• TYPE: Combined Session DATE: Wednesday, 05/05/2010 TIME: 16:30-17:30 LOCATION: Antares




The traditional concept of an in-house data center behind a static corporate firewall is history once and for all. The enterprise is now in full embrace of dynamic applications provided and scaled by dedicated cloud service providers. To innovate faster, regain control, and compete in a new world that is shifting from a “need to know” to “need to share” paradigm requires a new focus on security and authorization in a dynamic perimeter. This dynamic perimeter spans hybrid models that seamlessly mix local applications and cloud services. This is irrelevant to the end user – they need SSO and AuthZ based on their need to share regardless of where the app is delivered. Administrators shouldn’t be forced to duplicate ids in the cloud – they want to maintain authoritative ids and policies from centralized decision points. And service providers do not have the expertise or desire to manage security. Service Gateways when combined with ABAC Attribute-based Access Control engines deliver a ready on-premise or cloud outsourced service to regain control of security within the virtualized data center.


Blake is currently the product manager responsible for Intel SOA products. As a product manager at Sarvega, he was deeply involved in the development of their flagship XML security, routing and acceleration appliance products. Blake was a specialist in applied cryptography applications at RSA…

Babak Sadighi has a PhD in Computer Science from Department of Computing, Imperial College, London. He was   until august 2008, a researcher at the Swedish Institute of Computer Science and the leader of Computer Security Laboratory at that institute. Babak has many years of R&D…

One of the many advantages of claims-based architectures is that they abstract away the details of their components, including where things are hosted. As long as services and identity providers are network-addressable, they can live on-premises and in the cloud and easily move between the two environment without changing the emerging properties of the system. The immediate advantage is that existing identity providers, typically on-premises, are readily available for the new applications in the cloud; on the long term, claims-based identity is a key enabler for incorporating the choice of deploying to the cloud in your current arsenal of IT tools. With claims-based identity, the cloud requires no special arrangements: things can fluidly move from distributed to centralized, following your own requirements and management style.


Vittorio Bertocci is an Architect Evangelist in the service of Windows Server Evangelism for Microsoft. He is based in Redmond, Washington. He works with Fortune 100 and major G100 enterprises worldwide, helping them to stay ahead of the curve and take advantage of the latest unreleased…

Quick Links

Stay Connected

.hide_price { display: none; }.show_price { display: inline; }$(document).ready(function(){ $(“button”).click(function() { $(“p”).removeClass(“intro”); }); //$(“#price_eur”).click(function (e) $(“[id^=’price_’]”).click(function (e) { var thisID = this.id; //$(this).text(thisID); $(“span[id^='” + thisID + “‘]”).removeClass(“hide_price”).addClass(“show_price”).siblings().removeClass(“show_price”).addClass(“hide_price”); });});



European Identity Conference 2010

Registration fee:
€1980.00 €1980.00

Contact person:
Mr. Levent Kara
+49 211 23707710
  • May 04 – 07, 2010 Munich
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.