News | Identity-Based Key Agreement Protocol for Network Layer | carolgeyer |
News | NIST Guidelines Released for Secure Use of Digital Signatures | carolgeyer |
News | OASIS public review opens for Identity Metasystem Interoperability 1.0 | carolgeyer |
News | Heartland CEO Calls for Industry Cooperation to Fight Cyber Criminals and Adoption of End-To-End Encryption | dschur |
News | Enterprise key management deciphered | dschur |
News | FEMA seeks IT for ID management | carolgeyer |
News | NLnet Foundation seeks identity and privacy proposals for funding | carolgeyer |
News | Informal Public Review of BIAS SOAP Profile 1.0 Begins | carolgeyer |
News | WS-Security Achieves Critical Mass Of User Adoption | carolgeyer |
News | Public reviews begin for XSPA Profiles of SAML and XACML | carolgeyer |
News | WS-Federation 1.2 public review begins | carolgeyer |
News | New Year’s Resolution: Let’s Talk More about SPML | dschur |
News | Single Sign-On and Social Networks | dschur |
Event | RSA Conference 2009 | dschur |
Event | Burton Group Catalyst Conference 2009 | dschur |
Event | European Identity Conference (EIC) 2009 | dschur |
News | SC World Congress: Commission on cybersecurity releases recommendations | dschur |
News | Researchers Hack Internet Security Infrastructure-International Team Discovers Way to Mimic Digital Identity | dschur |
News | 2008 Encryption and Key Management Benchmark Report | dschur |
News | Pulling Keystrokes Out of the Air | arshadnoor |
News | OASIS Forms Committee to Advance Information Cards | carolgeyer |
News | Identity management: an essential guide for IT professionals | dschur |
News | One security implementer shares his single sign-on best practices | dschur |
News | Provisioning/deprovisioning problematic for a third of organizations | dschur |
News | Opinion: Encryption compliance still the Wild West | dschur |