................................................................................................... 535.3.3. ISO/IEC 8859-1:1998..........................................................................................................................535.3.4. ASCII................................................................................................................................................... 545.3.5. WAP.................................................................................................................................................... 545.3.6. DES..................................................................................................................................................... 545.3.7. RSS..................................................................................................................................................... 545.3.8. DTD..................................................................................................................................................... 555.3.9. MPEG-1..............................................................................................................................................555.3.10. MPEG-2..............................................................................................................................................555.3.11. AVI...................................................................................................................................................... 565.3.12. Quicktime............................................................................................................................................56
6. Choosing Standards..........................................................................................................576.1. International Standards Bodies.....................................................................................576.2. Standards per International body..................................................................................59
7. Acknowledgements............................................................................................................637.1. Copyright Notices..........................................................................................................63
Copyright Notice
This document is a working draft or committee draft and is copyright-protected by MCIT.
While the reproduction of working drafts or committee drafts in any form for use by participants in the YEFI standards development process is permitted without prior permission from MCIT, neither this document nor any extract from it may be reproduced, stored or transmitted in any form for any other purpose without prior written permission from MCIT.
Reproduction for sales purposes may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
List of TablesTable 1: Document Structure.......................................................................................................12Table 2: Glossary........................................................................................................................13Table 3: Presentation & User Interface approved standards......................................................15Table 3: Presentation & User Interface approved standards......................................................15Table 4: Web Based & Electronic Services approved standards...............................................16Table 5: Information & Data Exchange approved standards.......................................................17Table 6: Connectivity approved standards..................................................................................17Table 7: Security approved standards.........................................................................................18
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 6 / 62
Table 8: Candidate Application Integration Standards................................................................19Table 9: Information Access and Interchange candidate standards...........................................19Table 10: Interconnectivity candidate standards.........................................................................19Table 11: Security candidate standards......................................................................................19Table 12: Emerging Standards....................................................................................................20Table 13: Deprecated Standards.................................................................................................21Table 14: SSO list........................................................................................................................59Table 15: OpenGIS and Ecma standrads....................................................................................59Table 16: W3C & OASIS standards............................................................................................60Table 17: W3C standards............................................................................................................62
List of FiguresFigure 1 Yesser Program..............................................................................................................8Figure 2 YEFI, YESSER and outside interactions.........................................................................9Figure 3 YEFI High Level Architecture........................................................................................24
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 7 / 62
1. Introduction
1.1. Definitions1.1.1. The e-Government Concept1
E-Government may be defined as the effective, integrated utilization of all information and communication technologies to ease and speed up transactions in government organizations (G2G), between government organizations and customers (G2C), between government organizations and their employees (G2E) and between government organizations and business organizations (G2B).
1.1.2. YesserThe e-Government Program - Yesser - was launched with the following objectives:
o Raising the public sector's productivity and efficiency
o Providing better and more easy-to-use services for individual and business customers
o Increasing return on investment (ROI)
o Providing the required information in a timely and highly accurate fashion.
1.1.3. Yesser Interoperability Framework (YEFI)2
It’s a unified framework to implement e-government. It includes cross – governmental specifications and policies, to enable cross – governmental integration and facilitate G2G transactions and data sharing.
1.2. E-Government in Saudi ArabiaThe Government of Saudi Arabia attaches high significance to the e-government concept and the transformation process that leads to its realization. It strongly believes in the huge benefits such concept of e-government entails for the national economy.
Transformation to an information society cannot be achieved without comprehensive collaboration and concerted efforts to realize the set objectives.
1.2.1. The Program PhilosophyYesser plays the role of enabling the implementation of e-government. It reduces, as much as possible, centralization in e-government implementation while ensuring the minimum level of coordination between government departments. The program's work methodology is based on the following main principles:
Principle 1 Unified vision, priorities, standards and frameworks
Principle 2 Not only technology, but much more
Principle 3 Reduce centralization as much as possible
1 Referenced from the YESSER website: http://www.yesser.gov.sa/english/what_is_gov.asp?id=item22 Referenced from the YESSER website: http://www.yesser.gov.sa/english/YEFI.asp?id=item4
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 8 / 62
Principle 4 Develop once, use many times
1.2.2. Yesser and ICT in GovernmentICT applications in government organizations have three categories:
1. Applications common to all government organizations (common applications) such as personnel systems, financial systems, document management systems, etc.
2. Applications that are jointly used by multiple government organizations such as recruitment applications
3. Applications that are specifically used by one government organization.
Figure 1 Yesser Program
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
Internet
Portal
Agency
Agency
Agency
Agency
YEFI
E-Services
GRP YIC
YESSER
GSB
Agency
AgencyAgency
e-Government Program (Yesser)
Version 1.1 - Page 9 / 62
1.2.3. Rationale for YEFIo Enable electronic cross – governmental integration. o Facilitate cross – governmental data sharing. o Facilitate cross – governmental transactions.
It is clear that in order to achieve cross-governmental integration and data sharing, a standards framework defining common technical policies and standards is necessary.
In the context of e-Government, the standards framework will be encompassed and delivered by the YESSER Framework for Interoperability (YEFI) which will provide the necessary standards required to guarantee interoperability, integration, portability and reusability of systems. YEFI shall be a foundation framework for achieving the overall e-Government strategy and help to ensure that all government systems, processes and electronic services (i.e. e-Services) are fit for their purpose.
YESSER
YEFI
GSB
Security / Firewalls
Figure 2 YEFI, YESSER and outside interactions
1.3. Document PurposeThe purpose of this document is to present Version 1.0 of the Technical Standards for YEFI. The intention of this document is that it should be used for consultation purposes within the Yesser Interoperability Committee (YIC) and for consultation purposes across the government agencies in Saudi Arabia.
The technical standards document aims to inform which technology and engineering standards will be applicable for cross-governmental integration and data sharing.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 10 / 62
It is expected that the next version of this document, once consultation is complete, will form the basis for the first publicly available YEFI documentation.
1.4. ScopeThis document provides Technical standards for the following areas:
Presentation and User interface
Multimedia
Web based and Electronic service
Information and Data Exchange
Connectivity
Security
1.5. Target Audience
This document is aimed at the prospective users of the YEFI framework, namely,
Ministries and other government entities
Decision makers and policy analysts
ICT managers and Business analysts
Businesses and Vendors
Other stakeholders involved in interoperability projects or strategies
1.6. Guiding Principles1.6.1.Resolution no. 40, March 2006
Resolution no. 40 of the Council of Ministers, dated March 2006, provides the baseline mandate for how agencies should approach information and data management to secure an interoperability solution for the delivery of electronic services to the users of government.
1.6.2.YEFI is a Living FrameworkYEFI is a living framework subject to formal review cycles. To minimize impacts brought about by changes to YEFI, all reasonable efforts will be taken to provide agencies with upfront communications about changes and requisite responses.
1.6.3.Yesser Interoperability CommitteeYEFI and any recommended changes are subject to approval by the members of the Yesser Interoperability Committee (YIC).
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 11 / 62
1.6.4.Use of Open StandardsWherever possible, YEFI will build upon international open standards. Where these standards do not exist or do not meet the needs for KSA, existing best practices and local industry standards may be adopted. The intention of this principle is that YEFI does not “re-invent the wheel”.
1.6.5.PublicationAll materials, which constitute the latest version of YEFI, will be published on the Internet and will be freely available to the public including stakeholders involved in interoperability projects or strategies.
1.6.6.Do not reinvent the wheelAny experiences relating to Interoperability standards and/or policies relevant to YEFI and arising from work that a government agency has already conducted will be reviewed and incorporated where possible. The intention of this principle is to not re-invent the wheel.
1.6.7.Government should not be adversely affectedWhere an organization is negatively affected by the adoption of YEFI, a Working Group may be appointed to work directly to resolve any issues.
1.6.8.Reference to Other International Interoperability FrameworksInteroperability frameworks from other countries will be used as reference where applicable. Regular checks for compatibility with other countries' interoperability frameworks should be part of the revision cycle for YEFI
1.6.9.Change ControlAll major changes to YEFI shall be subject to a change management and consultation process with all stakeholders, businesses and YIC members. Minor changes shall be subject to change management process and consultation with YIC members.
1.7. Document StructureThis document has the following structure:
Section Description1. Intro
ductionThis section provides information about the purpose and background to the YEFI
2. Summary
In this section, the classification of the standards is explained and the Approved and Candidate Standards are provided in a simple tabular form for visual reference.
3. Policies
ICT policies relevant to the development and delivery of YEFI as a foundation framework for YESSER
4. Technical Standards
In this section, all the recommended standards for YEFI 1.0 are described. This section includes commentaries about the use of the Standards
5. Other Standards
In this section, the Candidate, Emerging and Deprecated standards.
6. Choosing Standards
This section provides a small discussion primer on what each Standards Body brings to the table and the focus area for each body / organization. The expectation is that this section will be removed from later versions of the Technical Standards.
7. Ackn Acknowledgements, copyright notices etc.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 12 / 62
owledgementsTable 1: Document Structure
1.8. Document AssumptionsThis document makes the following assumptions:
Assumption 1MCIT and YIC have people available to review and critique this document before it is distributed for wider review across government.
Assumption 2Delivery of this document is part of the consultation phase for Version 1.0. It is expected that the consultation phase may take up to 4 months to complete pending the amount of feedback and revisions needed to formalize the final version.
Assumption 3 YIC is the body that formally accepts the YEFI as delivered.
Assumption 4This document will be replaced by a web-based HTML and/or PDF version available via either the Yesser website or the new, yet to be developed, YEFI portal.
Assumption 5Delivery of this document to MCIT and YIC signals the end of the Technical Standards stream for the current YEFI project.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 13 / 62
1.9. GlossaryAbbreviation Description
YIC YEFI Interoperability Committee
YEFI YEsser Framework for Interoperability
Table 2: Glossary
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 14 / 62
2. Summary – Standards SnapshotIt is clear that in order to achieve cross-governmental integration and data sharing, a standards framework defining common technical policies and standards is necessary.
In the context of e-Government, the standards framework will be encompassed and delivered by the YESSER Framework for Interoperability (YEFI) which will provide the necessary standards required to guarantee interoperability, integration, portability and reusability of systems. YEFI shall be a foundation framework for achieving the overall e-Government strategy and help to ensure that all government systems, processes and electronic services (i.e. e-Services) are fit for their purpose.
Snapshots
The remainder of this section provides a snapshot list of the proposed Technical Standards for YEFI.
The standards are described in detail in Section 3 and have hyperlinks to the respective authoritative sources for each standard.
2.1. ClassificationThe standards are grouped in to four categories:
Approved
Those Standards (International or De Facto) agreed by YIC for inclusion in the YEFI
Candidate
Standards waiting YIC approval for inclusion as Approved Standards in the YEFI
Emerging
Standards and/or protocols coming through either the standardization process or are market driven and that bear watching by the YEFI team
Deprecated
Those standards and/or protocols that should not now be used
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 15 / 62
2.2. Approved Standards
Presentation & User Interface Acronym and Version
Hypertext Mark-up Language HTML 4.01
Extensible Hypertext Mark-up Language XHTML 1.0
Joint Photographic Experts Group JPEG
Graphics Interchange Format GIF
Portable Network Graphics PNG
Tag Image File Format TIFF
ECMA Script ECMA 262 Script 3rd Ed
Atom Atom 1.0
Web Accessibility Initiative WAI
Table 3: Presentation & User Interface approved standards
Multimedia Acronym and Version
MPEG-1/2 Audio Layer 3 MP3
Advanced Audio Codec AAC
Windows Media Audio WMA 9.0
Real Audio Real Audio
MPEG-4 Part 2 MPEG-4 Part 2
H.264/MPEG-4 part 10/AVC H.264/MPEG-4 part 10/AVC
Real Video Real Video
Windows Media Video WMV 9.0
Moving Picture Experts Group 4 MPEG-4
Advanced Systems Format ASF
Table 4: Multimedia approved standards
Web Based & Electronic Services Acronym and Version
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 16 / 62
Extensible markup language XML 1.1
Simple Object Access Protocol SOAP 1.1
Web Services Definition Language WSDL 2.0
Universal Description, Discovery and Integration UDDI 2.0
E-business Extensible Mark-up Language EbXML 1.0
Extensible Mark-up Language Schema XML Schema 1.0
Extensible Stylesheet Language XSL
Business Process Modeling Notation BPMN
Electronic Document Interchange EDI
Web Services Interoperability WS-I
Table 5: Web Based & Electronic Services approved standards
Information & Data Exchange Acronym and Version
Unicode UNICODE ISO/IEC 10646-1:2000 5.0
Unicode Transformation Format 16 bit UTF-16Unicode Transformation Format 8 bit UTF-8Rich Text Format RTF 1.6Text .txtPortable Document Format PDFMicrosoft Office 1997 MS Office 97 binary formatsOpenDocument Format ODF 1.1Unified Modeling Language UMLExtensible Metadata Interchange XMIUniversal Business Language UBLXML Path Language XpathISO 11179-5 ISO 11179-5
Core Component Technical Specification Core Component Technical Specification
Dublin Core Metadata Initiative DCMIExtensible Name and Address mark-up Language XNALISO 639 - Language Codes ISO 639
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 17 / 62
ISO 4217 - Currency Codes ISO 4217ISO Country Codes ISO 3166-1, 3166-2
Table 6: Information & Data Exchange approved standards
Connectivity Acronym and Version
Secure / Multipurpose Internet Mail Extensions S/MIME 3.0Post Office Protocol POP 3.0Internet Message Access Protocol IMAP 4.0Hypertext Transfer Protocol HTTP 1.1Secure Hypertext Transfer Protocol HTTPSLightweight Directory Access Protocol LDAP v3Domain Name Server DNSFile Transfer Protocol FTPFile Transfer Protocol over Secure Socket Layer FTPSInternet Protocol IP v4Transmission Control Protocol TCPUser Datagram Format UDPWireless Channel G IEEE 802.11gSimple Mail Transfer Protocol SMTPVirtual Private Network VPN
Table 7: Connectivity approved standards
Security Acronym and Version
Public-Key Cryptography Standard PKCS #7 (RFC 2315) 1.5Internet Protocol Security IPsecSecure Socket Layer SSL 3.0Transport Layer Security TLS 1.1Triple Data Encryption Standard TDESAdvanced Encryption Standard AESRSA Algorithm RSA
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 18 / 62
Security Assertion Mark-up Language SAML 2.0Wi-Fi Protected Access WPA 2Web Services Security WS-security
Table 8: Security approved standards
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 19 / 62
2.3. Candidate StandardsApplication Integration candidate Standards Acronym and Version
Extensible Business Reporting Language XBRL
Table 9: Application Integration candidate Standard
Information Access and Interchange Acronym and Version
Extensible Hypertext Mark-up Language for Mobile Profile XHTML Mobile Profile 1.1
Saudi Post National Address File
Table 10: Information Access and Interchange candidate standards
Interconnectivity Acronym and Version
Multi-protocol Label Switching MPLS
Table 11: Interconnectivity candidate standard
Security Acronym and Version
Extensible Mark-up Language Encryption XML Encryption
Extensible Mark-up Language Signature XML Signature
Table 12: Security candidate standards
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 20 / 62
2.4. Emerging StandardsEmerging Standards Acronym and Version
Office Open XML OOXML
Table 13: Emerging Standard
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 21 / 62
2.5. Deprecated StandardsDeprecated standards Acronym and Version
Wireless Markup Language WML
Encapsulated PostScript EPS
ISO/IEC 8859-1:1998 ISO/IEC 8859-1:1998
American Standard Code for Information Interchange ASCII
Wireless Application Protocol WAP
Data Encryption Standard DES
Really Simple Syndication / Rich Site Summary RSS
Document Type Definition DTD
Moving Picture Experts Group 1 MPEG 1
Moving Picture Experts Group 2 MPEG 2
Audio Video Interleave AVI
Table 14: Deprecated Standards
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 22 / 62
3. PoliciesThe key policy decisions that will serve to shape YEFI include:
1. Alignment with the Internet: the universal adoption of common specifications used on the Internet and World Wide Web for all public sector information systems;
2. Adoption of XML as the primary standard for data integration and data management for all public sector systems;
3. Adoption of the browser as the key interface: all public sector information systems are to be accessible through browser-based technology; other interfaces are permitted but only in addition to browser-based ones;
4. The development and adoption of the metadata standards, based on the international Dublin Core model (ISO 15836) as well as direct experiences from benchmarking studies from other country e-Government experiences;
5. Interfaces between government information systems and intermediaries providing e-Government services shall conform to the standards in YEFI;
6. Interfaces between intermediaries and the public are outside the scope of YEFI.
Adherence to YEFI standards and technical policies shall be mandatory for each Ministry. Other government agencies are strongly encouraged to adopt the YEFI.
Full compliance with YEFI is required within 18 months of publication of YEFI version 1.1.
3.1. Technical PoliciesAll Technical Standards will use either “Shall”, “Should”, “May” and “Can” as defined by the IEEE when describing expected behaviors with regard to the utilization and usage of technical standards.3
The use of the terms “Must” and “Will” is not permitted.
Rationale The word shall is used to indicate mandatory requirements strictly to be followed in order to conform to the standard and from which no deviation is permitted (shall equals is required to). The use of the word must is deprecated and shall not be used when stating mandatory requirements; must is used only to describe unavoidable situations. The use of the word will is deprecated and shall not be used when stating mandatory requirements; will is only used in statements of fact.
3 http://standards.ieee.org/guides/style/section5.html
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 23 / 62
The word should is used to indicate that among several possibilities one is recommended as particularly suitable, without mentioning or excluding others; or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain course of action is deprecated but not prohibited (should equals is recommended that).The word may is used to indicate a course of action permissible within the limits of the standard (may equals is permitted to).The word can is used for statements of possibility and capability, whether material, physical, or causal (can equals is able to).
3.1.1.AdoptionThe adoption of the Yesser Framework for Interoperability (YEFI) shall allow for a sensible transition.
3.1.2.ComplianceAny new information system, software application, or electronic data/information resource (or current instances of these being redeveloped or replaced), or systems for interfacing with these, shall comply with YEFI
3.1.3.Open StandardsYEFI will employ Open Standards wherever possible; where Open Standards do not meet the needs of the Saudi government, preference should be given to industry best practice then Saudi Government approved protocols
3.1.4.ProcurementAll tenders / procurement of new systems (hardware and/or software) shall specify the need for compliance with YEFI
3.1.5.Redesigning Service DeliveryAll government entities shall redesign their services for delivery using telecommunications and information technology applications4
3.1.6.The Internet is KeyEach government entity shall use the Internet eg e-mail and ecommunication media in performing its activities 5
3.1.7.Minimizing the Reliance on Manual ServicesEach government entity shall minimize reliance on traditional manual and/or paper based methods in providing government services6
4 Taken from Resolution 40, March 20065 Taken from Resolution 40, March 20066 Taken form Resolution 40, March 2006
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 24 / 62
4. Technical Standards
4.1. Introduction to Technical Standards
This paper provides for a common overview of the technical infrastructure and standards recommended for the establishment of interoperability between ICT systems in the Saudi-Arabian public sector.
The establishment of an interoperability framework provides a platform for agencies to select products that comply with open standards and interoperability. In turn, the adoption of interoperable products provides for improved connections between agencies, allows better data sharing practices and makes it easier to commence the process of standardization across agencies, with the purpose of providing better service to agencies and citizens.
Governance
Policies
XSD Registry
Repository
Connectivity
Data Exchange
User Interface
Web Services
Security
YESSER Interoperability Committee (YIC)
E-ServiceModels
YEFI
Figure 3 YEFI High Level Architecture
4.2. Presentation and User Interface Standards4.2.1. HTML
Name: Hypertext Markup Language Abbreviation: HTML Version: 4.01
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 25 / 62
Owner: W3C Alternatives: XHTML 1.0 Status: Approved
Usage areas: Publishing web content
Link: http://www.w3.org/TR/html401/
Description: HTML is used to display web content
Explanation for status:HTML is the basis of a lot of communication over the internet and the preferred way to display content in many applications, including browsers. It is compatible with many different kinds of software. In development of new applications, specifying XHTML as a standard should be considered
4.2.2. XHTMLName: Extensible HyperText Markup Language
Abbreviation: XHTML Version: 1.0
Owner: W3C Alternatives: HTML 4.01 Status: Approved
Usage areas: Publishing web content
Link: http://www.w3.org/TR/xhtml1/
Description: For displaying structured web content in a human and machine-readable format. XHTML is the next generation of HTML, using stricter syntax to make it machine-readable
Explanation for status:XHTML is recommended as a standard for delivering web content, since its strict format makes it easier to use on different platforms, with different software and devices.
4.2.3. JPEG
Name: Joint Photographic Experts Group Abbreviation: JPEG Version: -Owner: ISO Alternatives: PNG Status: Approved
Usage areas: Graphics
Link: http://www.w3.org/Graphics/JPEG/itu-t81.pdf
Description: JPEG is an image format, well suited for displaying pictures that will tolerate information loss
Explanation for status: JPEG is a patented format, where the patent has expired in the US. For Europe the patent status remains unclear. The format is widely used and most applications recognize JPEG images
4.2.4.GIF
Name: Graphics Interchange Format Abbreviation: GIF Version: -Owner: - Alternatives: PNG Status: Approved
Usage areas: Graphics
Link: http://www.w3.org/Graphics/GIF/spec-gif89a.txt
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 26 / 62
Description: GIF is an image format, useful for web purposes because of its small size. It supports animation.
Explanation for status: GIF used to be patented, but patents have now expired. This means that the format can be used royalty-free.
4.2.5.PNG
Name: Portable Network Graphics Abbreviation: PNG Version: -Owner: W3C Alternatives: GIF Status: Approved
Usage areas: Graphics
Link: http://www.w3.org/Graphics/PNG/
Description: PNG is an image format, developed as an open alternative to GIF. It does not have the same adoption rate and support though. PNG is suited for displaying graphics, less so for displaying photographic content on the internet because of substantially larger file size
Explanation for status: Does not support animation, like GIF does. If this functionality is needed, consider using the GIF image format
4.2.6.TIFF
Name: Tagged Image File Format Abbreviation: TIFF Version: 6.0
Owner: - Alternatives: JPEG Status: Approved
Usage areas: Graphics
Link: http://partners.adobe.com/public/developer/tiff/index.html
Description: TIFF is an image format with a wide range of options, well-suited for exchanging images between professional image editing applications
Explanation for status: TIFF has a complicated specification that makes it difficult to use in web applications. For applications in this category, alternatives should be considered.
4.2.7.Ecma Script / Javascript
Name: ECMA 262 Script Abbreviation: - Version: 3rd edition
Owner: ECMA Alternatives: Status: Approved
Usage areas: Building dynamic web pages
Link: http://www.ecma-international.org/publications/standards/Ecma-262.htm
Description: ECMA is the standardized version of JavaScript, a scripting language that makes it possible to construct dynamic web pages
Explanation for status: Dynamic functionality in web pages can make them more user-friendly. JavaScript is a good way of building dynamic functionality and the scripting language is recognized on most modern platforms.
4.2.8.Atom
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 27 / 62
Name: Atom Abbreviation: - Version: 1.0
Owner: IETF Alternatives: RSS Status: Approved
Usage areas: Content publishing
Link: http://tools.ietf.org/html/rfc4287
Description: The Atom standard, like RSS, is used to publish and syndicate web content. The Atom standard has been developed as a more open and XML-compliant alternative to the RSS-standard.
Explanation for status: The Atom standard has a more open change process than the RSS standards and is more focused on complying with existing XML-standards. It is not yet as widely used as RSS though.
4.2.9.WAI
Name: Web accessibility initiative Abbreviation: -WAI Version: 2.0
Owner: W3C Alternatives: Status: Approved
Usage areas: Usability, accessibility
Link: http://www.w3.org/TR/WCAG20/
Description: WAI is a set of guidelines to make web content more accessible to people who have difficulties using normal interfaces, e.g. disabled users. The guidelines are also used to ensure that content can be delivered on a number of different platforms, for example mobile devices with limited screen resolution and bandwidth. There are also guidelines for accessibility in developer tools (such as HTML editors) and guidelines for user agents (such as browsers or media players)
Explanation for status: WAI is standardized through W3C and is the most widely used set of guidelines for accessibility, ensuring that vendors and developers are familiar with the standard.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 28 / 62
4.3. Multimedia4.3.1.MPEG-1/2 Audio Layer 3
Name: MPEG-1/2 Audio Layer 3 Abbreviation: MP3 Version: -
Owner: ISO/IEC Alternatives: AAC Status: Approved
Usage areas: Audio codec
Link: http://www.mp3licensing.com/
Description: MPEG-1/2 Audio Layer 3 is an audio lossy compression format. It uses an advanced type of audio compression, which reduces the file size with little reduction in audio quality.
Explanation for status: The MP3 format has been an ISO standard since 1993. MP3 is backward and forward compatible ensuring that every mp3-file created in the past can be played on all current and future digital audio players.
4.3.2.AAC
Name: Advanced Audio Codec Abbreviation: AAC Version: -
Owner: ISO/IEC Alternatives: Status: Approved
Usage areas: Audio codec
Link: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43026
Description: AAC is a standardized, lossy compression and encoding scheme for digital audio. AAC audio is placed in a MP4 container, but raw AAC files is also an option, although not advised
Explanation for status: AAC is specified both as Part 7 of the MPEG-2 standard, and Part 3 of the MPEG-4 standard. It is a successor format of MP3 for audio coding at medium to high bit rates. It has a number of improvements over MP3, in coding efficiency and frequency handling.
4.3.3.WMA
Name: Windows Media Audio Abbreviation: WMA Version: 9
Owner: Microsoft Alternatives: AAC Status: Approved
Usage areas: Audio codec
Link: http://www.microsoft.com/windows/windowsmedia/forpros/codecs/audio.aspx
Description: WMA is a proprietary audio compression technology. WMA can refer to the audio file format or the audio codec.
Explanation for status: WMA is one of the most popular codecs. WMA Lossless codec compresses audio data without loss of audio fidelity.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 29 / 62
4.3.4.Real Audio
Name: Real Audio Abbreviation: RA Version: 10
Owner: RealNetworks Alternatives: AAC Status: Approved
Usage areas: Audio codec
Link: http://www.realnetworks.com/products/index.html
Description: RealAudio codec is a proprietary audio format developed by RealNetworks. It can be used as a streaming media format over HTTP. Real Audio can be played from a Real Media container.
Explanation for status: Real Audio is RealNetworks proprietary audio format. It is possible to obtain the source code to Reals codecs. There exist both a free player for Windows and an open source player for Linux/UNIX.
4.3.5.MPEG-4 Part 2
Name: MPEG-4 Part 2 Abbreviation: MPEG-4 Part2
Version: -
Owner: ISO/IEC Alternatives: MPEG-4 Part 10
Status: Approved
Usage areas: Video codec
Link: http://www.iso.org/iso/fr/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39259
Description: Mpeg-4 part 2 is a DCT (Discrete Cosine Transform) video compression standard.
Explanation for status: Several popular codecs including DivX, Xvid and Nero Digital are implementations of Mpeg-4 part 2 standard.
4.3.6.H.264/MPEG-4 part 10/AVC
Name: Advanced Audio Codec Abbreviation: H.264 Version: -
Owner: ISO/IEC, ITU-T Alternatives: Status: Approved
Usage areas: Video codec
Link: http://www.itu.int/rec/T-REC-H.264/en
Description: H.264, MPEG-4 Part 10, or AVC is a standard for video compression. allowing to compress video much more effectively and to provide more flexibility for application to a wide variety of network environments
Explanation for status: H.264 experienced widespread adoption within a few years of the completion of the standard. It is employed widely in applications ranging from television broadcast to video for mobile devices
4.3.7.Real Video
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 30 / 62
Name: Real Video Abbreviation: Real Video Version: 10
Owner: RealNetworks Alternatives: H.264 Status: Approved
Usage areas: Video codec
Link: http://www.realnetworks.com/products/index.html
Description: Real Video codec is a proprietary video format developed by RealNetworks. Real Video can be played from a Real Media container.
Explanation for status: RealVideo uses a proprietary video format making it difficult to use with other player or server software
4.3.8.WMV
Name: Windows Media Video Abbreviation: WMV Version: 9Owner: Microsoft Alternatives: Status: Approved
Usage areas: Audio/Video file container
Link: http://www.microsoft.com/windows/windowsmedia/forpros/codecs/video.aspx
Description: WMV is a compressed video file format for several proprietary codecs developed by Microsoft.
Explanation for status: Windows Media Video is a proprietary and closed codec from Microsoft. The codec is normally used in Advanced Systems Format file.
4.3.9.ASF
Name: Advanced Systems Format Abbreviation: ASF Version: -
Owner: Microsoft Alternatives: MP4 Status: Approved
Usage areas: Audio/Video file container
Link: http://www.microsoft.com/windows/windowsmedia/forpros/format/asfspec.aspx
Description: ASF is Microsoft's proprietary digital audio/video container format, especially meant for streaming media.
Explanation for status: ASF container format can technically include any codec.
4.3.10.MPEG-2
Name: MPEG-2 Abbreviation: MPEG-2 Version: -
Owner: ISO/IEC Alternatives: MPEG-4 Status: Approved
Usage areas: Audio/Video
Link: http://www.chiariglione.org/mpeg/standards/mpeg-2/mpeg-2.htm
Description: MPEG-2 is a set of audio/video coding and compression standards. MPEG-2 is the core of most digital television and DVD format.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 31 / 62
Explanation for status: MPEG-2 enhances many features of the MPEG-1 standard. MPEG-2 Audio Layer-3 is the standard for the popular MP3 format. Part 7 of the MPEG-2 standard is referred to as MPEG-2 AAC or AAC.
4.3.11.MPEG-4
Name: MPEG-4 Abbreviation: MP4 Version: -
Owner: ISO/IEC Alternatives: Status: Approved
Usage areas: Audio/Video file container
Link: http://www.chiariglione.org/mpeg/standards/mpeg-4/mpeg-4.htm
Description: MPEG-4 is a set of standards used primarily to compress audio and visual (AV) digital data. MP4 is the official container for MPEG-4 multimedia.
Explanation for status: MPEG-4 absorbs many of the features of MPEG-1 and MPEG-2 and other related standards, adding new features such as (extended) VRML support for 3D rendering, object-oriented composite files (including audio, video and VRML objects), support for externally-specified Digital Rights Management and various types of interactivity.
4.4. Standards for web based and electronic services4.4.1.XML
Name: Extensible markup language Abbreviation: XML Version: 1.1
Owner: W3C Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture
Link: http://www.w3.org/TR/xml11/
Description: XML is a markup language designed to describe data. It uses a Document Type Definition (DTD) or an XML Schema. XML tags are not predefined.Explanation for status: XML is an internationally approved W3C standard and is widely used and supported.
4.4.2.SOAPName: Simple Object Access Protocol Abbreviation: SOAP Version: 1.1
Owner: W3C Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.w3.org/TR/soap/
Description: For remote service invocation and XML data exchange. It uses SMTP and HTTP and is therefore widely deployable
Explanation for status: SOAP is a widely used standard for XML data exchange. It is an open standard, standardized by W3C and uses HTTP or SMTP as transport protocol, making it compatible with existing infrastructure
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 32 / 62
4.4.3.WSDLName: Web Services Description Language Abbreviation: WSDL Version: 2.0
Owner: W3C Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.w3.org/TR/wsdl20/
Description: For remote service description. Describes what functions are available in a service. WSDL is often used in conjunction with SOAP when building web services. It describes how to use web services available on a server.
Explanation for status: The World Wide Web Consortium (W3C) has not endorsed Version 1.1. Version 2.0, for which several drafts have been released, become a W3C recommendation.
4.4.4.UDDIName: Universal Description, Discovery and Integration
Abbreviation: UDDI Version: 3
Owner: OASIS Alternatives: ebXML Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.uddi.org/specification.html
Description: For the publication and discovery of remote service descriptions, UDDI works as a directory of web services, allowing organizations to connect to each other’s web services. UDDI is vendor-driven, being developed by Microsoft, IBM etc. The focus is on helping large organizations manage their network of customers.
Explanation for status: UDDI is one of the core web services standards. It is designed to work with SOAP and WSDL. UDDI is an OASIS standard
4.4.5.EbXMLName: Electronic Business using eXtensible Markup Language
Abbreviation: EbXML Version: 1
Owner: OASIS / UNCEFACT Alternatives: UDDI Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.ebxml.org/specs/
Description: Similar to UDDI, EbXML is a set of specifications for the publication and discovery of remote service descriptions. EbXML is more focused on building a universal solution than UDDI, focusing on establishing general B2B XML integration. It is supported by many of the same vendors that are behind UDDI.
Explanation for status: EbXML is widely adopted and is standardized by OASIS/UNCEFACT. It is able to use a number of different application-level transport protocols, including SMTP, HTTP etc. The header is XML, but the body of the document may be XML, MIME or other formats.
4.4.6.XML SchemaName: Extensible markup language schema Abbreviation: XML Schema Version: 1
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 33 / 62
Owner: W3C Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.w3.org/XML/Schema
Description: For data-oriented message DTD as defined in the corresponding XML specification – for textual document-oriented applications
Explanation for status: XML Schema is an internationally approved W3C standard and is widely used and supported.
4.4.7.XSLName: Extensible Stylesheet Language Abbreviation: XSL Version:Owner: W3C Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.w3.org/Style/XSL/
Description: XSL is a collection of ways to transform and format XML. It consists of XML transformations, XSL formatting objects and XML path language.
Explanation for status: XSL is W3C standardized, making it widely applicable
4.4.8.BPMNName: Business Process Modeling Notation Abbreviation: BPMN Version: 1.0Owner: OMG Alternatives: Status: Approved
Usage areas: Process modeling
Link: http://www.bpmn.org/
Description: BPMN is a standardized way for graphically displaying business processes in a workflow. The purpose of the standard is to establish one common way of describing business processes, understood by both people on the design side and on the development side, on both the business side and the IT side.
Explanation for status: Using a standardized way of describing processes can make it easier to integrate processes between different agencies. BPMN is a well-suited candidate for a common way of describing business processes because of its wide use and open status.
4.4.9.EDIName: Electronic Data Interchange Abbreviation: EDI Version:Owner: XBRL consortium Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.xbrl.org/Home/
Description: EDI is a widely used standard for exchanging electronic information between businesses. It is the predecessor of XML
Explanation for status: The standard is maintained and developed by the international XBRL consortium and is not subject to license restrictions. It is widely used
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 34 / 62
4.5. WS - IName: Web Services Interoperability Abbreviation: WS-I Version:Owner: Web Services Interoperability Organization
Alternatives: Status: Approved
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.ws-i.org/
Description: WS-I is a consortium of vendors, working to promote interoperability between web services. This is done by developing a set of profiles that specify how web services are used (for example WS-I basic profile that provides interoperability guidelines for standards such as SOAP, WSDL and UDDI)
Explanation for status: WS-I has the backing and participation of the key vendors of web services solutions, such as Microsoft, IBM, BEA, SAP and Sun, ensuring that the profiles will be implemented in a wide number of solutions.
4.6. Information and Data Exchange Standards4.6.1.Unicode
Name: Unicode Abbreviation: UNICODE ISO/IEC 10646-1:2000
Version: 5.0
Owner: Unicode Consortium Alternatives: Status: Approved
Usage areas: Character encoding
Link: http://unicode.org/
Description: Unicode is a standard describing how to represent characters in computer systems. It covers nearly all writing systems, including Arabic.
Explanation for status: Unicode is the continuation of the work started on ISO/IEC 8859-1. Unicode includes support for all languages, not just the Latin alphabet
4.6.2.UTF-16Name: Unicode Transformation Format 16 Abbreviation: UTF-16 Version:Owner: Unicode Consortium Alternatives: UTF-8 Status: Approved
Usage areas: Character encoding
Link: http://tools.ietf.org/html/rfc2781
Description: UTF-16 is a subset of Unicode. It uses variable length character encoding and can be used to represent any character in Unicode. UTF-16 is used by Windows and Java
Explanation for status: UTF-16 is widely used and is the native encoding in the Windows operating system
4.6.3.UTF-8Name: Unicode Transformation Format 8 Abbreviation: UTF-8 Version:
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 35 / 62
Owner: Unicode Consortium Alternatives: UTF-16 Status: Approved
Usage areas: Character encoding
Link: http://tools.ietf.org/html/rfc3629
Description: UTF-8 is a subset of Unicode. It uses variable length character encoding and can be used to represent any character in Unicode.
Explanation for status: UTF-8 is a byte-oriented encoding, capable of error-handling if the byte stream is corrupted. UTF-8 is commonly used on the web
4.6.4.RTFName: Rich Text Format Abbreviation: RTF Version: 1.6
Owner: Microsoft Alternatives: .txt, OpenXML, ODF, binary formats
Status: Approved
Usage areas: Office productivity
Link: http://msdn2.microsoft.com/en-us/library/aa140277(office.10).aspx
Description: Proprietary document format, developed by Microsoft. It is cross-platform and is being used on most systems
Explanation for status: The format can be used on many different systems, and is well-suited for exchanging documents. Basic formatting options are possible, but advanced functionality is not available
4.6.5. .txtName: Text format Abbreviation: .txt Version: Owner: - Alternatives: RTF,
OpenXML, ODF, binary formats
Status: Approved
Usage areas: Office productivity
Link: Description: Open format for basic data exchange
Explanation for status: Data in .txt format is basic and unformatted, and can not contain for example formulas from spreadsheets
4.6.6.PDFName: Portable Document Format Abbreviation: PDF Version: Owner: Adobe Alternatives: RTF,
OpenXML, ODF, binary formats, .txt
Status: Approved
Usage areas: Office productivity
Link: http://partners.adobe.com/public/developer/pdf/index_reference.html
Description: The "de facto" standard for printable documents, PDF is a format capable of generating self-contained documents, containing fonts and layout
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 36 / 62
Explanation for status: PDF can be generated and read on all platforms, which makes it a very useful format for sharing documents. A PDF document is not editable; other formats must be used if this is a requirement.
4.6.7.Microsoft Office binary formatsName: Microsoft Office binary formats Abbreviation: - Version: Owner: Microsoft Alternatives: RTF,
OpenXML, ODF, .txtStatus: Approved
Usage areas: Office productivity
Link: Description: The binary formats are used in Microsoft Office, making them the "de facto" standard for the majority of office documents. They include presentation documents (PowerPoint), word processing (Word) and spreadsheet functionality (Excel).
Explanation for status: The binary format specifications are made and owned by Microsoft, and are used everywhere due to the widespread use of Microsoft Office. Other XML-based formats are taking the place of the binary formats as productivity software is upgraded, but a large number of legacy documents will remain in this format and backwards compatibility with this format is important.
4.6.8.ODFName: OpenDocumentFormat Abbreviation: ODF Version: 1.1
Owner: OASIS Alternatives: RTF, OpenXML, PDF, .txt
Status: Approved
Usage areas: Office productivity
Link: http://docs.oasis-open.org/office/v1.1/OS/OpenDocument-v1.1-html/OpenDocument-v1.1.html
Description: OpenDocument format is used in the OpenOffice software package. It has uses similar to Microsoft Office in presentation (Impress), word processing (Writer), spreadsheet functionality (Calc) etc.
Explanation for status: The OpenDocument format is XML-based. It is released under GPL-license terms. This makes it a very interoperable format that is beyond vendor control.
4.6.9.UMLName: Unified Modeling Language Abbreviation: UML Version: 2.0
Owner: OMG Alternatives: Status: Approved
Usage areas: Software modeling, business process modeling
Link: http://www.omg.org/docs/ad/97-08-11.pdf
Description: UML is a standardized language for modeling software artifacts, describing business processes, modeling organizational structures and many other things. It is extensible in different ways, to suit custom purposes.
Explanation for status: UML is widely used in the described areas, and is widely supported in many different kinds of software.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 37 / 62
4.6.10.XMIName: XML Metadata Interchange Abbreviation: XMI Version: 2.1
Owner: OMG Alternatives: Status: Approved
Usage areas: Metadata
Link: http://www.omg.org/technology/documents/formal/xmi.htm
Description: XMI is an XML-based standard that allows developers to exchange UML models and other metadata.
Explanation for status: XMI used other standards, such as UML and MOF to handle metadata, making it an open and easily implementable standard.
4.6.11.UBLName: Universal Business Language Abbreviation: UBL Version: - Owner: OASIS Alternatives: Status: Approved
Usage areas: XML, web services
Link: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ubl
Description: UBL is a standard developed by an OASIS committee, aimed at making exchange of purchase orders and invoices easier and more standardized.
Explanation for status: The standard is developed by OASIS in an open process. It is based on normal XML, making it widely applicable. It is possible to develop a country-specific subset of UBL (done in Denmark) or a region-specific subset (currently being done in Scandinavia and in Spain).
4.6.12.XpathName: XML Path Language Abbreviation: Xpath Version: 2.0
Owner: W3C Alternatives: Status: Approved
Usage areas: XML, web services
Link: http://www.w3.org/TR/xpath
Description: Xpath is an expression language for navigating XML documents, describing a way to locate and process items in the document.
Explanation for status: Xpath makes it easier for developers to navigate XML documents in a standardized way, without knowing the specifics of each XML implementation. It is a W3C recommendation and use of Xpath is increasing.
4.6.13.ISO 11179-5Name: ISO 11179-5 Abbreviation: ISO 11179-5 Version: -Owner: ISO Alternatives: Status: Approved
Usage areas: Metadata, web services
Link: http://metadata-standards.org/11179
Description: ISO 11179-5 is a standard for representing metadata for an organization in a Metadata Registry
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 38 / 62
Explanation for status: Currently the only ISO standard in this area, ISO 11179-5 is the best approach to use when organizing metadata in a common repository. It is used by some American government agencies and is supported by some vendor solutions.
4.6.14.Core Component Technical SpecificationName: Core Component Technical Specification
Abbreviation: CCTS Version: 2.01
Owner: UN/CEFACT Alternatives: Status: Approved
Usage areas: Metadata, web services
Link: http://www.unece.org/cefact/ebxml/CCTS_V2-01_Final.pdf
Description: The CCTS standard is the result of UN/CEFACT’s work to establish a common set of business semantics, meaning a common set of expressions used in business.
Explanation for status: Using CCTS can help systems using different syntaxes (like ebXML and UN/CEFACT) communicate better with each other by bridging some inconsistencies and highlighting others.
4.6.15.DCMIName: Dublin Core Metadata Initiative Abbreviation: DCMI Version: - Owner: DCMI Alternatives: Status: Approved
Usage areas: Metadata
Link: http://dublincore.org/documents/usageguide/
Description: Dublin Core is a collection of metadata definitions, a defined set of metadata that can be used to describe various types of data, such as video, text, sound or images.
Explanation for status: Dublin Core is an open standard that is flexible, expandable and widely accepted.
4.6.16.XNALName: eXtensible Name and Address mark-up Language
Abbreviation: XNAL Version: 2.0
Owner: OASIS Alternatives: Status: Approved
Usage areas: XML, web services, metadata, data standardization
Link: http://www.oasis-open.org/committees/ciq/ciq.html#4
Description: XNAL are two different standards: one for describing names in a standardized way, and one for doing the same with addresses. The standards are XML-based and are built to accommodate a large number of different international ways of handling names and addresses.
Explanation for status: While XNAL is not yet widely used, the use of a standardized address and name format is increasingly seen as an important prerequisite for data exchange. XNAL is the most well-known international standard in this area.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 39 / 62
4.6.17.ISO 639 - Language CodesName: ISO 639 - Language Codes Abbreviation: ISO 639 Version: ISO 639-
3
Owner: ISO Alternatives: Status: Approved
Usage areas: Metadata, data standardization
Link: http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39534&ICS1=1&ICS2=140&ICS3=20
Description: ISO 639 is a standardized way of representing language codes, consisting of three letters from the Latin alphabet (e.g. Arabic is “arb”). ISO 639 can be used to describe dialects as well (“arb” is standard Arabic)
Explanation for status: ISO 639 is used widely in applications and on the web
4.6.18.ISO 4217 - Currency CodesName: ISO 4217 - Currency Codes Abbreviation: ISO 4217 Version:Owner: ISO Alternatives: Status: Approved
Usage areas: Metadata, data standardization
Link: http://www.iso.org/iso/en/prods-services/popstds/currencycodeslist.html
Description: ISO 4217 is an international standard for representing currency codes. It consists of three letters, the first two letters of a countries ISO 3166-1 alpha-2 country code and the letter of the country’s currency (Saudi Arabian Riyals become “SAR”).
Explanation for status: The currency codes are ISO standardized and are widely used. No standardized alternatives exist.
4.6.19.ISO Country CodesName: ISO Country Codes Abbreviation: ISO 3166-1 Version: Alpha-2,
alpha-3
Owner: ISO Alternatives: Status: Approved
Usage areas: Metadata, data standardization
Link: http://www.iso.org/iso/en/prods-services/iso3166ma/index.html
Description: The ISO country codes are used to uniquely identify different countries. The ISO 3166-1 alpha 2 version is a two-letter country code that is used, for example, for internet top-level domains. Alpha 3 is a three-letter code, used in passports, among other places.
Explanation for status: Both the two-letter and the three-letter country codes are widely used, the two-letter version in currency codes, bank SWIFT codes etc., the three-letter version in machine-readable passports etc. This means that most IT-systems already support this way of representing a country.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 40 / 62
4.7. Connectivity Standards4.7.1.S/MIME
Name: Secure/Multipurpose Internet Mail Extensions
Abbreviation: S/MIME Version: 3.0
Owner: IETF Alternatives: Status: Approved
Usage areas: E-mail, connectivity, character encoding
Link: http://www.faqs.org/rfcs/rfc2633.html
Description: MIME is an extension of the basic SMTP e-mail protocol. The extension allows for sending text in languages other than English and file types such as images and sound. S/MIME is the secure version of the MIME standard, using public key encryption to sign e-mails.
Explanation for status: Not all e-mail applications are compatible with S/MIME. Especially web-based e-mail is incompatible, resulting in error messages.
4.7.2.POPName: Post Office Protocol Abbreviation: POP Version: 3Owner: IETF Alternatives: IMAP Status: Approved
Usage areas: E-mail, connectivity
Link: http://tools.ietf.org/html/rfc1939
Description: POP is an application layer internet standard protocol that specifies how e-mail clients retrieve e-mail from servers.
Explanation for status: Using POP downloads e-mails to a local client. If more people or clients access the same mailbox, it is preferable to leave e-mails on the server, using IMAP.
4.7.3. IMAPName: Internet Message Access Protocol Abbreviation: IMAP Version: 4
Owner: IETF Alternatives: POP Status: Approved
Usage areas: E-mail, connectivity
Link: http://tools.ietf.org/html/rfc3501
Description: IMAP is an application layer internet standard protocol that specifies how e-mail clients retrieve e-mail from servers.
Explanation for status: Using IMAP retrieves messages stored on a server, but does not download them. This makes it possible for multiple users or clients to use the same mailbox. Multiple users make IMAP a more complicated protocol to implement than POP3
4.7.4.HTTPName: Hypertext Transfer Protocol Abbreviation: HTTP Version: 1.1
Owner: W3C / IETF Alternatives: Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc2616
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 41 / 62
Description: HTTP is a transport protocol for sending information via the web
Explanation for status: HTTP is used as the basis for the modern internet, and is therefore extremely pervasive. HTTP traffic is allowed to pass through most routers and firewalls, making it a good protocol for making connections that would otherwise be blocked or require specialized setups.
4.7.5.HTTPSName: Hypertext Transfer Protocol secure Abbreviation: HTTPS Version: -Owner: - Alternatives: Status: Approved
Usage areas: Connectivity, web, security, encryption
Link:Description: HTTPS is the method of securing HTTP traffic using SSL or TLS. It works by using a public key certificate on the accessed web server that is recognized by the user’s browser.
Explanation for status: HTTPS is an easy-to-implement way of securing sensitive traffic, like users signing in on a website. It is not flawless however, and the effectiveness of the method relies on the security of the server, as HTTPS only encrypts traffic and does nothing to secure data stored on a server.
4.7.6.LDAPName: Lightweight Directory Access Protocol
Abbreviation: LDAP Version: 3
Owner: IETF Alternatives: Status: Approved
Usage areas: User management
Link: http://tools.ietf.org/html/rfc4510
Description: LDAP is a network protocol for accessing and modifying a directory, for example an employee directory
Explanation for status: LDAP is widely supported, making it a good choice for directory networking. It is standardized through IETF.
4.7.7.DNSName: Domain Name System Abbreviation: DNS Version:
Owner: IETF Alternatives: Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc1035 (and more)
Description: DNS is the system that handles the mapping between IP-addresses and domain names on the internet
Explanation for status: The de-facto (and only) standard for handling the mapping between IP-addresses and domain names, using DNS is essentially unavoidable
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 42 / 62
4.7.8.FTPName: File Transfer Protocol Abbreviation: FTP Version: Owner: IETF Alternatives: HTTP Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc959
Description: FTP is a file transfer protocol, used for uploading and downloading files from a server.
Explanation for status: FTP is an open standard and is supported by most operating systems. It is not an especially secure protocol though, therefore FTPS is recommended for secure purposes
4.7.9.FTPSName: Abbreviation: FTPS Version:Owner: IETF Alternatives: Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc4217
Description: FTPS is the secure version of FTP, using the SSL/TLS layer to ensure security
Explanation for status: FTPS is a fairly easy way to secure FTP using public key certificates
4.7.10.IPName: Internet Protocol Abbreviation: IP Version: 4Owner: Alternatives: Status: Approved
Usage areas: Connectivity, web
Link: http://www.faqs.org/rfcs/rfc791.html
Description: The internet protocol (IP) is the standard used to assign IP-addresses to devices connected to the internet.
Explanation for status: Version 4 of the internet protocol is being replaced by version 6 that has a larger number of addresses. It is recommended that new solutions be specified to support both version 6 and 4, since version 4 is going to be needed for a long time because of legacy solutions.
4.7.11.TCPName: Transmission Control Protocol Abbreviation: TCP Version:
Owner: IETF Alternatives: UDP Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc793
Description: TCP is the layer between IP and an application. It controls how connections are made. It adds a layer of reliability to a connection, making sure that all packets arrive. This is important for loading web pages for example and web browsers use TCP for fetching web pages.
Explanation for status: TCP is not suited for streaming applications, since a lost packet has to be re-sent before the following packets can be transmitted. For streaming applications like VoIP, UDP is better suited.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 43 / 62
4.7.12.UDPName: User Datagram Protocol Abbreviation: UDP Version:Owner: IETF Alternatives: TCP Status: Approved
Usage areas: Connectivity, web
Link: http://tools.ietf.org/html/rfc768
Description: UDP is a transport layer, like TCP. It is not as reliable, but more lightweight and more fault tolerant, making it suitable for streaming applications
Explanation for status: If reliability and correct ordering of data packages is an important requirement, TCP might be the better choice.
4.7.13.IEEE 802.11Name: - Abbreviation: IEEE 802.11 Version: gOwner: IEEE Alternatives: IEEE 802.11g /
IEEE 802.11nStatus: Approved
Usage areas: Networking, connectivity, web
Link: http://standards.ieee.org/getieee802/802.11.html
Description: IEEE 802.11g is a networking protocol, used for establishing a wireless network between a computer and a router. It has a theoretical maximum speed of 54 mbps.
Explanation for status: IEEE 802.11g is currently the most-used standard for wireless networking. Its predecessor 802.11b is being phased out. Eventually 802.11g will be replaced with 802.11n, with a theoretical maximum speed of over 100 mbps. Compatibility with this standard would be a good thing to take into consideration when choosing routers and other networking hardware.
4.7.14.SMTPName: Simple Mail Transfer Protocol Abbreviation: SMTP Version: Owner: IETF Alternatives: Status: Approved
Usage areas: Networking, connectivity, web, e-mail
Link: http://tools.ietf.org/html/rfc821
Description: SMTP is a text-based protocol for exchanging mail messages
Explanation for status: SMTP is the commonly used standard for transmitting e-mail over the internet. A wide range of software supports it.
4.7.15.VPNName: Virtual Private Network Abbreviation: VPN Version: Owner: IETF Alternatives: Status: Approved
Usage areas: Networking, connectivity, web
Link: http://tools.ietf.org/html/rfc2764
Description: VPN is a way of using the open Internet to establish a connection to a private network. This allows a person to access the intranet of a company from the outside for example.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 44 / 62
Explanation for status: VPN is not standardized through an official standardization organization, but is widely used and I supported by many different tools and many different kinds of software
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 45 / 62
4.8. Security Standards4.8.1.PKCS #7 (RFC 2315)
Name: Public Key Cryptography Standards Abbreviation: PKCS #7 Version: 1.5
Owner: RSA Security Alternatives: Status: Approved
Usage areas: Security, encryption
Link: http://www.rsasecurity.com/rsalabs/node.asp?id=2124
Description: One of several cryptography standards in PKCS, PKCS #7 is used to encrypt messages under a PKI.
Explanation for status: The PKC standards are not, despite the name, standardized through a standardization body, but are owned by the company RSA.
4.8.2. IpSecName: IP security Abbreviation: Ipsec Version: Owner: IETF Alternatives: TLS Status: Approved
Usage areas: Security, encryption, connectivity
Link: http://tools.ietf.org/html/rfc4301
Description: IPsec provides a way to encrypt or authenticate IP packets in a data stream
Explanation for status: The use of IPsec is optional in IP version 4, but is mandatory in IP version 6. This must be taken into consideration when choosing IP standards. For transversing NATs and firewalls, IPsec might not be the best choice. TLS should be considered instead.
4.8.3.SSLName: Secure Sockets Layer Abbreviation: SSL Version: 3.0
Owner: IETF Alternatives: TLS Status: Approved
Usage areas: Security, encryption, connectivity
Link: http://wp.netscape.com/eng/ssl3/
Description: SSL is the predecessor of TLS. It is a cryptographic protocol. An industry standard for encrypting TCP traffic. SSL is commonly used to encrypt HTTP data before it is delivered over TCP.
Explanation for status: SSL is widely supported, but has been super-seeded by TLS version 1.0.
4.8.4.TLSName: Transport Layer Security Abbreviation: TLS Version: 1.1
Owner: IETF Alternatives: XML Encryption
Status: Approved
Usage areas: Security, encryption, connectivity
Link: http://tools.ietf.org/html/rfc4346
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 46 / 62
Description: TLS is a cryptographic protocol, securing applications using HTTP, FTP etc. when communicating over IP (e.g. HTTPS)
Explanation for status: TLS is best suited for establishing connections between two parties (for example client/server). For web services, that require multiple connections, XML encryption should be considered.
4.8.5.TDESName: Triple Data Encryption Standard Abbreviation: TDES Version: -Owner: - Alternatives: AES Status: Approved
Usage areas: Security, encryption
Link: -Description: TDES is a non-standard implementation of the DES encryption, using the DES algorithm with three keys.
Explanation for status: TDES is practically secure, since the effort to break the encryption requires substantial resources. It is still widely used and will probably remain in use for a while, even though it is inferior to AES performance-wise.
4.8.6.AESName: Advanced Encryption Standard Abbreviation: AES Version: Owner: National Institute of Science and Technology
Alternatives: Status: Approved
Usage areas: Security, encryption
Link: Security, encryption
Description: AES is the successor of the DES encryption algorithm
Explanation for status: AES is the current encryption standard in the US public sector, making it widely used. No successful attacks on the AES encryption currently exist.
4.8.7.RSAName: RSA Abbreviation: RSA Version: Owner: RSA Laboratories Alternatives: Status: Approved
Usage areas: Security, encryption
Link: http://www.rsa.com/rsalabs/node.asp?id=2125
Description: RSA is an encryption algorithm, used for public-key encryption.
Explanation for status: RSA is currently believed to be secure, due to the infeasibility of breaking the encryption. It is not however impossible that RSA can be broken in the future.
4.8.8.SAMLName: Security Assertion Markup Language Abbreviation: SAML Version: 2.0
Owner: OASIS Alternatives: Status: Approved
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 47 / 62
Usage areas: Security, user management
Link: http://www.oasis-open.org/committees/download.php/22553/sstc-saml-tech-overview-2%200-draft-13.pdf
Description: SAML is an XML-based standard for exchanging information on authentication and authorization
Explanation for status: SAML is an open standard, and part of OASIS. It is a widely used standard for identity management.
4.8.9.WPAName: Wi-fi protected access Abbreviation: WPA Version: 2Owner: Wi-fi Alliance Alternatives: Status: Approved
Usage areas: Security, encryption, connectivity, networking
Link: http://www.wi-fi.org/knowledge_center/wpa/
Description: WPA is the successor of the WEP wireless encryption standard. WPA is used to encrypt data sent over a wireless connection.
Explanation for status: WPA version 2 implements IEEE 802.11i, a standard specifying security for wireless networks. WPA2 is widely used and most modern wireless networking equipment supports it.
4.8.10.WS-securityName: Web Services Security Abbreviation: WS-Security Version: 1.1
Owner: OASIS Alternatives: Status: Approved
Usage areas: Security, networking, building web applications
Link: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss
Description: WS-security is a communications protocol, describing how to implement security when using web services Explanation for status: WS-security describes enhancements to the SOAP protocol, a standardized way of using open standards to implement web services security, such as SAML and TLS. Using WS-security can ensure interoperability with other solutions using the same specifications
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 48 / 62
5. Other standards5.1. Candidate Standards5.1.1.Pending YIC Approval
These standards are in use as international standards. Their use in the Kingdom of Saudi Arabia requires some discussion before adoption regarding the practicality of setting these as standards that shall be complied with.
5.1.2.XBRLName: Extensible Business Reporting Language
Abbreviation: XBRL Version:
Owner: XBRL consortium Alternatives: Status: Candidate
Usage areas: Building web applications, establishing a service-oriented architecture, XML
Link: http://www.xbrl.org/Home/
Description: XBRL is an XML-based standard for describing and exchanging financial and business information.
Explanation for status: The standard is maintained and developed by the international XBRL consortium and is not subject to license restrictions. It is widely used
5.1.3.XHTML Mobile Profile
Name: XHTML Mobile Profile Abbreviation: - Version: 1.1
Owner: W3C Alternatives: XHTML Status: Candidate
Usage areas: Publishing mobile web content
Link: http://www.w3.org/TR/xhtml11/
Description: XHTML Mobile Profile is used to present XHTML on devices with limited bandwidth and screen resolution
Explanation for status:XHTML MP is useful for delivering content to mobile devices, but due to increasing bandwidth and processing power of mobile devices, it might not be necessary. Normal XHTML or HTML might be useable instead.
5.1.4.MPLSName: MultiProtocol Label Switching Abbreviation: MPLS Version: Owner: IETF Alternatives: Status: Candidate
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 49 / 62
Usage areas: Networking, connectivity, web
Link: http://tools.ietf.org/html/rfc3031
Description: MPLS is a way of routing data packages from the network in a more efficient way than normal. The increased efficiency is achieved by adding labels to the packets, making it easier to route the through the network.
Explanation for status: MPLS is an open standard and can be used by anyone without licensing costs. It has advantages in multiple areas compared to similar standards like frame relay and ATM and is therefore becoming the preferred standard in this area.
5.1.5.Saudi Post National Address ProfileName: Saudi Post National Address Profile Abbreviation: SP NAF Version:Owner: Saudi Post Alternatives: Status: Candidate
Usage areas: -Link: -Description: The way of representing an address, as specified by Saudi Post
Explanation for status: Saudi Post is the governing body on address in Saudi Arabia, this way of representing an address can be used as the national address standard.
5.1.6.XML EncryptionName: XML Encryption Abbreviation: - Version: Owner: W3C Alternatives: XML
signatureStatus: Candidate
Usage areas: Security, encryption, xml
Link: http://www.w3.org/TR/xmlenc-core/
Description: XML encryption is a W3C specification on how to encrypt XML data. W3C recommends that XML encryption and XML not be used at the same time, as that might make it easier to perform guessing attacks. Explanation for status: XML encryption is useful in web services, where the interaction is between multiple parties and not just client/server. It is also useful because it has the ability to encrypt only part of a message, something SSL/TLS cannot do. W3C recommends that XML encryption and XML signature not be used at the same time, as it might make it easier to perform guessing attacks.
5.1.7.XML SignatureName: XML signature Abbreviation: Version: Owner: W3C Alternatives: XML
encryptionStatus: Candidate
Usage areas: Security, encryption, xml
Link: http://www.w3.org/TR/xmldsig-core/
Description: XML is the W3C standard for digital signatures in XML format
Explanation for status: W3C recommends that XML encryption and XML signature not be used at the same time, as it might make it easier to perform guessing attacks.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 50 / 62
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 51 / 62
5.2. Emerging StandardsStandards and/or protocols coming through either the standardization process or are market driven and that bear watching by the YEFI team
5.2.1.Office Open XMLName: Office Open XML Abbreviation: OOXML Version:Owner: Microsoft Alternatives: RTF, ODF,
PDF, .txt, binary formatsStatus: Emerging
Usage areas: Office productivity
Link:Description: Office Open XML is the format used in the new version of Microsoft 2007, Office 2007. It is XML-based.
Explanation for status: Under pressure from the competition from OpenOffice, Microsoft has decided to have the formats in Office 07 standardized through the standardization body ECMA. Despite this, it is still uncertain if Microsoft really has relinquished control of the format or if it is still able to make its own proprietary extensions to the formats. Compared to the ODF specification, OOXML is very complicated, weighing in a more than 6000 pages, making it difficult for non-Microsoft developers to use. OOXML is currently being evaluated by ISO as a standard. Its status will be decided later in 2007.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 52 / 62
5.3. Deprecated standardsThe following standards should no longer be used:
5.3.1.WML
Name: Wireless Markup Language Abbreviation: WML Version: 1.3
Owner: - Alternatives: XHTML Status: Deprecated
Usage areas: Publishing mobile web content
Link: -Description: WML is a markup language, designed to deliver content to devices that use WAP
Explanation for status: Due to increases in bandwidth and processing power of mobile devices, WML (and WAP) is being phased out, giving way to XHTML and HTML
5.3.2.EPS
Name: Encapsulated PostScript Abbreviation: EPS Version: -Owner: - Alternatives: PDF Status:
Deprecated
Usage areas: Graphics
Link: http://partners.adobe.com/public/developer/tiff/index.html
Description: EPS is a way to encapsulate PostScript data, to make it readable as an image format. The format is not platform-independent, but has different implementations for Mac and PC (EPSF and EPSI).
Explanation for status: EPS is not recommended, due to its platform dependent specifications. Alternatives should be used where available
5.3.3. ISO/IEC 8859-1:1998Name: - Abbreviation: ISO/IEC
8859-1:1998Version:
Owner: - Alternatives: Unicode Status: Deprecated
Usage areas: Character encoding
Link:Description: The standard way to encode characters in the Latin alphabet
Explanation for status: This encoding is no longer under active development and has been replaced by Unicode encoding.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 53 / 62
5.3.4.ASCIIName: American Standard Code for Information Interchange
Abbreviation: ASCII Version:
Owner: Unicode Consortium Alternatives: UTF-16 and UTF-8
Status: Deprecated
Usage areas: Character encoding
Link: http://www.unicode.org/charts/PDF/U0000.pdf
Description: ASCII is the original encoding for encoding content in English.
Explanation for status: ASCII has not been updated since 1986, and has been replaced by Unicode and UTF-8.
5.3.5.WAPName: Wireless Application Protocol Abbreviation: WAP Version: 2.0
Owner: Alternatives: XHTML Mobile profile
Status: Deprecated
Usage areas: Publishing mobile web content
Link:Description: WAP is a standard for web access for wireless devices. It is designed to present content in a way that fits the limited screen resolution and bandwidth of wireless/portable devices.Explanation for status: The WAP protocol has never been especially successful, but is offered by a number of content providers. New solutions are expected to be in other formats, due to an increase of resolution and bandwidth in wireless/portable devices.
5.3.6.DESName: Data Encryption Standard Abbreviation: DES Version: Owner: National Institute of Science and Technology
Alternatives: AES Status: Deprecated
Usage areas: Security, encryption
Link: http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Description: DES is an encryption algorithm, used to encrypt data. It was widely used in the 1970's and 1980's before being deemed insecure.
Explanation for status: The DES encryption has been broken and is not recommended. Alternatives include the AES cipher.
5.3.7.RSS
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 54 / 62
Name: Really Simple Syndication / Rich Site Summary
Abbreviation: RSS Version: 1.0/2.0
Owner: - Alternatives: Atom Status: Deprecated
Usage areas: Content publishing
Link: Description: RSS is an XML-based format, used publish and syndicate web content. It is developed in two different branches (1.x and 2.x).
Explanation for status: The different branches of development of the RSS standard and the fact that a standards body does not undertake the development should be taken into consideration when choosing RSS. Version 2.0 had diverged from being an update of Version 1.0 causing some interoperability issues for systems. It is recommended that the Atom standard is used instead.
5.3.8.DTD
Name: Document Type Definition Abbreviation: DTD Version: 1.0/2.0
Owner: W3C Alternatives: XSD Status: Deprecated
Usage areas: XML
Link: http://www.w3.org/TR/REC-xml/#dt-doctype
Description: DTD is used to describe an XML schema via a set of declaration that conforms to particular markup syntax.
Explanation for status: DTD faced many criticisms such as using none XML syntax and no support for newer XML features (i.e. Namespaces).
5.3.9.MPEG-1
Name: MPEG-1 Abbreviation: MPEG-1 Version: -
Owner: ISO/IEC Alternatives: MPEG-4 Status: Deprecated
Usage areas: Audio/Video
Link: http://www.chiariglione.org/mpeg/standards/mpeg-1/mpeg-1.htm
Description: Mpeg-1 is a set of audio/video compression standards. MPEG-1 video part is used by the Video CD (VCD format) and less commonly by DVD-Video format. MPEG-1 Audio layer 3 is the popular MP3 audio format.
Explanation for status: MPEG-1 has been outdated by much advanced standards such as MPEG-2 and MPEG-4.
5.3.10.AVI
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 55 / 62
Name: Audio Video Interleave Abbreviation: AVI Version: -
Owner: Microsoft Alternatives: MP4 Status: Deprecated
Usage areas: Audio/Video
Link: http://msdn2.microsoft.com/en-us/library/ms779631.aspx
Description: AVI stands for Audio Video Interleave and is a container file format for audio and video content. While it does not define how the audio and video information itself is encoded, it defines how the video and the audio are saved next to each other.
Explanation for status: AVI is considered by some to be an outdated container format. There is significant overhead when used with popular MPEG-4 codecs (Xvid and DivX, for example), increasing file size more than necessary.
5.3.11.Quicktime
Name: Quicktime Abbreviation: MOV Version: -
Owner: Apple Alternatives: MP4 Status: Deprecated
Usage areas: Audio/Video
Link: http://developer.apple.com/documentation/QuickTime/QTFF/index.html
Description: QuickTime (.mov) file format functions as a multimedia container file capable of handling various formats of digital video, media clips, sound, text, animation, music, and several types of interactive panoramic images.
Explanation for status: Quicktime is Apple’s proprietary format
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 56 / 62
6. Choosing StandardsThis section is provided as a discussion reader about the various standards setting bodies apparent in the ICT environment.
6.1. International Standards BodiesThere are a number of reasons for proliferation of standards setting bodies or organizations for ICT; the main reason though has been the dissatisfaction by many vendors with slow, bureaucratic processes. The ICT environment is by nature, a fast moving environment with new protocols and products reaching the market each month. In comparison, developing international standards through a Standards Development Organization (e.g. ISO) often takes a 3-6 year timeframe.
During the 1990s, ISO gained a reputation for being slow, bureaucratic, congested, and insensitive to feedback from both vendors and their customers. Attention then turned to the volunteer-based, open-process and non-profit Internet Engineering Task Force (IETF), which develops a number of the standards necessary for the Internet to function. When IETF also appeared too slow for some vendors, they began funding more focused, agile consortia like the W3C and OASIS.
This gap between market driven need and the bureaucratic standards development process is a main reason for the emergence and differentiation of the new Standard Setting Organizations (SSO).
There are now five (5) main groupings of ICT SSO’s: 1) trade associations, 2) Standards Developing Organizations (SDOs), 3) consortia, 4) alliances, and 5) the Open Source software movement.
From a big picture perspective, the main players today for setting standards for ICT (and particularly web services) are:
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
Institute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) Organization for the Advancement of Structured Information Systems (OASIS) World Wide Web Consortium (W3C) Open Geospatial Consortium (OGC) Open Liberty Alliance Ecma International
A good background paper on the history of the emerging complexity of the Standards Setting Organizations environment can be found at: http://www.ftc.gov/opp/intellect/020418cargill.pdf(Carl Cargill, Sun Microsystems, 27 March 2002). NOTE: the purpose of this paper is to explore the ICT standards environment in terms of intellectual property rights. It does not describe the emergence of each separate SSO.
The table on the following page provides a brief synopsis for each of the main standards setting bodies and shows where each body focuses their attention:
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 57 / 62
SSO Year Focus Mission
International Organization for Standardization (ISO)
1947 International Trade
To be the leading value adding platform and partner for the production of global and market relevant International Standards covering products, services, good conformity assessment, management and organizational practices
International Electro technical Commission (IEC)
1906 International Trade
To be recognized as the leader in the development of globally accepted standards for products and services in the fields of electricity, electronics and associated technologies that are market relevant and in the best interests of the industry and the users of its products and services.
Institute of Electrical and Electronics Engineers (IEEE)
1963 Engineering The IEEE promotes the engineering process of creating, developing, integrating, sharing, and applying knowledge about electro and information technologies and sciences for the benefit of humanity and the profession.
Internet Engineering Task Force (IETF) 1986 Internet connectivity
To produce high quality, relevant technical and engineering documents that influence the way people design, use, and manage the Internet in such a way as to make the Internet work better.
Organization for the Advancement of Structured Information Systems (OASIS)
1993 E-business
E-commerce
To drive the development, convergence, and adoption of e-business standards.
World Wide Web Consortium (W3C) 1994 Internet To lead the World Wide Web to its full potential by developing protocols and guidelines that ensures long-term growth for the Web.
Open Geospatial Consortium (OGC) 1994 Geospatial and Location
To serve as a global forum for the collaboration of developers and users of spatial data products and services, and to advance the development of international standards for geospatial interoperability.
Ecma International
ECMA (1961)
1994 Software Languages
To develop, in co-operation with the appropriate National, European and International organizations Standards and Technical Reports in order to facilitate and standardize the use of Information Communication Technology (ICT) and Consumer Electronics (CE).
Open Liberty Alliance 2001 Federated Identity
The Liberty Alliance is committed to creating technical standards that solve
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 58 / 62
Management global identity management needs and can be easily implemented by the widest possible audience.
Table 15: SSO list
6.2. Standards per International bodyThe following tables provide a listing of 161 standards from 4 of the main SSO’s. This information is provided purely to show the richness of the standards environment – noting that this is the first version of the KSA Interoperability Framework (YEFI) and it only draws on a small subset of the following standards AT THIS POINT IN TIME.
OpenGIS® Specifications Ecma International standards1 Catalogue Service 1 C# Language Specification2 Coordinate Transformation 2 C++/CLI Language Specification 3 Filter Encoding 3 Common Language Infrastructure (CLI)4 Geographic Objects 4 ECMAScript Language Specification5 Geography Markup Language 5 Eiffel: Analysis, design and programming Language 6 GML in JPEG 2000 6 Environmental design considerations for electronic
products7 Grid Coverage Service 7 Universal 3D File Format8 Location Services (OpenLS) 8 Microsoft Office Open XML 9 Simple Feature Access 1 10 Simple Feature Access 2 11 Simple Features CORBA 12 Simple Features OLE/COM 13 Styled Layer Descriptor 14 Symbology Encoding 15 Web Coverage Service 16 Web Feature Service 17 Web Map Context 18 Web Map Service 19 Web Service Common
Table 16: OpenGIS & Ecma standards
W3C Standards OASIS Standards
1 Architecture of the World Wide Web, Volume One 1 Directory Services Markup Language (DSML) v2.0 2 Associating Style Sheets with XML documents 2 DocBook v4.1 3 Authoring Tool Accessibility Guidelines 1.0 3 DocBook v4.5 4 Canonical XML Version 1.0 4 ebXML Business Process Specification Schema
Technical Specification v2.0.4 5 Cascading Style Sheets (CSS1) Level 1 Specification 5 ebXML Collaborative Partner Profile Agreement
(CPPA) v2 6 Cascading Style Sheets, level 2 (CSS2) Specification 6 ebXML Message Service Specification v2.0 7 Character Model for the World Wide Web 1.0:
Fundamentals7 ebXML Registry Information Model (RIM) v2.0
8 Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0
8 ebXML Registry Information Model (RIM) v3.0
9 Decryption Transform for XML Signature 9 ebXML Registry Services Specification (RS) v2.0 10 Document Object Model (DOM) Level 1 1
0ebXML Registry Services Specification (RS) v3.0
11 Document Object Model (DOM) Level 2 Core 1 Extensible Access Control Markup Language
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 59 / 62
Specification 1 (XACML) v1.0 12 Document Object Model (DOM) Level 2 Events
Specification12
eXtensible Access Control Markup Language (XACML) v2.0
13 Document Object Model (DOM) Level 2 HTML Specification
13
OpenDocument Format for Office Applications (OpenDocument) v1.0
14 Document Object Model (DOM) Level 2 Style Specification
14
OpenDocument Format for Office Applications (OpenDocument) v1.1
15 Document Object Model (DOM) Level 2 Traversal and Range Specification
15
Reference Model for Service Oriented Architecture v1.0
16 Document Object Model (DOM) Level 2 Views Specification
16
Security Assertion Markup Language (SAML) v1.0
17 Document Object Model (DOM) Level 3 Core Specification
17
Security Assertion Markup Language (SAML) v1.1
18 Document Object Model (DOM) Level 3 Load and Save Specification
18
Security Assertion Markup Language (SAML) V2.0
19 Document Object Model (DOM) Level 3 Validation Specification
19
Universal Business Language (UBL) v1.0
20 Exclusive XML Canonicalization Version 1.0 20
Universal Business Language (UBL) v2.0
21 Extensible Markup Language (XML) 1.0 (Fourth Edition)
21
Universal Business Language Naming & Design Rules (UBL NDR) v1.0
22 Extensible Markup Language (XML) 1.1 (Second Edition)
22
Universal Description, Discovery and Integration (UDDI) v2.0
23 Extensible Stylesheet Language (XSL) Version 1.0 23
Universal Description, Discovery and Integration (UDDI) v3.0.2
24 Extensible Stylesheet Language (XSL) Version 1.1 24
Web Services for Remote Portlets (WSRP) v1.0
25 HTML 3.2 Reference Specification 25
Web Services Security SAML Token Profile v 1.0 and REL Token Profile v1.0
26 HTML 4.01 Specification 26
Web Services Security v1.0 (WS-Security 2004)
27 Internationalization Tag Set (ITS) Version 1.0 27
Web Services Security v1.1
28 Mathematical Markup Language (MathML) 1.01 Specification
28
WS-Reliability (WS-R) v1.1
29 Mathematical Markup Language (MathML) Version 2.0 (Second Edition)
29
WS-Trust v1.3
Table 17: W3C & OASIS standards
W3C Standards
30 Mobile SVG Profiles: SVG Tiny and SVG Basic 31 Namespaces in XML 1.0 (Second Edition)32 Namespaces in XML 1.1 (Second Edition)33 OWL Web Ontology Language Guide34 OWL Web Ontology Language Overview35 OWL Web Ontology Language Reference36 OWL Web Ontology Language Semantics and Abstract Syntax37 OWL Web Ontology Language Test Cases38 OWL Web Ontology Language Use Cases and Requirements39 PICS 1.1 Label Distribution -- Label Syntax and Communication Protocols
40 PICS 1.1 Rating Services and Rating Systems -- and Their Machine Readable Descriptions
41 PICS Signed Labels (DSig) 1.0 Specification42 PICSRules 1.1 Specification43 Portable Network Graphics (PNG) Specification (Second Edition)44 QA Framework: Specification Guidelines45 RDF Primer46 RDF Semantics
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 60 / 62
47 RDF Test Cases48 RDF Vocabulary Description Language 1.0: RDF Schema49 RDF/XML Syntax Specification (Revised)50 Resource Description Framework (RDF): Concepts and Abstract Syntax51 Resource Representation SOAP Header Block52 Ruby Annotation53 Scalable Vector Graphics (SVG) 1.1 Specification54 Semantic Interpretation for Speech Recognition (SISR) Version 1.055 SMIL Animation56 SOAP Message Transmission Optimization Mechanism
W3C Standards
57 SOAP Version 1.2 Part 0: Primer (Second Edition)58 SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)59 SOAP Version 1.2 Part 2: Adjuncts (Second Edition)60 SOAP Version 1.2 Specification Assertions and Test Collection (Second
Edition)61 Speech Recognition Grammar Specification Version 1.062 Speech Synthesis Markup Language (SSML) Version 1.063 Synchronized Multimedia Integration Language (SMIL 2.1)64 Synchronized Multimedia Integration Language (SMIL) 1.0 Specification65 The Platform for Privacy Preferences 1.0 (P3P1.0) Specification66 User Agent Accessibility Guidelines 1.067 Voice Extensible Markup Language (VoiceXML) Version 2.068 Web Content Accessibility Guidelines 1.069 Web Services Addressing 1.0 - Core70 Web Services Addressing 1.0 - SOAP Binding71 WebCGM 1.0 Second Release72 WebCGM 2.073 XForms 1.0 (Second Edition)74 XHTML-Print75 XHTML™ 1.0 The Extensible HyperText Markup Language (Second Edition)
76 XHTML™ 1.1 - Module-based XHTML77 XHTML™ Basic78 XML Base79 XML Encryption Syntax and Processing80 XML Events81 XML Inclusions (XInclude) Version 1.0 (Second Edition)82 XML Information Set (Second Edition)83 XML Key Management Specification (XKMS 2.0)84 XML Key Management Specification (XKMS 2.0) Bindings85 XML Linking Language (XLink) Version 1.086 XML Path Language (XPath) 2.087 XML Path Language (XPath) Version 1.088 XML Schema Part 0: Primer Second Edition89 XML Schema Part 1: Structures Second Edition90 XML Schema Part 2: Datatypes Second Edition91 XML Syntax for XQuery 1.0 (XQueryX)92 xml:id Version 1.093 XML-binary Optimized Packaging94 XML-Signature Syntax and Processing95 XML-Signature XPath Filter 2.096 XPointer element() Scheme97 XPointer Framework98 XPointer xmlns() Scheme99 XQuery 1.0 and XPath 2.0 Data Model (XDM)
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 61 / 62
100 XQuery 1.0 and XPath 2.0 Formal Semantics101 XQuery 1.0 and XPath 2.0 Functions and Operators102 XQuery 1.0: An XML Query Language103 XSL Transformations (XSLT) Version 1.0104 XSL Transformations (XSLT) Version 2.0105 XSLT 2.0 and XQuery 1.0 Serialization
Table 18: W3C standards
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)
e-Government Program (Yesser)
Version 1.1 - Page 62 / 62
7. Acknowledgements
7.1. Copyright Notices
The YEFI team acknowledges the current document is based on the work published through a number of leading international efforts. In particular, the YEFI has drawn on material from the following documents and acknowledges the rights of these publishers:
United Kingdom Interoperability Framework
United Kingdom GovTalk
New Zealand e-Government Interoperability Framework
Danish Interoperability Framework
Western Australia E-government Interoperability Framework
Ireland REACH Program
Malaysian e-Government Initiative
In the interests of international cooperation, the Kingdom of Saudi Arabia allows all parties to use the materials in this document so long as reference is acknowledged and published.
Version 1.1 Confidential e-Government Program (YESSER)
This document (either in whole or in part) cannot be modified or reproduced without the prior written permission of the e-Government Program (YESSER)