Welcome to IDtrust XML.org.
This is the official community gathering place and information resource for identity and trusted infrastructure standards. The site is hosted by the OASIS IDtrust Member Section, a group that encourages new participation from developers and users. This is an open, vendor-neutral community-driven site, and the public is encouraged to contribute content. See more about this site.
News: Submitted by arshadnoor on Fri, 01/25/2008 - 02:08. Last updated on Mon, 01/28/2008 - 16:05.
The new Dutch transit card system, on which $2 billion has been spent,
was recently shown by researchers to be insecure. Three attacks have
been announced by separate research groups. Let’s look at what went
wrong and why.
Read the rest of the story at Ed Felten's blog at http://www.freedom-to-tinker.com/?p=1250.
Read more
News: Submitted by arshadnoor on Sat, 01/19/2008 - 20:28.
If you want to transact business with credit cards, you have to follow
the rules: the payment card industry security standards. Companies that
don't comply face fines or worse. So why aren't more mid-market
merchants already in compliance?
By Michael Jackman
CIO Magazine,
January 15, 2008
Read more
News: Submitted by arshadnoor on Sat, 01/19/2008 - 17:46. Last updated on Tue, 01/22/2008 - 14:48.
StrongAuth, Inc. , the creators of StrongKeyTM the first open-source Symmetric Key Management System (SKMS), has submitted a new version of the Symmetric Key Services Markup Language (SKSML) to the OASIS Enterprise Key Management Infrastructure (EKMI) Technical Committee.
Read more
News: Submitted by arshadnoor on Sat, 01/19/2008 - 17:41.
As the internet continues to become more hostile and Information
Technology infrastructure comes under contractual and government
regulation (RIPA, PCI-DSS, PCSA, HIPAA, FISMA), SOA-based applications
will need to address issues of data security, privacy and accessibility
in better ways than traditional architectures have dealt with them.
Encryption
of data is the last bastion of defense.
Read more
News: Submitted by arshadnoor on Sat, 01/19/2008 - 17:38.
Since the dawn of computing, operating systems and applications have
used many schemes to identify and authenticate entities accessing
resources within computers. While the technologies and schemes have
varied, there appears to have been little attempt to classify them
based on their ability to resist attacks from unauthorized entities.
Read more