Search
Search results
- Proposed Recharter of IETF Public-Key Infrastructure (X.509 PKIX) WG
... the fall of 1995 with the goal of developing Internet st and ards to support X.509-based Public Key Infrastructures (PKIs). ... path. Neither X.509 nor extant PKIX st and ards define protocols for the management of trust anchors. Existing mechanisms for managing ...
News - carolgeyer - 02/05/2008 - 13:55 - 0 comments - 0 attachments
- OASIS to Define Trust Elevation Standard for Authenticating e-Identity Credentials
The OASIS international open st and ards consortium has begun work to define a set of st and ardized protocols that online service providers may use to elevate trust when ...
News - carolgeyer - 10/19/2011 - 16:42 - 0 comments - 0 attachments
- More about Federated Identity
... that all of the participants need to be using the same st and ards and protocols to achieve federation. Unfortunately, as time has progressed a number ...
News - carolgeyer - 07/08/2008 - 13:24 - 0 comments - 0 attachments
- OASIS Forms Committee to Advance Information Cards
... Nortel, Novell, the US Department of Defense, VeriSign, and others collaborate on personal digital identity. OASIS, the international ... and projects have come together to st and ardize the protocols and data formats for interoperable Information Cards. The OASIS ...
News - carolgeyer - 09/23/2008 - 14:27 - 0 comments - 0 attachments
- Why Liberty's Identity Governance Framework is So Important
In late 2006, several companies got together and created the Identity Governance Framework (IGF), an initiative of the ... between regulatory requirements and the lower-level protocols and architecture. How can the inherent risks associated with the ...
News - cgeyer - 02/27/2008 - 14:03 - 0 comments - 0 attachments
- SOA Data Security Workshop - Feb 21/22, 2008 - Aachen, Germany
... As the internet continues to become more hostile and Information Technology infrastructure comes under contractual and ... within a single infrastructure using industry-st and ard protocols and guidelines. As companies start to implement EKMI, application ...
News - arshadnoor - 01/19/2008 - 17:34 - 0 comments - 0 attachments
- Securing the core with an EKMI - March 4-6, 2008 - Gaithersburg, MD
As the internet continues to become more hostile and Information Technology infrastructure comes under contractual and ... within a single infrastructure using industry-st and ard protocols and guidelines. As companies start to implement EKMI, application ...
News - arshadnoor - 01/19/2008 - 17:37 - 0 comments - 0 attachments

