General pattern of protocol flow in OAuth and CX Artifact Binding is almost identical. Just to assist the OAuth people to understand CX easily, here…
View More Relationship between OAuth and CX, and OAuth vulnerabilityMonth: April 2009
Contract Structure and System Identity
I had a talk with ProtectServe folks yesterday and it inspired something about what Contract has to have. Until the meeting, the basic items that…
View More Contract Structure and System IdentityKantara Initiatve Launch
Yes! Finally! Kantara Initiative is LIVE. Kantara Initiative is a Bridging and harmonizing the identity community with actions that will help ensure secure, identity-based, on-line…
View More Kantara Initiatve LaunchRisk based security decisions and CX
I had a two hours talk with Andrew Nash Friday Afternoon around the security of assertion based technologies. It was a very productive meeting and…
View More Risk based security decisions and CXIncreasing Members of OpenID Japan
When OpenID Japan formally started in October 2008, the number of the companies that joined it was 32. Thereafter, companies continued to join in and…
View More Increasing Members of OpenID Japan