MAR 14, 2008 4:31am ET

Related Links

DDoS Attacks Are Still Happening — and Getting Bigger
July 29, 2014
Five Ways Banks Can Defeat Mobile Malware
July 10, 2014
Private Cloud Vendors Hold Lion’s Share of Market
July 10, 2014

Web Seminars

How Intelligent Digital Self-Service with Customer Analytics Can Lower Costs and Raise Revenue
Available On Demand
Improve Omni-channel Shopping Experience with Product Information Management
August 21, 2014

IBM Addresses Web 2.0 Security Concerns with SMash

Print
Reprints
Email

March 13, 2008 - IBM announced new technology to secure mashups, Web applications that pull information from multiple sources, such as Web sites, enterprise databases or emails to create one view.

 

IBM's SMash, short for secure mashup, allows information from different sources to talk to each other, but keeps them separate so malicious code cannot creep into enterprise systems.

 

In order to give consumer and business users the opportunity to take advantage of mashup technology, IBM is contributing the SMash technology to the OpenAjax Alliance. The OpenAjax Alliance is an organization of vendors, open source projects and companies using Ajax that are dedicated to the successful adoption of open and interoperable Ajax-based Web technologies.

 

"Web 2.0 is fundamentally about empowering people and has created a societal shift in the way we organize, access and use information," said Rod Smith, IBM fellow and vice president. "Security concerns can't be a complete inhibitor or clients lose out on the immense benefit mashups bring."

 

SMash addresses browser mashup security by keeping code and data from each of the sources separated, while allowing controlled sharing of the data through a secure communication channel. Performance evaluations have shown that SMash can be used in common enterprise mashup applications.

 

IBM plans to include SMash technology in select WebSphere products as well as its commercial mashup maker, Lotus Mashups. IBM Lotus Mashups is IBM's first commercial mashup maker for business.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Filed under:

Advertisement

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.