MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
D-Lib
Jul/Aug 2002
Mairead Martin
Federated Digital Rights Management A proposed drm solution for research and education. mark for My Articles similar articles
JavaWorld
March 2003
Frank Sommers
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. mark for My Articles similar articles
JavaWorld
May 2002
Zhong & Lehr
US Department of Energy signs on to J2EE If you architect many secure Web applications, authentication and authorization are always important concerns. Defining an architecture so that users can sign on to many n-tier Web applications only once---regardless of who built the applications, when they were built, or what kind of OSs and application servers they run on---is always a big challenge. This article presents a single sign-on architecture. mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 2 1999
Mark Sheehan and Allen Porter
Authenticated Off-Net Access to Commercial Library Resources When an institution licenses data from a provider for use by its memembers, how can it ensure that only its own members can access the data while also being flexible enough to allow them to access the data when they are off site? mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 4 1999
Kenneth J. Klingenstein
Middleware: The Second Layer of IT Infrastructure A second wave of network invention and deployment has begun. Riding on top of the physical Internet protocol (IP) connectivity that drove the first generation of networking, this effort adds "logical" connectivity to the networked infrastructure.... mark for My Articles similar articles
JavaWorld
March 2003
Jian Zhong
From stove-piped projects to unified enterprise architecture A discussion of strategic considerations in developing an e-authentication service in enterprise environments, touching on e-authentication, e-signature, and an enterprise architecture (EA) approach for reusability and information sharing. mark for My Articles similar articles
New Architect
January 2003
Amit Asaravala
A Question of Identity Passport, Liberty, and the single sign-on race mark for My Articles similar articles
D-Lib
August 2005
William H. Mischo
Digital Libraries: Challenges and Influential Work Effective search and discovery over open and hidden digital resources on the Internet remains a problematic and challenging task. mark for My Articles similar articles
InternetNews
July 8, 2005
Mike Harwood
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. mark for My Articles similar articles
D-Lib
April 2005
In Brief How Do Users Search? Examining User Behavior and Testing Innovative Possibilities within the CREE Project... Sakai Educational Partners Program... New FreePint Job Service for Information Professionals... etc. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
JavaWorld
February 2002
Todd E. Sundsted
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
PC Magazine
April 20, 2004
Larry J. Seltzer
Stopping Spam SMTP authentication can corral spam, but implementation is thorny. mark for My Articles similar articles
U.S. Banker
May 2011
Rob Garver
Another Stab at Federated Identity The administration is exploring an identity ecosystem that envisions universal Internet log-in credentials for consumers. Will the prospect of more secure e-commerce win banks over to the idea? mark for My Articles similar articles
InternetNews
June 5, 2006
Clint Boulton
Ping For Safer Log-ins Ping Identity, a standalone maker of secure single sign-on software for managing Web-based exchanges, improved its software platform for allowing businesses to securely complete transactions and share information. mark for My Articles similar articles
Bank Systems & Technology
October 30, 2007
Nancy Feig
Banks Using Mobile Phone for Out-of-Band Authentication Amid increasing pressure to protect customers online, some of the largest global banks are turning to out-of-band authentication to fortify their Web banking services. mark for My Articles similar articles
Information Today
July 21, 2003
News Digest Mergent Launches New Industry Reports... Internet2 Releases Web Authorization Software... LexisNexis Offers Integrated Search Application mark for My Articles similar articles
Bank Technology News
August 2009
John Adams
United Nations of Identity Management Since most of the consortiums formed to promote interoperability among proprietary online identity management schemes have had results that can best be described as ironic, the Kantara Initiative has its work cut out for it. mark for My Articles similar articles
D-Lib
December 2004
David Green
How Fares the Wired Museum? Report on the 32nd Annual Conference of the Museum Computer Network which has been a leading agent in museums' use of computers from improving operational efficiency to animating collections and connecting them to a wider world. mark for My Articles similar articles
InternetNews
September 21, 2004
Ryan Naraine
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
Bank Technology News
January 2009
Rebecca Sausner
Banks Beef Up The Locks Many U.S. banks are now taking another look at their online authentication technology, and increasingly adding layers that involve out-of-band techniques and stronger fraud-detection engines. mark for My Articles similar articles
InternetNews
February 14, 2005
Michael Singer
VeriSign Revamps Security Lineup The security vendor makes renewed pitch for two-factor authentication to protect against security threats. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
InternetNews
February 14, 2006
Erin Joyce
Microsoft, RSA, Sun And Encryption Business users and eventually consumers are moving closer to storing more of their digital identities and authentication on smart cards and USB devices. mark for My Articles similar articles
InternetNews
February 14, 2006
Erin Joyce
IT to Endpoints: Who Are You? Security vendors say enterprises need to be a lot more picky about their network access protocols. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
InternetNews
February 13, 2006
Sean Michael Kerner
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
Bank Systems & Technology
May 26, 2010
Matt Gunn
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. mark for My Articles similar articles
InternetNews
October 24, 2005
Tim Gray
Companies Bid for Authentication Compliance Work Financial institutions are getting started on security compliance regulations. mark for My Articles similar articles
Bank Technology News
August 2006
Glen Fest
Choosing Authentication Solutions: Vetting Vendors, Soothing Customers Banks face tough choices today in building anti-fraud resiliency, from selecting providers to meeting user preferences. Will they be happy with those choices tomorrow? mark for My Articles similar articles
Wall Street & Technology
November 18, 2005
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). mark for My Articles similar articles
InternetNews
March 3, 2006
Erin Joyce
Neal Creighton, CEO, GeoTrust Digital certificate authority Neal Creighton sees a busy year dawning. The co-founder of GeoTrust explains why. mark for My Articles similar articles