Tag Archives: Security

Medical Technology, Healthcare & Government IT

.
  • A Radical New Approach to (MUTUAL) Authentication

    In this article, we present a fundamentally new identity framework – RELATIVE IDENTITY – which addresses and eliminates many of the core problems faced by the current identity technologies. We postulate that authentication necessarily must be mutual and that the only valid way to perform mutual authentication is to make fundamental changes to the identity representation framework…

  • Website Identity – the root cause for Internet Fraud

    On the internet there are 2 types of websites – ones that take sensitive information from you and ones that don’t. Online banking applications, shopping applications, stock-trading applications are examples of the former; while CNN, Google etc are examples of the latter. This article deals with the very real insecurities of working with applications of the former variety and the root cause for their existence – the nature of website identity in the contemporary internet environment…

  • PKI (HSPD-12) for controlling access to your web applications

    If you’re looking for a quick and easy way to allow web applications to use your PIV cards and allow more thin-client solutions be HSPD-12 compliant, check out the Public Key Infrastructure Framework (PKIF) and WebCullis projects. What’s slick about WebCullis is that it’s an IIS- and Apache-compatible web module that makes most of the [&hellip…