Authentication & Authorization

  •  TYPE: Track    START DATE:  Wednesday, May 05, 2010     START TIME: 14:00    LOCATION:  Antares
Conference Agenda

Moderator(s):

Sessions:

How to make your Software Security Architecture Future-Proof

Date: Wednesday, May 05, 2010 Time: 14:00-15:00

How to make your Software Security Architecture Future-Proof
Martin Kuppinger, KuppingerCole • Dale Olds, Novell • Kim Cameron, Microsoft • Rakesh Radhakrishnan, Amgen • Gerry Gebel, Axiomatics Americas • Mehdi Bermy, OpenTrust


Attributes Centric Identity Architecture

Date: Wednesday, May 05, 2010 Time: 15:00-16:00

Attributes Centric Identity Architecture
Fulup Ar Foll, KuppingerCole

After so many years of conflict, the war in between authentication protocols finally ended. While there is no clear winner, the only three survivors (SAML2, OpenID & InfoCard) have established an informal "armistice", where each claims to be more complementary than competitors. The industry, as well as customers, can easily sustain three protocols. Today any significant software implementation bridges the remaining protocols seamlessly. While this scenario may not be perfect,...

Improving the Security and Usability of OpenID
Ariel Gordon, Microsoft

OpenID has gained significant popularity as an Internet identity system. Nonetheless, its adoption has been limited by usability and security issues. It has been widely speculated in the community that one of the ways that we can make OpenID more usable and safer is with the introduction of an active client to assist the user with his logon experience. In this session, we will describe the results of a community collaboration to develop an experimental multi-protocol version of Windows...

Regain Control of Your Perimeter in the Cloud

Date: Wednesday, May 05, 2010 Time: 16:30-17:30

Regain Control of Your Perimeter in the Cloud
Dr. Babak Sadighi, Axiomatics AB • Blake Dournaee, Intel

The traditional concept of an in-house data center behind a static corporate firewall is history once and for all. The enterprise is now in full embrace of dynamic applications provided and scaled by dedicated cloud service providers. To innovate faster, regain control, and compete in a new world that is shifting from a "need to know" to "need to share" paradigm requires a new focus on security and authorization in a dynamic perimeter. This dynamic perimeter spans hybrid...

Claims Based Identity and the Cloud
Vittorio Bertocci, Microsoft

One of the many advantages of claims-based architectures is that they abstract away the details of their components, including where things are hosted. As long as services and identity providers are network-addressable, they can live on-premises and in the cloud and easily move between the two environment without changing the emerging properties of the system. The immediate advantage is that existing identity providers, typically on-premises, are readily available for the new applications in...

Quick Links

Stay Connected

Information

Congress

European Identity Conference 2010

Language:
English
Registration fee:
€1980.00 $2376.00
Mastercard Visa PayPal Invoice
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 04 - 07, 2010 Munich

Partners

The European Identity Conference 2010 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00