Open Identity Summit 2014 focuses on identity management, cloud computing and data protection.
In the age of big data, industry 4.0 and cloud computing, IT security for enterprises and consumers is growing ever more important.
At the Open Identity Summit 2014, experts from these research fields will be joined by industry representatives with practical experience to present solutions for secure identity management and technologies designed to enhance data protection.
It is clear to see from recent data theft scandals, just how critical the subject IT security has already become for the business world. Robust identity management, in particular, plays a key role in the secure handling of data because it regulates who has access to what data – and how to ensure that those accessing the data really are who they claim to be.
This is of special concern when it comes to cloud computing. “For small companies, in particular, a server in the cloud can be much more secure than a proprietary network,” explains Dr. Heiko Rossnagel, who is responsible for the Open Identity Summit 2014 at Fraunhofer IAO.
Cloud computing is just one of the identity management topics that will be discussed at the Open Identity Summit from November 4 to 6, 2014. This forum will also consider legal and economic aspects, technologies that promote data protection, and open standards and interfaces.
By bringing together the viewpoints of both scientific experts and business practitioners, the summit can offer participants a holistic approach to these highly topical issues. The conference will kick off on the Tuesday with a SkIDentity project workshop.
The results of this project, which is sponsored by the German Federal Ministry of Economics and Technology, show how to bridge the gap between secure electronic IDs and existing cloud computing infrastructure. During the workshop, participants will be presented with a variety of demonstrators and have an opportunity to talk with practitioners in these areas.
From Wednesday onward, the Open Identity Summit will offer both a series of scientific lectures and a range of case-study presentations from industry representatives on selected topics. An accompanying exhibition will enable the attendees to get to know the latest solutions for identity management and IT security.
All of this – in combination with keynote speeches, specialist presentations and a panel discussion – will give the participants an ample opportunity to network with experts, providers and users.
The attendance fee for the entire conference is €545; those attending only the first two days will pay €345. The deadline for registration is October 29, 2014, with a discount for those registering before October 6.
70569 Stuttgart, Germany
Telefon: +49 711 970-2430
Juliane Segedi | idw - Informationsdienst Wissenschaft
Ecology Across Borders: International conference brings together 1,500 ecologists
15.11.2017 | Gesellschaft für Ökologie e.V.
Road into laboratory: Users discuss biaxial fatigue-testing for car and truck wheel
15.11.2017 | Fraunhofer-Institut für Betriebsfestigkeit und Systemzuverlässigkeit LBF
The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.
Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...
Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.
That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...
Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.
During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....
The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.
Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...
Pillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...
15.11.2017 | Event News
15.11.2017 | Event News
30.10.2017 | Event News
20.11.2017 | Earth Sciences
20.11.2017 | Earth Sciences
20.11.2017 | Life Sciences