The XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read moreTag: security
What is Authentication?
I’ve talked about authentication many times on ThinkMiddleware.com. It recently occurred to me that I have never devoted a blog[…]
Read moreShrewSoft VPN Client Has Problem After Windows 7 Laptop Sleeps with VPN Active
A few months ago I switched from using Cisco’s QuickVPN software to the ShrewSoft VPN Client for Windows. I’m not[…]
Read moreDataPower Appliances & HSMs
I’ve been in a couple of shops that have used the HSM module option of DataPower for FIPS 140-2 v2[…]
Read moreJBoss World 2012 Session…
I will be presenting at JBoss World 2012 in Boston the last week of June. I’ll be presenting with Anil[…]
Read moreSOA Security Reading Material
At nearly every client site, I’m asked to put together a recommended reading list on a variety of subjects. Web[…]
Read moreSecure Identity Propagation using WS-Trust, WS-Security, and SAML2
I gave the following presentation at IBM Impact in April, 2011. This session will explore hypothetical requirements for a secure[…]
Read moreServlet Container Authentication
There are three required authentication mechanisms supported by a compliant Servlet Container: HTTP Basic Authentication, Form-based Authentication, and CLIENT_CERT authentication. This article describes Servlet Container authentication.
Read moreJBossWorld 2010 Session — Securing JBoss Services
On June 24, 2010, I gave a presentation at JBoss World in Boston. This was my second time at JBoss[…]
Read moreMasters Project Defense
On November 29, 2007, I gave my Masters Project Defense before Dr. Chris Gill, Dr. Cindy Grimm, and Dr. Roger[…]
Read more