Remove Architecture Remove Authentication Remove Internet Remove Systems Administration
article thumbnail

The Architecture of Identity Systems

Phil Windley

Summary: The architecture of an identity system has a profound impact on the nature of the relationships it supports. Introductory note: I recently read a paper from Sam Smith, Key Event Receipt Infrastructure , that provided inspiration for a way to think about and classify identity systems. Wikipedia defines legitimacy as.

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. We recommend architectures that also enable analysis of streaming data.

How To 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do you know how your online traffic safety is regulated?

Dataconomy

One such asset is the certificate, which plays a crucial role in authenticating and securing online communications. The Online Certificate Status Protocol (OCSP) is a protocol used to check the revocation status of digital certificates in real-time over the internet. Featured image credit: wirestock/Freepik.

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Summary: Sovrin is an identity metasystem that provides the Internet's missing identity layer. By creating a general-purpose system for constructing context-specific identity systems, the metasystem represents a universal trust framework. Digital identity is broken because the Internet was built without an identity layer.

Internet 102
article thumbnail

Can the Digital Future Be Our Home?

Phil Windley

And yet those systems are not ours, but rather belong to the companies that provide them. I call these systems "administrative" because they are built to administer our experience in a particular domain for the administrator's specific purposes. Not altogether unpleasant, but a far cry from authentic.