Similar Articles |
|
InternetNews August 12, 2004 Michael Singer |
RosettaNet Seeks Guidance on B2B The consortium turns to high-tech companies for guidance on the future architectures of e-business. |
InternetNews September 1, 2004 Michael Singer |
B2B Groups Link E-Business Silos RosettaNet and eBusinessReady match software testing as another step toward supply chain interoperability. |
JavaWorld April 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... |
InternetNews September 17, 2004 Michael Singer |
RosettaNet Extends to Singapore The B2B consortium gets backing from Cisco, HP, IBM, Intel, Microsoft, and Oracle for the Architecture Center of Excellence in Singapore. |
InternetNews June 28, 2010 |
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? |
JavaWorld January 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... |
PC World March 22, 2001 Cameron Crouch |
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... |
InternetNews December 31, 2003 Susan Kuchinskas |
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? |
InternetNews March 2, 2005 Susan Kuchinskas |
BizTalk Accelerates RosettaNet The RosettaNet Accelerator provides specific technology and prescriptive guidance on how to connect to a Rosetta network to do B2B exchanges via XML. |
U.S. CPSC November 12, 2008 |
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. |
JavaWorld February 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. |
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
PC World October 24, 2007 Erik Larkin |
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. |
InternetNews January 16, 2004 Michael Singer |
Q&A: RosettaNet CEO Jennifer Hamilton The woman leading B2B standards efforts talks about China's role in the continued growth of e-business, RFID opportunities, and how to improve supply chain management. |
JavaWorld March 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. |
InternetNews March 24, 2011 |
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. |
CIO September 1, 2001 John Orcutt |
Let's Get Together The best ways to achieve the seamless integration of e-business initiatives... |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
OCC Bulletin August 31, 2004 |
Tax Lien Certificates Description This document describes the risk management practices that the Office of the Comptroller of the Currency expects banks to exercise when purchasing tax lien certificates. |
Registered Rep. March 1, 2005 Janet Wynn |
Paper Torture Why does today's securities industry, which uses some of the most sophisticated technology available, still issue and distribute equities the same way it did two centuries ago --- as pieces of paper? |
InternetNews May 19, 2006 Sean Michael Kerner |
Calif. Court Certifies Class Action Vs. VeriSign Plaintiffs allege that they were mislead about VeriSign's SSL certificates. |