Remove 2005 Remove Authentication Remove Network Remove Security
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. The concept of an identity metasystem was first introduced by Kim Cameron in 2005 (PDF). Certificate of authenticity (e.g. Identity Systems.

System 87
article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs.

Internet 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Self-Sovereign Internet

Phil Windley

If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. DIDs and DID-based Communication or DIDComm form the second layer of the SSI stack, providing a secure communications layer for the exchange of identity information via verifiable credentials. claim it by logging in).

article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

More importantly, the One Hybrid Cloud technology adds security features that may make cloud adoption more accessible for enterprise customers with stringent compliance and security requirements. CloudPSI – CloudVelocity: Launch apps to cloud with no change to code – Network World. Networking. August 2005 (2).

Tools 205
article thumbnail

Goodbye, NAC. Hello, software-defined perimeter

Network World

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006. In 2006, wireless networking based upon 802.11 was transforming from a novelty to the preferred technology for network access. A wave of internet worms.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

He originally joined the travel company’s board in 2005. AskJeeves was acquired in 2005 by IAC, the internet media company run by Barry Diller, who is also chairman of Seattle-based Expedia Group. She succeeds co-founder David Brown, who will remain on the board of the global network for entrepreneurs.

Groups 79
article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. Services then became available that provided secure, auditable IM.

Trends 60