Remove 2005 Remove Applications Remove Authentication Remove Network
article thumbnail

The Self-Sovereign Internet

Phil Windley

If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier. claim it by logging in).

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The application is expected for general release in February.

Trends 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HIPAA Technical Safeguards Risk Assessment Checklist

Galido

The HIPAA Security Rule focused on electronically stored ePHI in 2005. The technical safeguards must include PHI communications that are electronically transmitted via open networks. These inventory of information systems must include applications, software, applications and electronic devices.

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. The concept of an identity metasystem was first introduced by Kim Cameron in 2005 (PDF). Certificate of authenticity (e.g. Identity Systems.

System 87
article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

CloudVelocity today released its One Hybrid Cloud software for migrating applications to Amazon Web Services. “We automate five sets of critical processes and extend authentication and other network services into the cloud, making the cloud a seamless extension of the data center. Networking. December 2005 (10).

Tools 205
article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs. airplanes, saws, and pencils) are nevertheless fairly narrow in their scope and application. This kind of "layer" is called an overlay network. Many very useful devices (e.g.

Internet 135
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. Vamosi: So you’re CISO at a major corporation and all of sudden there’s been a ransomware attack in your network, and it’s spreading throughout your infrastructure.