Back to Results
First PageMeta Content
Federated identity / Identity management / Identity management systems / WS-Trust / Web services / WS-Security / Security token / Access token / WS-Federation / Computer security / Security / Computing


Document Date: 2007-01-15 16:48:43


Open Document

File Size: 442,72 KB

Share Result on Facebook

Company

IBM / Indirect Brokered Trust / OpenNetwork Technologies Inc. / VeriSign Inc. / Reactivity Inc. / Oblix Inc. / Direct Brokered Trust / RSA Security Inc. / Computer Associates International Inc. / Microsoft Corporation / Layer 7 Technologies / International Business Machines Corporation / Actional Corporation / Ping Identity Corporation / BEA Systems Inc. Computer Associates / /

Event

Patent Issuance / /

IndustryTerm

symmetric key algorithms / Web services trust specification / security protocol / security token services / security solution / explicit fixed security protocols / cryptographic algorithm / application-specific protocols / Web service / Web services framework / Web service security model / legacy protocol / recipients using network / compliant services / Web services environment / asymmetric key algorithms / challenge-response protocol / security protocols / Web Services / /

Organization

Security Token Service / Token Service / /

Person

Anthony Nadalin / Rob Philpott / Doug Walter / Hiroshi Maruyama / Phillip Hallam-Baker / Steve Anderson / Hal Lockhart / Darren Platt / Brendan Dixon / Andrew Nash / Elliot Waingold / Maryann Hondo / David Waite / John Shewchuk / Chris Kaler / Giovanni Della-Libera / Martin Gudgin / Secrecy Appendix II / Riaz Zolfonoon / Robin Martherus / Dan Simon / Jeff Bohren / /

Position

Editor / broker / Trust Bootstrap An administrator / Forward / /

Product

Microsoft Corporation Portable Audio Device / /

ProgrammingLanguage

XML / /

Technology

challenge-response protocol / XML / legacy protocol / 1 Ephemeral Encryption / explicit fixed security protocols / security protocols / secret key / symmetric key algorithms / SSL / cryptographic algorithm / Encryption / security protocol / public key / digital signature / application-specific protocols / asymmetric key algorithms / /

URL

http /

SocialTag