Wednesday, April 16, 2008 | 5:30PM–6:30PM | Assembly Room
Session Type:
Professional Development
Having PKI-authenticated applications is not enough. In this session, we will discuss how applications have been PKI enabled and how they have been accepted and used. You will hear from institutions that have implemented and maintain multiple applications that are PKI authenticated and are well accepted by their user community.
Presenters
Jim Jokl
AVP and Chief Enterprise Architect, University of Virginia
Mark Jones
Senior Manager, Systems Analysis and Programming, The University of Texas Health Science Center at Houston