Joint Intel & Mashery Webinar: Intel Expressway API Manager Revealed | BrightTALK:
'via Blog this'
Thursday, November 29, 2012
Wednesday, August 22, 2012
Saturday, August 18, 2012
Friday, August 10, 2012
Tuesday, August 07, 2012
Thursday, August 02, 2012
Tuesday, July 24, 2012
Oracle Identity Management 11g R2 Webcast
"Oracle and customer executives for the launch of Oracle Identity Management 11g R2, the breakthrough technology that dramatically expands the reach of identity management to cloud and mobile environments."
http://event.on24.com/eventRegistration/EventLobbyServlet?target=lobby.jsp&eventid=487244&sessionid=1&partnerref=prod_sec_idm07192012&key=15939C327CC5E3015C68183480BCD48A&eventuserid=66391770#
'via Blog this'
http://event.on24.com/eventRegistration/EventLobbyServlet?target=lobby.jsp&eventid=487244&sessionid=1&partnerref=prod_sec_idm07192012&key=15939C327CC5E3015C68183480BCD48A&eventuserid=66391770#
'via Blog this'
API Economy Update by Craig Burton on Prezi
Craig Burton at the top of his game, from the Cloud Identity Summit.
API Economy Update by Craig Burton on Prezi:
'via Blog this'
API Economy Update by Craig Burton on Prezi:
'via Blog this'
Monday, July 02, 2012
Thursday, June 21, 2012
Saturday, June 09, 2012
Wednesday, June 06, 2012
Friday, June 01, 2012
OTP by clavid
clavid - one key, all access
TP (One Time Password)
One Time Password (OTP) systems are used to enhance the protection of access to systems. OTP’s are usually applied in addition to a password known by a user.
TP (One Time Password)
One Time Password (OTP) systems are used to enhance the protection of access to systems. OTP’s are usually applied in addition to a password known by a user.
Saturday, May 26, 2012
Tuesday, May 22, 2012
Monday, May 21, 2012
Saturday, May 19, 2012
Friday, May 11, 2012
Thursday, May 10, 2012
Open-source cloud frameworks: A work in progress - Computerworld
Open-source cloud frameworks: A work in progress - Computerworld:
'via Blog this'
Nimble and fast, open-source frameworks can simplify application deployment in the cloud. But they're not for everyone.
'via Blog this'
NFCNews | NIST tackling PIV, mobile ID
NFCNews | NIST tackling PIV, mobile ID: "Enhanced PIV
The other two options seem to be more realistic but would require policy and technology changes. The phone could be used as a credential if the contactless interface of the PIV was fully enabled, MacGregor says. The first FIPS 201 version limited the amount of information that was available from the contactless portion of the card.
Near field communication devices could then read the PIV and authenticate to networks, sign and read email, and complete other tasks. To do this the process for creating a secure channel between the mobile and the credential would have to be created. “It’s easy to do technically but hard for the key management,” he says.
Since any NFC device would be able to read any PIV there would have to be a secure key placed on the mobile to make sure the credential is only being read by the properly authorized device. It would be a way to authorize the device to the credential.
Secure keys would have to be issued to the mobile devices, MacGregor says. This could be as simple as a pairing PIN that could be entered into the mobile to authorize pairing. “This doesn’t require too much more functionality,” he adds."
'via Blog this'
The other two options seem to be more realistic but would require policy and technology changes. The phone could be used as a credential if the contactless interface of the PIV was fully enabled, MacGregor says. The first FIPS 201 version limited the amount of information that was available from the contactless portion of the card.
Near field communication devices could then read the PIV and authenticate to networks, sign and read email, and complete other tasks. To do this the process for creating a secure channel between the mobile and the credential would have to be created. “It’s easy to do technically but hard for the key management,” he says.
Since any NFC device would be able to read any PIV there would have to be a secure key placed on the mobile to make sure the credential is only being read by the properly authorized device. It would be a way to authorize the device to the credential.
Secure keys would have to be issued to the mobile devices, MacGregor says. This could be as simple as a pairing PIN that could be entered into the mobile to authorize pairing. “This doesn’t require too much more functionality,” he adds."
'via Blog this'
Tuesday, May 08, 2012
Idevnews | PingOne’s Cloud Cuts Cost, Complexity for Federating Identity for Legacy, SaaS, Mobile
Idevnews | PingOne’s Cloud Cuts Cost, Complexity for Federating Identity for Legacy, SaaS, Mobile:
Explosion of SaaS Adoption “The biggest (demand for federated identity) has been general move to cloud based apps, especially multiple apps,” Buckley said. While Salesforce is a major force, there are others, he added. “As SaaS solutions get better, more and more companies are also adopting all types of BPO [business process outsourcing] solutions, including HR, expense tracking and so on. This adoption of multiple SaaS by multiple departments forces you to rethink what you’re doing with Identity management,” Johnathan Buckley of Ping Identity said.
'via Blog this'
Explosion of SaaS Adoption “The biggest (demand for federated identity) has been general move to cloud based apps, especially multiple apps,” Buckley said. While Salesforce is a major force, there are others, he added. “As SaaS solutions get better, more and more companies are also adopting all types of BPO [business process outsourcing] solutions, including HR, expense tracking and so on. This adoption of multiple SaaS by multiple departments forces you to rethink what you’re doing with Identity management,” Johnathan Buckley of Ping Identity said.
'via Blog this'
Monday, May 07, 2012
Sunday, May 06, 2012
Sunday, April 22, 2012
A Few Thoughts on Cryptographic Engineering: So long False Start, we hardly knew ye
A Few Thoughts on Cryptographic Engineering: So long False Start, we hardly knew ye: Last week brought the sad news that Google is removing support for TLS False Start from the next version of Chrome. This follows on Goo...
Thursday, April 19, 2012
Sunday, April 15, 2012
Friday, April 13, 2012
The Best Tools for Visualization
The Best Tools for Visualization: Visualization is a technique to graphically represent sets of data. When data is large or abstract, visualization can help make the data easier to read or understand. There are visualization tools for search, music, networks, online communities, and almost anything else you can think of. Some are open source.
Thursday, April 12, 2012
Model Trust Framework | Dazza Greenwood, JD
Model Trust Framework | Dazza Greenwood, JD
MIT has recently spun off an exciting new non-profit corporation called IDcubed.org, focusing on the unique role of Trust Frameworks in the digital ecology of life. The group is pursuing many interesting and important project.
MIT has recently spun off an exciting new non-profit corporation called IDcubed.org, focusing on the unique role of Trust Frameworks in the digital ecology of life. The group is pursuing many interesting and important project.
Sunday, April 08, 2012
Saturday, February 04, 2012
Subscribe to:
Comments (Atom)