information over public network. There are five
security criteria that must be satisfied in such
communication: trust, authenticity, non-repudiation,
integrity and confidentiality. Solution exists in the
form of public key infrastructure (PKI) where
certificate authority guarantees binding of user
identities with public keys, thus solving the biggest
problem of public key cryptography - proving that a
public key is authentic, and has not been tampered
with or replaced by a malicious third party.
Although technical aspects are relatively clear,
there are problems in implementation and
deployment of such systems, mostly related to the
distribution of keys, and especially their revocation:
privilege of key revocation, distribution of a new
key, spreading the revocation and recovery of a
leaked key.
Another issue is cross-border interoperability and
standardization. Internet is becoming global
marketplace, and EU started efforts at
standardization in 1999, when European
Commission in its Directive 1999/93/EC adopted
legislation regarding advanced electronic signature.
Of importance for digitally signing e-Invoice is also
Directive 2001/115/EC and provisions of this law
have been transferred to new EU VAT Directive
2006/112/EC.
In 2005, Croatia’s government adopted
legislation concerning electronic signature (Narodne
novine, 2002) and electronic document (Narodne
novine, 2005) that are in compliance with EU
legislation. FINA (Financial Agency) was given
central role as national certificate authority and since
then some 10.000 digital certificates were issued.
Croatia’s banks, mostly in foreign ownership,
didn’t wait for government legislation, and started
development of e-Banking on their own. With more
than 80.000 certificates issued so far banks are at the
forefront of e-Business development in Croatia.
Unfortunately, although these certificates certainly
satisfy technical requirements for secure message
transport, they weren’t issued in formal accordance
to the law and use of these certificates within e-
Invoice infrastructure would require legislative
changes.
Although there are issues that need further
addressing, mainly in regard with cross-border (i.e.
EU) interoperability of national PKI infrastructures,
current development in the area of electronic
security is sufficiently advanced for the purposes of
e-Invoice.
Be advised that papers in a technically unsuitable
form will be returned for retyping. After returned the
manuscript must be appropriately modified.
4 INTEROPERABILITY
FRAMEWORK
Interoperability framework (IF) is a crucial
component for deployment of e-Business
infrastructure and all its aspects, including e-Invoice.
IF can be described as a set of policies, technical
standards and guidelines which enable solving
interoperability issues between different IT systems.
Some interoperability issues arise from the
differences in the meaning of terms and modes of
operations and some are related to the fact that
different informational systems cannot share
information easily. Within interoperability
framework communication is done using a
predetermined framework based on open
international standards. As Croatia is a country
where most companies are small and medium in size
and EDI infrastructure is not so widely used, legacy
considerations can be put aside.
Interoperability can be analyzed and
implemented on three main layers: technical,
semantic and process layer. Technical layer of
interoperability encapsulates standards and norms
for binding different systems and it forms a basis for
enabling communication between them. It also
specifies the envelope to package the content of
business document with necessary headers as well as
security and transportation standards.
Semantic level of interoperability deals with the
meaning of data and ensures that data will be
interpreted the same at both communication ends.
Semantic layer also defines structures and elements
of the business documents as well as the meanings
of the terms used in these documents.
On the process layer, main concern is
reconciliation of business processes. This layer
defines roles of business partners, order of business
documents exchange and how to respond to
information in business documents with appropriate
actions within defined business process. To take
advantage of new technology business processes
should be reexamined and reengineered and this
issue goes to the heart of e-Business infrastructure.
Today, there are several competing standards on
each layer and following sections give overview of
different standards considered as candidates for
deployment of e-Invoice infrastructure in Croatia.
There are several XML frameworks that handle
interoperability issues on different levels of
interoperability, with twelve of them listed and
compared in (Nurmilaakso, 2006).
On technical layer our candidates are:
ICSOFT 2008 - International Conference on Software and Data Technologies
350