Remove Airlines Remove Authentication Remove Licensing Remove Network
article thumbnail

Zero Trust with Zero Data

Phil Windley

In a world where network boundaries are increasingly porous and cyber threats are more evasive than ever, the Zero Trust model centers around the notion that no one, whether internal or external, should be inherently trusted. driver's license) to prove your age when buying beer, we ran convenience stores like a web app.

Data 66
article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

They worry about protecting the digital data that’s stored in databases, networks, or servers. A number of high-profile software failures at companies like Southwest Airlines or EasyJet show how code that runs well most of the time can also fail spectacularly. Chance of succeeding: It’s already here but only in cryptocurrency worlds.

Tools 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. This metasystem is in effect a system of systems that exposes a unified interface much like a device driver or network socket does. Drivers license.

System 87
article thumbnail

Multi-Source Identity

Phil Windley

Online, various, so-called "identity providers" authenticate people using usernames and passwords and provide a fixed, usually limited set of attributes about the subject of the identity transaction. Mutual exchange of keys is a big step up from SSL-mediated transactions on the Web where only one-side is cryptographically authenticated.

article thumbnail

Generative Identity

Phil Windley

The Generative Self-Sovereign Internet explored the generative properties of the self-sovereign internet, a secure overlay network created by DID connections. She might also use it at partner websites (like the benefits provider) to provide shared authentication without federation (and it's associated infrastructure). Drivers license.