Authentication is the method a computer uses to ensure that you are who you say you are. Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots.
Functions with Internet Information Server to secure web sites. Includes live demo.
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details.
ZSentry two-factor authentication solution. Product information, white papers and contact details.
Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs.
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques.
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
Consortium promoting open standards-based identity management. Includes downloadable white papers and information on current projects.
Makers of several related products. Includes rationale as well as usage information.
Makers of both software and hardware systems. Demos, case studies and product information.
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us