Nothing better that coming back from blog hibernation than dishing out a layer cake. Since our new web guard just ate my description of this model, I will include a more detailed explanation later.
Author: Gerald Beuchelt
Today, we released the hData technical specifications: hData Record Format and hData Packaging and Network Transport. This is the mail that went out to the mailing lists: Today we are releasing the first public version of the hData specification for…
Marc just made my day by sending me the link to the official submission of WADL to the W3C. Quick background: WADL (Web Application Description Language) is a simple interface definition language, specifically targeted at RESTful applications. It is significantly…
IBAC, RBAC, ABAC … a lot of folks in identity land are currently investigating authorization models with a little more scrutiny. Mark Dixon has a nice piece up on his blog, covering some of the current trends in the commercial…
Our effort to improve electronic health data exchange is starting to pick up some steam: After a very successful rounds of discussions at the HL7 General Plenary in Atlanta in late September (kudos to Andy Gregorowicz for covering this one)…
I liked Bob Blakey’s recent article on privacy, along with the paper he and Ian Glazer published. One direction that might need some additional coverage at some time is the “privacy of organizations”. Organizational sensitive data (such as trade secrets…
Interesting news this week: Microsoft, SAP, and Siemens have been awarded the SAML interoperable certification for their SAML 2.0 products for the first time. From a customer perspective this excellent news – cross-vendor certifications by independent third parties are a…
My town (Burlington, MA) has just revived the Information Systems Advisory Committee (ISAC) to assist in the alignment of the school system’s and the administration’s IT departments. With many high-technology companies in town, the administration has been at the forefront…
In an earlier article I talked about data ownership – or lack thereof – at a low, technical level. There are three principal technical actors: the physical custodian, the logical custodian, and the data originator. This article deals with the…
User-centricity – often expressed in the “7 Laws of Identity” – has been a common theme in identity management for a while now. At the heart of these principles lies the desire to empower the end-users of a computer systems…