Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Cory Benfield discusses the evolution of ...
Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
Authentication has been a part of digital life since MIT set up a password on their shared-access computer in 1961. Today, authentication covers virtually every interaction you can have on the ...
What kind of value will a financial institution get for its investment in strong authentication? For FIs, it’s become a burning question, thanks to federal guidance that recommends they boost the ...
That’s where two-factor authentication services come into play. Years ago, vendors came out with hardware-based two-factor authentication: combining a password with a token that generates a one-time ...
The authors evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set of twenty-five usability, deploy ability and security ...
This paper explains how to use the Java Authentication and Authorization API (JAAS). It plugs JAAS into the Struts framework. Though this paper focuses on Struts, and in particular the example ...