Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eric J. Barkie is active.

Publication


Featured researches published by Eric J. Barkie.


Ibm Journal of Research and Development | 2013

Mobile optimized digital identity (MODI): a framework for easier digital certificate use

Colm Malone; Eric J. Barkie; Benjamin L. Fletcher; N. Wei; A. Keren; Andrew P. Wyskida

Traditional authentication methods such as passwords no longer meet all the security requirements of todays enterprise. Digital certificates provide a much more secure, resilient alternative solution. However, digital certificates are cumbersome to use for an end-user and are complex to implement for a resource provider. In this paper, we describe the Mobile Optimized Digital Identity (MODI) framework, which aims to solve the logistical issues of using certificates as an authentication method for both the end-user and the resource provider. The MODI framework consists of three tightly integrated components that work in concert: a mobile device application (MDA), an authentication toolkit, and a trusted third-party the security broker (SB). With a dedicated MODI MDA, certificate deployment, maintenance, and use are greatly simplified for the end-user. The MODI authentication toolkit enables resource providers to easily integrate with the framework, thus shielding developers from needing any knowledge of digital certificates and their implementation. Using mobile devices, the end-user authentication tool allows the MODI solution to expand its scope beyond conventional network access to novel physical access scenarios with the aid of proximity scanning technologies such as near-field communication (NFC).


Archive | 2009

ASSISTING SERVER MIGRATION

Eric J. Barkie; R. S. Barros Ii James; Kamal Bhattacharya; Karen Cheng; Robert Filepp; Kevin D. Galloway; Nikolai Joukov; Jing Luo; Colm Malone; Birgit Pfitzmann; Brian Peterson; HariGovind V. Ramasamy; Kewei Sun; Norbert G. Vogl; David L. Westerman; Christopher C. Young


Archive | 2013

PUSHING SECURE NOTIFICATIONS TO MOBILE COMPUTING DEVICES

Eric J. Barkie; Benjamin L. Fletcher; Carlos Fonseca; Leslie S. Liu; Colm Malone; Min Wei


Archive | 2013

Authentication in virtual private networks

Eric J. Barkie; Benjamin L. Fletcher; Marco Pistoia; John Ponzo; Andrew P. Wyskida


Archive | 2013

Location-based domain name system service discovery

Yoni Amishav; Eric J. Barkie; Oded Dubovsky; Benjamin L. Fletcher


Archive | 2011

Systems and methods for generating and validating configuration files for computing devices

Eric J. Barkie; Gary Thomas Leonardi; Andrew P. Wyskida


Archive | 2013

Enhancing directory service authentication and authorization using contextual information

Eric J. Barkie; Benjamin L. Fletcher; Colm Malone; Andrew P. Wyskida


Archive | 2011

SYSTEMS AND METHODS FOR ESTABLISHING SECURE VIRTUAL PRIVATE NETWORK COMMUNICATIONS USING NON-PRIVILEGED VPN CLIENT

Eric J. Barkie; Benjamin L. Fletcher; Andrew P. Wyskida


Archive | 2015

USER AUTHENTICATION RELYING ON RECURRING PUBLIC EVENTS FOR SHARED SECRETS

Eric J. Barkie; Benjamin L. Fletcher; Andrew P. Wyskida


Archive | 2018

Method and System for Assigning Privileges in an Online Community of News Content Readers and Authors

Eric J. Barkie; Scott C. Bosworth; Benjamin L. Fletcher; Jacquelyn A. Martino

Researchain Logo
Decentralizing Knowledge