Saturday, May 26, 2012
Tuesday, May 22, 2012
Monday, May 21, 2012
Saturday, May 19, 2012
Friday, May 11, 2012
Thursday, May 10, 2012
Open-source cloud frameworks: A work in progress - Computerworld
Open-source cloud frameworks: A work in progress - Computerworld:
'via Blog this'
Nimble and fast, open-source frameworks can simplify application deployment in the cloud. But they're not for everyone.
'via Blog this'
NFCNews | NIST tackling PIV, mobile ID
NFCNews | NIST tackling PIV, mobile ID: "Enhanced PIV
The other two options seem to be more realistic but would require policy and technology changes. The phone could be used as a credential if the contactless interface of the PIV was fully enabled, MacGregor says. The first FIPS 201 version limited the amount of information that was available from the contactless portion of the card.
Near field communication devices could then read the PIV and authenticate to networks, sign and read email, and complete other tasks. To do this the process for creating a secure channel between the mobile and the credential would have to be created. “It’s easy to do technically but hard for the key management,” he says.
Since any NFC device would be able to read any PIV there would have to be a secure key placed on the mobile to make sure the credential is only being read by the properly authorized device. It would be a way to authorize the device to the credential.
Secure keys would have to be issued to the mobile devices, MacGregor says. This could be as simple as a pairing PIN that could be entered into the mobile to authorize pairing. “This doesn’t require too much more functionality,” he adds."
'via Blog this'
The other two options seem to be more realistic but would require policy and technology changes. The phone could be used as a credential if the contactless interface of the PIV was fully enabled, MacGregor says. The first FIPS 201 version limited the amount of information that was available from the contactless portion of the card.
Near field communication devices could then read the PIV and authenticate to networks, sign and read email, and complete other tasks. To do this the process for creating a secure channel between the mobile and the credential would have to be created. “It’s easy to do technically but hard for the key management,” he says.
Since any NFC device would be able to read any PIV there would have to be a secure key placed on the mobile to make sure the credential is only being read by the properly authorized device. It would be a way to authorize the device to the credential.
Secure keys would have to be issued to the mobile devices, MacGregor says. This could be as simple as a pairing PIN that could be entered into the mobile to authorize pairing. “This doesn’t require too much more functionality,” he adds."
'via Blog this'
Tuesday, May 08, 2012
Idevnews | PingOne’s Cloud Cuts Cost, Complexity for Federating Identity for Legacy, SaaS, Mobile
Idevnews | PingOne’s Cloud Cuts Cost, Complexity for Federating Identity for Legacy, SaaS, Mobile:
Explosion of SaaS Adoption “The biggest (demand for federated identity) has been general move to cloud based apps, especially multiple apps,” Buckley said. While Salesforce is a major force, there are others, he added. “As SaaS solutions get better, more and more companies are also adopting all types of BPO [business process outsourcing] solutions, including HR, expense tracking and so on. This adoption of multiple SaaS by multiple departments forces you to rethink what you’re doing with Identity management,” Johnathan Buckley of Ping Identity said.
'via Blog this'
Explosion of SaaS Adoption “The biggest (demand for federated identity) has been general move to cloud based apps, especially multiple apps,” Buckley said. While Salesforce is a major force, there are others, he added. “As SaaS solutions get better, more and more companies are also adopting all types of BPO [business process outsourcing] solutions, including HR, expense tracking and so on. This adoption of multiple SaaS by multiple departments forces you to rethink what you’re doing with Identity management,” Johnathan Buckley of Ping Identity said.
'via Blog this'
Monday, May 07, 2012
Sunday, May 06, 2012
Subscribe to:
Comments (Atom)