Authentication & Authorization

  •  TYPE: Track    START DATE: Wednesday, May 05, 2010     START TIME: 14:00    LOCATION:  Antares
Conference Agenda



How to make your Software Security Architecture Future-Proof

Date: Wednesday, May 05, 2010 Time: 14:00-15:00

How to make your Software Security Architecture Future-Proof
Martin Kuppinger, KuppingerCole • Dale Olds, Novell • Kim Cameron, • Rakesh Radhakrishnan, KPMG • Gerry Gebel, Strata Identity, Inc • Mehdi Bermy, OpenTrust

Attributes Centric Identity Architecture

Date: Wednesday, May 05, 2010 Time: 15:00-16:00

Attributes Centric Identity Architecture
Fulup Ar Foll,

After so many years of conflict, the war in between authentication protocols finally ended. While there is no clear winner, the only three survivors (SAML2, OpenID & InfoCard) have established an informal "armistice", where each claims to be more complementary than competitors. The industry, as well as customers, can easily sustain three protocols. Today any significant software implementation bridges the remaining protocols seamlessly. While this scenario may not be perfect,...

Improving the Security and Usability of OpenID
Ariel Gordon, Microsoft

OpenID has gained significant popularity as an Internet identity system. Nonetheless, its adoption has been limited by usability and security issues. It has been widely speculated in the community that one of the ways that we can make OpenID more usable and safer is with the introduction of an active client to assist the user with his logon experience. In this session, we will describe the results of a community collaboration to develop an experimental multi-protocol version of Windows...

Regain Control of Your Perimeter in the Cloud

Date: Wednesday, May 05, 2010 Time: 16:30-17:30

Regain Control of Your Perimeter in the Cloud
Dr. Babak Sadighi, Axiomatics AB • Blake Dournaee, Intel

The traditional concept of an in-house data center behind a static corporate firewall is history once and for all. The enterprise is now in full embrace of dynamic applications provided and scaled by dedicated cloud service providers. To innovate faster, regain control, and compete in a new world that is shifting from a "need to know" to "need to share" paradigm requires a new focus on security and authorization in a dynamic perimeter. This dynamic perimeter spans hybrid...

Claims Based Identity and the Cloud
Vittorio Bertocci, Microsoft

One of the many advantages of claims-based architectures is that they abstract away the details of their components, including where things are hosted. As long as services and identity providers are network-addressable, they can live on-premises and in the cloud and easily move between the two environment without changing the emerging properties of the system. The immediate advantage is that existing identity providers, typically on-premises, are readily available for the new applications in...


European Identity Conference 2010

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 04 - 07, 2010 Munich