Similar Articles |
|
New Architect July 2002 Paul Sholtz |
Directory Integration Using directory services to successfully manage partner relationships |
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. |
D-Lib Jul/Aug 2002 Mairead Martin |
Federated Digital Rights Management A proposed drm solution for research and education. |
D-Lib June 2006 Teets & Murray |
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. |
D-Lib September 2000 Judith Pearce |
Directories of Libraries and Related Organizations This paper describes data standards work currently in progress to support the deployment of directories of libraries and related organizations in a networked information services environment. |
InternetNews July 8, 2005 Mike Harwood |
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. |
D-Lib April 2006 Norman Paskin |
Identifier Interoperability: A Report on Two Recent ISO Activities There are increasing demands for metadata interoperability in both the commercial media and library sectors, and the semantic interoperability technology developed from the <indecs> model has a role to play in addressing these. |
D-Lib Jan/Feb 2011 Michener et al. |
DataONE: Data Observation Network for Earth -- Preserving Data and Enabling Innovation in the Biological and Environmental Sciences DataONE is being designed and built to provide a foundation for innovative environmental research that addresses questions of relevance to science and society. |
D-Lib October 2007 Adam J. Smith |
Developing Handle System(R) Web Services at Cornell University Recognizing the importance of consistently implementing persistent identifiers (PIDs), a group of librarians at Cornell University evaluated several PID strategies and chose to use the Handle System. |
New Architect January 2003 Amit Asaravala |
A Question of Identity Passport, Liberty, and the single sign-on race |
D-Lib February 2009 Nicholas et al. |
A Policy Checklist for Enabling Persistence of Identifiers One of the main tasks of the Persistent Identifier Linking Infrastructure (PILIN) project on persistent identifiers was to establish a policy framework for managing identifiers and identifier providers. |
T.H.E. Journal June 2006 Doug Gale |
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. |
JavaWorld March 2003 Jian Zhong |
From stove-piped projects to unified enterprise architecture A discussion of strategic considerations in developing an e-authentication service in enterprise environments, touching on e-authentication, e-signature, and an enterprise architecture (EA) approach for reusability and information sharing. |
JavaWorld May 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
Information Today January 21, 2008 Barbara Quint |
But What About Corporate Authors? NISO Institutional Identifier Project Underway Thomson Scientific has joined an effort with the NISO to build an open standard for identifying institutions. The initial effort will focus on academic and research institutions, the kind often referred to in author affiliation or corporate author fields. |
D-Lib March 2000 Paepcke, Brandriff, Janee, Larson, et al. |
Search Middleware and the Simple Digital Library Interoperability Protocol "Search middleware" refers to protocols and associated software packages that enable information application writers to access information sources easily. |
D-Lib Jul/Aug 2015 |
The DOI -- Twenty Years On This year was the 20th anniversary of 'The Armati Report' that led fairly directly to the creation of the Digital Object Identifier. Mark Bide takes a long view of the accomplishments of the last twenty years as well as the challenges that remain. |
D-Lib January 2003 Norman Paskin |
On Making and Identifying a "Copy" The purpose of this article is to explore some of the conceptual issues of "making a copy" digitally and in an automated DRM environment which need to be clarified to enable rights expression languages and other DRM tools to deal with the concept of copying. |
InternetNews September 30, 2005 Clint Boulton |
'Hot Pluggable' One Key For Oracle Middleware President Chuck Phillips and Co. say Oracle's middleware can work with products from disparate vendors. |
JavaWorld August 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
Wall Street & Technology March 21, 2006 Paul Allen |
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. |
Military & Aerospace Electronics June 2007 John Keller |
Software Middleware Providers Acknowledge the Need for Security and Safety Middleware bridges the gaps between different software applications and different sets of hardware. Now, middleware is beginning to bridge the gaps between different levels of systems security. |
Military & Aerospace Electronics April 2007 John Keller |
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. |
JavaWorld February 2002 Todd E. Sundsted |
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? |
InternetNews November 18, 2005 Clint Boulton |
Wading Through 'Spaghetti Code' The IBM Way IBM researchers are developing a new type of messaging middleware system, called Smart Middleware Light Ends (SMILE), to simplify the integration of applications from different vendors. |
InternetNews February 28, 2005 Roy Mark |
Feds Approve New Smart Card Standards Federal employees and government contractors will eventually be given cards with digital photos and fingerprints. |
InternetNews February 13, 2006 Sean Michael Kerner |
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. |
CIO September 1, 2002 Ben Worthen |
Web Services: Still Not Ready for Prime Time The Next Hyped Thing is starting to show its age. Time for a reality check of what Web services can and cannot do. |
InternetNews September 21, 2004 Ryan Naraine |
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. |
Bank Technology News June 2004 Karen Krebsbach |
Firms Flirt with Out-of-Band Authentication Banks weigh whether this cumbersome technology is worth the bother for consumers, particularly for on-line banking. |
Bank Systems & Technology May 26, 2010 Matt Gunn |
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. |
InternetNews September 14, 2009 |
Managing Linux and Mac Fileshares in Windows It's an Active Directory world, but now Linux and Mac users can join in with new open source software. |
InternetNews May 10, 2007 Andy Patrizio |
Oracle Offers AJAX Bits, New SOA Framework Oracle is jumping into AJAX in a big way with news it would donate more than 80 AJAX components to the Apache Software Foundation under an open source license. |