Remove Authentication Remove Banking Remove Government Remove Systems Administration
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Boston builds out data visualization - GCN.com GCN (Today) - GCN.comBoston builds out data visualizationGCN.comBoston's data-visualization journey began, as many cities' do, when the mayor requested a dashboard of key indicators and metrics so he could monitor government operations across. Privileged user authentication and PKI are.

Insurance 150
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

As a result, PCI DSS has become a pivotal framework for the airline industry with its invaluable agenda to govern the PCI DSS for payment card transactions. The “personnel” in this context could refer to anyone that can impact the security of the IBE, including the developers, project managers and systems administrators.

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Because DIDs are cryptographic artifacts tied to public-private key pairs, this exchange provides the agents with the means to perform mutual authentication and create an encrypted channel. To see how credential exchange works, suppose Alice (the identity owner) is applying for a loan at her local bank (the credential verifier).

Internet 102