Monday, April 20, 2009

Siloed reputation management vs. small town reputation management

The real challenge of reputation management is configuring a reputation system to closely parallel a small town
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Developers and Identity Services: Tackling Identity Data with Identity Hub
How an application consumes identity data is one of the most challenging aspects of developing an identity-enabled application. Identity Services, a key mechanism behind Service-Oriented Security, enable developers to easily reuse many common identity functions. This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers. Read this timely whitepaper today!

rule

Spotlight Story
Siloed reputation management vs. small town reputation management

Dave Kearns By Dave Kearns
Recently, I was talking about the relatively new identity management area of online reputation management. Some siloed reputation management systems were mentioned (e.g., eBay, Yelp, Trip Advisor), which are the ones always mentioned whenever identity management visionaries get together. But, in reality, what we're looking for goes back much farther than the online age. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Creating a reputation system that's easy to use, safe and secure Last issue, in talking about Ethoca, I mentioned that their fraud-fighting scheme might be the basis for constructing the type of system we've been talking about for years without ever getting close to realizing a working system. If you read the last issue, you can probably guess that I'm talking about a reputation system.

Fraud fighting service Next month at the European Identity Conference I'll be talking about Risk Management ("Risk Management for Better Health, Fiscal and Physical"). In doing some research for that keynote, I came across a company which hosts what they call a "fraud fighting" service, but which comes under the risk management heading and just might be the pre-cursor to a type of service we've only thought of as "pie in the sky" until now.

Why reputation works as an identity management element Last issue I began to talk about reputation as a component of an identity system. If you missed that issue, you should visit the Web site for Sxore, to learn more about Sxip's implementation of a reputation-based system. Today, I want to look at the implications of a reputation-based identity system.

Microsoft’s cloud identity platform on track Microsoft's identity cloud platform code-named Geneva which will complement Microsoft’s Azure cloud OS, will grab a spotlight at next month’s annual TechEd conference.

Human ear could be next biometric system British scientists are investigating the viability of a new biometric technique that would make use of the human ear as a way for a third party to identify the person they are speaking to.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Oracle
rule

Developers and Identity Services: Tackling Identity Data with Identity Hub
How an application consumes identity data is one of the most challenging aspects of developing an identity-enabled application. Identity Services, a key mechanism behind Service-Oriented Security, enable developers to easily reuse many common identity functions. This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers. Read this timely whitepaper today!

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/20/09

Today's most-read stories:

  1. Microsoft discloses ambitious security strategy
  2. Cisco reveals aggressive pricing for blade server system
  3. PBX killer, Voice CAL coming to OCS in 2010
  4. Black Hat 'supertalk' halted due to vendor concerns
  5. Why is Google's Schmidt still on Apple's board?
  6. Forced week off at Adobe not exactly a vacation
  7. Cisco against Buy America provisions of broadband stimulus fund
  8. Breakthrough enables Terabit Ethernet
  9. Microsoft's cloud identity platform on track
  10. H1-B demand falls sharply
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment