MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
New Architect
July 2002
Paul Sholtz
Directory Integration Using directory services to successfully manage partner relationships mark for My Articles similar articles
D-Lib
Jan/Feb 2010
Reilly & Tupelo-Schneck
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. mark for My Articles similar articles
D-Lib
Jul/Aug 2002
Mairead Martin
Federated Digital Rights Management A proposed drm solution for research and education. mark for My Articles similar articles
D-Lib
June 2006
Teets & Murray
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. mark for My Articles similar articles
D-Lib
September 2000
Judith Pearce
Directories of Libraries and Related Organizations This paper describes data standards work currently in progress to support the deployment of directories of libraries and related organizations in a networked information services environment. mark for My Articles similar articles
InternetNews
July 8, 2005
Mike Harwood
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. mark for My Articles similar articles
D-Lib
April 2006
Norman Paskin
Identifier Interoperability: A Report on Two Recent ISO Activities There are increasing demands for metadata interoperability in both the commercial media and library sectors, and the semantic interoperability technology developed from the <indecs> model has a role to play in addressing these. mark for My Articles similar articles
D-Lib
Jan/Feb 2011
Michener et al.
DataONE: Data Observation Network for Earth -- Preserving Data and Enabling Innovation in the Biological and Environmental Sciences DataONE is being designed and built to provide a foundation for innovative environmental research that addresses questions of relevance to science and society. mark for My Articles similar articles
D-Lib
October 2007
Adam J. Smith
Developing Handle System(R) Web Services at Cornell University Recognizing the importance of consistently implementing persistent identifiers (PIDs), a group of librarians at Cornell University evaluated several PID strategies and chose to use the Handle System. mark for My Articles similar articles
New Architect
January 2003
Amit Asaravala
A Question of Identity Passport, Liberty, and the single sign-on race mark for My Articles similar articles
D-Lib
February 2009
Nicholas et al.
A Policy Checklist for Enabling Persistence of Identifiers One of the main tasks of the Persistent Identifier Linking Infrastructure (PILIN) project on persistent identifiers was to establish a policy framework for managing identifiers and identifier providers. mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
JavaWorld
March 2003
Jian Zhong
From stove-piped projects to unified enterprise architecture A discussion of strategic considerations in developing an e-authentication service in enterprise environments, touching on e-authentication, e-signature, and an enterprise architecture (EA) approach for reusability and information sharing. mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
Information Today
January 21, 2008
Barbara Quint
But What About Corporate Authors? NISO Institutional Identifier Project Underway Thomson Scientific has joined an effort with the NISO to build an open standard for identifying institutions. The initial effort will focus on academic and research institutions, the kind often referred to in author affiliation or corporate author fields. mark for My Articles similar articles
D-Lib
March 2000
Paepcke, Brandriff, Janee, Larson, et al.
Search Middleware and the Simple Digital Library Interoperability Protocol "Search middleware" refers to protocols and associated software packages that enable information application writers to access information sources easily. mark for My Articles similar articles
D-Lib
Jul/Aug 2015
The DOI -- Twenty Years On This year was the 20th anniversary of 'The Armati Report' that led fairly directly to the creation of the Digital Object Identifier. Mark Bide takes a long view of the accomplishments of the last twenty years as well as the challenges that remain. mark for My Articles similar articles
D-Lib
January 2003
Norman Paskin
On Making and Identifying a "Copy" The purpose of this article is to explore some of the conceptual issues of "making a copy" digitally and in an automated DRM environment which need to be clarified to enable rights expression languages and other DRM tools to deal with the concept of copying. mark for My Articles similar articles
InternetNews
September 30, 2005
Clint Boulton
'Hot Pluggable' One Key For Oracle Middleware President Chuck Phillips and Co. say Oracle's middleware can work with products from disparate vendors. mark for My Articles similar articles
JavaWorld
August 2001
Todd Sundsted
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
Military & Aerospace Electronics
June 2007
John Keller
Software Middleware Providers Acknowledge the Need for Security and Safety Middleware bridges the gaps between different software applications and different sets of hardware. Now, middleware is beginning to bridge the gaps between different levels of systems security. mark for My Articles similar articles
Military & Aerospace Electronics
April 2007
John Keller
Developers of Real-Time Embedded Software Take Aim at Code Complexity Safety, security, reliability, and performance dominate the discussion of real-time embedded operating systems as software developers aim for multiprocessor architectures with smaller size, lighter weight, and lower power consumption. mark for My Articles similar articles
JavaWorld
February 2002
Todd E. Sundsted
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? mark for My Articles similar articles
InternetNews
November 18, 2005
Clint Boulton
Wading Through 'Spaghetti Code' The IBM Way IBM researchers are developing a new type of messaging middleware system, called Smart Middleware Light Ends (SMILE), to simplify the integration of applications from different vendors. mark for My Articles similar articles
InternetNews
February 28, 2005
Roy Mark
Feds Approve New Smart Card Standards Federal employees and government contractors will eventually be given cards with digital photos and fingerprints. mark for My Articles similar articles
InternetNews
February 13, 2006
Sean Michael Kerner
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. mark for My Articles similar articles
CIO
September 1, 2002
Ben Worthen
Web Services: Still Not Ready for Prime Time The Next Hyped Thing is starting to show its age. Time for a reality check of what Web services can and cannot do. mark for My Articles similar articles
InternetNews
September 21, 2004
Ryan Naraine
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. mark for My Articles similar articles
Bank Technology News
June 2004
Karen Krebsbach
Firms Flirt with Out-of-Band Authentication Banks weigh whether this cumbersome technology is worth the bother for consumers, particularly for on-line banking. mark for My Articles similar articles
Bank Systems & Technology
May 26, 2010
Matt Gunn
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. mark for My Articles similar articles
InternetNews
September 14, 2009
Managing Linux and Mac Fileshares in Windows It's an Active Directory world, but now Linux and Mac users can join in with new open source software. mark for My Articles similar articles
InternetNews
May 10, 2007
Andy Patrizio
Oracle Offers AJAX Bits, New SOA Framework Oracle is jumping into AJAX in a big way with news it would donate more than 80 AJAX components to the Apache Software Foundation under an open source license. mark for My Articles similar articles