article thumbnail

The Self-Sovereign Internet

Phil Windley

If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier. claim it by logging in). Generativity.

article thumbnail

DARPA offers $42 million for ‘revolutionary’ research on social media analysis

Trends in the Living Networks

The DARPA announcement states: The conditions under which our Armed Forces conduct operations are rapidly changing with the spread of blogs, social networking sites, and media?]sharing The value for defense intelligence of social media and social network mining is evident. In particular, SMISC will develop automated and semi?]automated

Analysis 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

He originally joined the travel company’s board in 2005. AskJeeves was acquired in 2005 by IAC, the internet media company run by Barry Diller, who is also chairman of Seattle-based Expedia Group. She succeeds co-founder David Brown, who will remain on the board of the global network for entrepreneurs.

Groups 81
article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The same thing is happening with social networks. So the excuses are running out.

Trends 60
article thumbnail

HIPAA Technical Safeguards Risk Assessment Checklist

Galido

The HIPAA Security Rule focused on electronically stored ePHI in 2005. The technical safeguards must include PHI communications that are electronically transmitted via open networks. To re-establish access, users must be able to complete the correct authentication procedures such as passwords and biometrics.

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. The concept of an identity metasystem was first introduced by Kim Cameron in 2005 (PDF). Certificate of authenticity (e.g. Identity Systems.

System 87
article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

“We automate five sets of critical processes and extend authentication and other network services into the cloud, making the cloud a seamless extension of the data center. CloudPSI – CloudVelocity: Launch apps to cloud with no change to code – Network World. Networking. December 2005 (10).

Tools 205