Search This Blog

Wednesday, April 01, 2009

Eve Maler: Renaissance woman

Eve Maler and some Sun colleagues have created a new protocol called "ProtectServe"
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Podcast: Improve Security & Compliance
An interview with Jukka Kouletsis, Program Manager at Dell, discussing lessons learned in the field about Windows Vista deployment. Topics include a timeline for a deployment plan, strategies for improving security and compliance, and the impact of intangibles.

rule

Spotlight Story
Eve Maler: Renaissance woman

Dave Kearns By Dave Kearns
Eve Maler and some Sun colleagues have created a new protocol called "ProtectServe," which dictates interactions among four parties: a User/User Agent, an Authorization Manager (AM), a Service Provider (SP), and a Consumer. The protocol assumes there's a Relationship Manager (RM) application sitting above, acting on behalf of the User - sometimes silently. At a minimum, it performs the job of authorization management. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Waxing lyrical about identity management I saw and heard a lot that was very interesting at last week’s Internet Identity Workshop meeting, including the impromptu rendition of Queen’s Bohemian Rhapsody by Sun’s Eve Maler, and ably (?) assisted by Laurie Rae, Peter Tapling, Derek Fluker, Bill Johnson, and Wes Kussmaul.

Ex-Sun ID wizards unveil the UnboundID Directory Server While I was writing this newsletter last week the press was rampant with rumors of an IBM buyout of Sun. Such a deal would dramatically change the identity management landscape, but it's not what I want to talk about ...

Sun's identity guru moves up A Texas whirlwind plopped down in the San Francisco Bay Area last week so, naturally, I had to sit down with her for a chat. Sun's Sara Gates used to have what I considered the most interesting title in high tech. Until ...

Where do OpenID and InfoCards fit? As I was saying last issue, one of the more interesting sessions I attended at the recent "first annual SSO Summit" was an open space presentation (i.e., the dozen or so attendees all participated led by our discussion ...

Microsoft's Zermatt aims to ease development of claims-based identity apps Last week's issue on so-called user-centric identity technologies in the enterprise ("Where do OpenID and InfoCards fit?") reminded me that there was a Microsoft announcement in early July that I should have written ...

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Dell
rule

Podcast: Improve Security & Compliance
An interview with Jukka Kouletsis, Program Manager at Dell, discussing lessons learned in the field about Windows Vista deployment. Topics include a timeline for a deployment plan, strategies for improving security and compliance, and the impact of intangibles.

rule

Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!


Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now

 

04/01/09

Today's most-read stories:

  1. Conficker on April 1st: Eve of destruction or big joke?
  2. Mobile Skype: The end of cellular as we know it
  3. Top 10 technology skills
  4. Conficker's patch gambit exposed by researchers
  5. The 10 worst Microsoft product names of all time
  6. Deep computer-spying network touched 103 countries
  7. Feds give $50 billion IT services deal a second try
  8. Preparing for the Pre: Palm and Sprint must get it right
  9. Seven reasons MPLS has been wildly successful
  10. Fake security software scammers jump on Conficker
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: