Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.
ACM News Service: Identity Management, Access Specs Are Rolling Along. Greg Goth, in a February 2005 IEEE Internet Computing article observes how authentication (Liberty Alliance style) and Security Assertions (SAML 2.0 style) are going to be integrated. There are three assertions of special interest: (1) assertion of an identity claim, (2) attributon of user-specific details, and (3) authorization of particular privileges.
It looks like there are the usual "standards"-group and sponsoring-organization rivalries at work here. What's important for me is to see how this aspect of SAML 2.0 is adaptable to TROSTing in a disintermediated way. I'm looking for a general system that does not require a specific single approach to authentication, especially for PKI.