Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

trustworthy time

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Unionís General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their usersí data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, thereís a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the userís expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoftís security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, itís Java thatís causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that Iím amazed it hasnít been done before! Weíll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: TRUSTe     Published Date: Aug 31, 2009
TRUSTe works to advance privacy and trust for a networked world. TRUSTe Privacy Seals help consumers click with confidence by guiding them to trustworthy Web sites. Thousands of Web sites rely on TRUSTe industry best practices to help them make the right decisions about privacy and protecting confidential user information. Most of the top fifty Web sites are certified to TRUSTe's leading practices, including Yahoo, Facebook, MSN, eBay, AOL, Disney, New York Times, Comcast and Apple. To learn more about internet privacy visit www.truste.com.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter
    
TRUSTe
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Search