Remove Authentication Remove Internet Remove Security Remove Workshop
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

At the most recent Internet Identity Workshop , Drummond Reed gave a session on how X.509 509 certificate providing TLS security. Provided the certificate includes information about the entity beyond the domain name, the verifier can use that information to determine whether or not the credential is authentic (i.e.,

Data 83
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

The summit features presentations, panel discussions, and workshops on up-to-the-minute trends and issues faced by those in charge of sharing, analyzing, and defending government data through Enterprise Forensics, E-Discovery and Cybersecurity in the U.S. Whitenoise Laboratories, Secure Exchange Technology Innovations.

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ready or not, IoT is transforming your world

Dataconomy

The Internet of Things (IoT), a revolutionary network of interconnected devices and systems, is propelling us into a new era of possibilities. Internet of Things (IoT), has brought about revolutionary changes to the way we live, work, and interact with our surroundings.

article thumbnail

Identity, Sovrin, and the Internet of Things

Phil Windley

Summary: Building the Internet of Things securely requires that we look to non-hierarchical models for managing trust. Sovrin provides a Web of Trust model for securing the Internet of Things that increases security and availability while giving device owners more control. Not bad stuff as far as it goes.

article thumbnail

DID Messaging: A Batphone for Everyone

Phil Windley

Summary: DID Messaging can provide a secure, authenticated, and verified channel for every relationship you have. In my last post, I wrote about a demo given by BCGov, Spark NZ, and Streetcred ID at the last Internet Identity Workshop. We can verify who's at the other end by asking them to prove things to us.

article thumbnail

The Laws of Identity

Phil Windley

It's no coincidence that Internet Identity Workshop got started in 2005. Many people were talking about user-centric identity and developing ideas about how we might be able to create an identity layer for the Internet. The Internet was created without any way to identify the people who used it.

Banking 88
article thumbnail

Why would anyone buy FirstNet?

Chief Seattle Greek Blog

FirstNet – or its state partners – might have public processes and even workshops and conferences where regions can specify their priorities for expanding coverage, or adding applications or improving capabilities such as those listed below. A police department will also want encryption, VPN, advanced authentication (FBI CJIS policy).

Network 28