PKI-Enabled Applications That Work

Wednesday, April 16, 2008 | 5:30PM–6:30PM | Assembly Room
Session Type: Professional Development
Having PKI-authenticated applications is not enough. In this session, we will discuss how applications have been PKI enabled and how they have been accepted and used. You will hear from institutions that have implemented and maintain multiple applications that are PKI authenticated and are well accepted by their user community.

Presenters

  • Jim Jokl

    AVP and Chief Enterprise Architect, University of Virginia
  • Mark Jones

    Senior Manager, Systems Analysis and Programming, The University of Texas Health Science Center at Houston
  • Linda Pruss

Resources & Downloads