Posted by Eric Sachs, Senior Product Manager, Google Security
Google’s participation in the Internet Identity Workshop (IIW) has grown from a few lone individuals at its founding in 2005 to fifteen Googlers at the last IIW. The reason for this growth is that as Google has started to provide more APIs and developer tools for our application hosting business, we have found that standards and interoperability for identity and security on the Internet are critical. Our engineers attend to discuss standards such as OAuth, OpenSocial, OAuth, SAML, Portable Contacts, as well as longer term trends around discovery, malware, phishing, and stronger authentication. Another major topic is the usability of these technologies, which we summarized in a blog post after the last IIW.
We hope that other companies and individuals working in these areas will register to attend IIW 2009a and start building momentum for another great event. If you attended either the Facebook hosted UX summit in Feb 2009 or the Yahoo hosted UX summit in Oct 2008, you can join in further discussions on those topics at the upcoming IIW.
Google attendees: Dirk Balfanz, Nathan Beach, Breno de Medeiros, Cassie Doll, Brian Eaton, Ben Laurie, Kevin Marks, John Panzer, Eric Sachs, and more to come
I'm an avid user of your site and know that you like to be on the leading edge when it comes to innovative technologies. I'd like to see you support OpenID (http://openid.net). I suppose you are big, well known and accepted enough so I could use and OpenID registered at Google.
ReplyDeleteWith OpenID I'm able to come to your site and many others, sign-in with my OpenID, removing the need to create yet another username and password.
We are facing to new threats every day. A one attacker can damage the whole internet in one day. So the internet community should together to prevent such attacks and improve the security.
ReplyDeleteSrilanka Security
I think almost all of internet users are consider about online security.
ReplyDeleteI believes that every person must use any protection methods to avoid any malware attacks.
Cyber realm
You have done a marvelous job! I am really inspired with your work.
ReplyDelete