jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

14.06.2018
Microsoft Active Directory Anomalies 12:11:52 jim
LDAP Result Codes 12:06:06 jim
Tips using UnboundID LDAP SDK 12:04:57 jim
PS_TOKEN 12:02:47 jim
Server-Side Login throttling schemes 12:00:08 jim
LDAP Connection Maintenance 11:58:19 jim
Standards Based SSO 11:57:37 jim
HttpSessionTimeout 11:56:07 jim httpSessionTimeout ==> HttpSessionTimeout
2.16.840.1.113719.1.3.4.7 11:55:59 jim
LdapServerIdleTimeout 11:51:31 jim
LDAP_TIMEOUT 11:50:56 jim
LDAP_TIMELIMIT_EXCEEDED 11:50:33 jim
LDAP Client Error And Result Codes 11:49:45 jim
13.06.2018
Web Blog_blogentry_030618_1 12:02:29 jim
Measure What Matters 11:57:11 jim
Independent Identity 11:41:12 jim
Decentralized Identity 11:40:42 jim
Hyperledger Indy 11:31:29 jim
DicAppData 11:27:44 jim dicAppData ==> DicAppData
Schema Modifications 11:26:08 jim
1.3.6.1.4.1.8876 11:23:58 jim
1.3.6.1.4.1.8876.2.2.5 11:23:31 jim Schema-willeke ==> Willeke Schema
DicPersonInfo 11:23:31 jim Schema-willeke ==> Willeke Schema
LDAP Schema 11:23:31 jim Schema-willeke ==> Willeke Schema
LDAPAttributetypesWillekeBranchStart 11:23:31 jim Schema-willeke ==> Willeke Schema
Willeke Schema 11:23:30 jim Schema-willeke ==> Willeke Schema
How To Get Your Own OID 11:16:23 jim LDAPAttributetypesBranchStart ==> LDAPAttributetypesWillekeBranchStart
1.3.6.1.4.1.8876.2.1.6 11:12:18 jim
DateOfBirth 11:11:48 jim dateOfBirth ==> DateOfBirth
Date Of Birth 11:06:05 jim
Identification 11:05:10 jim
Attribute 11:04:36 jim
Relationship 11:04:10 jim
Agent 11:03:38 jim
Kubernetes 10:02:40 jim
CNCF 09:57:41 jim
Cloud Native Computing Foundation 09:57:26 jim
Protobuf 09:55:33 jim
Protocol Buffers 09:55:16 jim
Google Remote Procedure Call 09:46:04 jim
UK Open Banking 08:44:12 jim
12.06.2018
Web Blog_blogentry_120618_1 16:39:51 jim
Entitlement 15:45:15 jim
MsDS-UserPasswordExpiryTimeComputed 10:53:13 jim
Date Form 10:44:02 jim
Time 10:42:49 jim
Date 10:40:02 jim
LargeInteger Date 10:39:22 jim
FILETIME 10:38:30 jim
Microsoft TIME 10:37:53 jim
LargeInteger 10:35:39 jim FILETIME ==> LargeInteger Date
AccountExpires 10:35:38 jim FILETIME ==> LargeInteger Date
DirXML Code Snippets 10:35:38 jim FILETIME ==> LargeInteger Date
PwdStartTime 10:20:22 jim
LoginActivationTime 10:19:46 jim
Account Expiration 10:15:16 jim
1.2.840.113556.1.4.159 10:12:17 jim
11.06.2018
OpenID Foundation 22:51:22 jim
Request For Comment 22:41:32 jim
Ndstrace 12:22:19 jim
Ndstrace Log Searches 12:21:38 jim Ndstrace Searches ==> Ndstrace Log Searches
EEA 10:03:38 jim
European Economic Area 10:03:05 jim
Payment Service Provider 10:01:30 jim
Payment Services Directive 09:59:37 jim
Account Servicing Payment Service Provider 09:15:39 jim
Payment Service User 09:14:30 jim
Payment Transaction 09:12:14 jim
Account Information Service Provider 09:03:42 jim
Payment Initiation Service Provider 09:03:10 jim
Third Party Payment Service Provider 09:01:47 jim
Payment Initiation Service 09:00:36 jim
Account Information Service 08:56:04 jim
Account owner 08:54:49 jim
Bank 08:52:24 jim
Federal Reserve Bank 08:51:13 jim Banks ==> Bank
Federal Reserve Board of Governors 08:51:13 jim Banks ==> Bank
Federal Reserve Member Banks 08:51:13 jim Banks ==> Bank
Office of the Comptroller of the Currency 08:51:13 jim Banks ==> Bank
Clearing House Interbank Payments System 08:51:12 jim Banks ==> Bank
Depository Institutions Deregulation and Monetary Control Act of 1980 08:51:12 jim Banks ==> Bank
Electronic Identity Verification 08:51:12 jim Banks ==> Bank
Federal Deposit Insurance Corporation 08:51:12 jim Banks ==> Bank
Custodian 08:49:09 jim
Deposit Account 08:44:56 jim
Transaction Account 08:44:28 jim
10.06.2018
United States Visitor and Immigrant Status Indicator 10:49:35 jim
Advanced Fingerprint Identification Technology 10:12:09 jim
Integrated Automated Fingerprint Identification System 10:11:07 jim
TSDB 10:09:14 jim
Terrorist Screening Database 10:08:58 jim
Web Blog_blogentry_100618_1 10:04:55 jim
DOB 10:02:00 jim
The Automated Biometric Identification System 10:00:39 jim
NCIC 09:59:57 jim
National Crime Information Center 09:59:35 jim
Immigration Violator File 09:56:33 jim
United States Department of Homeland Security 09:52:00 jim
Repository for Individuals of Special Concern 09:51:13 jim
United States Customs and Border Protection 09:50:06 jim
Immigration 09:49:28 jim
REAL ID 09:48:06 jim
Driver License 09:47:06 jim
State Identification Number 09:40:07 jim
IDENT 09:19:27 jim
Government Data Store 09:16:56 jim
Homeland Advanced Recognition Technology 09:15:05 jim
HART 09:08:12 jim
09.06.2018
Web Blog_comments_290712_1 22:40:05 Danielwrold
Access Control 08:34:49 jim
06.06.2018
Expires_in 09:26:43 jim
SasUpdateLoginTimeInterval 07:04:34 Karl Making the Server chappter more readable
04.06.2018
OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens 14:30:31 jim
Mutual TLS Profiles for OAuth Clients 14:25:34 jim
Web Blog_blogentry_120218_1 14:25:09 jim Mutual TLS for OAuth Client Authentication ==> OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens
03.06.2018
Trust No One 17:44:24 jim
TNO 17:43:36 jim
Objectives and Key Results 17:36:54 jim
Nuclear fusion 10:17:23 jim
Energy Density 10:16:53 jim
USNO 09:45:48 jim
United States Naval Observatory 09:45:26 jim
Time And Epochs 09:43:52 jim
Year 1858 09:35:51 jim
OpenVMS 09:31:40 jim
Wikipedia 09:29:58 jim
System time 09:29:04 jim
Year 1582 09:24:48 jim
ISO 8601 09:22:17 jim
Year 1965 09:20:23 jim
TNBT 09:19:59 jim
The Next Big Thing 09:19:42 jim
OKR 09:08:04 jim
DNS Queries over HTTPS 08:22:49 jim
DoH 08:09:35 jim
DNS over HTTPS 08:09:18 jim
02.06.2018
Entitlement Example 15:18:41 jim
LDAP Searches 09:54:11 jim
Web Blog_blogentry_020618_1 08:28:27 jim
OAuth 2.0 Software Statement 08:24:49 jim
WebAuthn Attestation 08:12:45 jim
FIDO2 08:08:31 jim
Token Binding Protocol 08:06:11 jim
Client To Authenticator Protocol 08:02:14 jim
FIDO 07:56:11 jim
W3C WebAuthn 07:47:32 jim
01.06.2018
Identify and Authenticate access to system components 11:45:32 jim
Windows Logon 11:39:37 jim
Wendy 11:38:55 jim
Service Account 11:38:34 jim
Privileged User Management 11:38:02 jim
Privileged Access Management 11:37:44 jim
Policy Administration Point 11:37:29 jim
Local Administrative Accounts 11:37:06 jim
Kerberos Service Account 11:36:49 jim
Kerberos Forged Ticket 11:36:34 jim
Internal Attacker 11:35:49 jim
IDSA Integration Framework 11:33:55 jim
Emergency Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Privileged Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Elevated Token 11:32:43 jim
Domain Administrative Accounts 11:32:26 jim
Payment Card Industry Data Security Standard 11:20:05 jim
PCI Data Security Standard v3.2.1 11:00:27 jim
OpenID Provider Issuer Discovery 09:00:56 jim
OpenID Connect Federation Async 08:00:45 jim
OpenID Connect Federation 07:47:44 jim
31.05.2018
Management Information Base 16:07:50 jim
Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices using SMIv2 16:04:26 jim
RFC 2325 16:03:21 jim
Web Blog_blogentry_310518_1 16:02:12 jim
Hyper Text Coffee Pot Control Protocol 14:59:46 jim
HTCPCP-TEA 14:04:58 jim
HTCPCP 14:03:53 jim
RFC 2324 14:03:24 jim
RFC 7168 14:03:07 jim
HTTP 401 14:02:39 jim
HTTP 418 13:58:31 jim
HTTP 403 13:54:59 jim
HTTP Status Code 13:50:57 jim
OAuth Error 12:41:12 jim
Forbidden 12:05:37 jim
Microsoft Disk Operating System 11:55:49 jim
MS-DOS 11:54:34 jim
OSX 11:52:31 jim
US-ASCII 11:50:14 jim
American Standard Code for Information Interchange 11:49:41 jim
ASCII 11:49:07 jim
27.05.2018
Automated Teller Machine 09:48:56 jim
ATM 09:48:24 jim
EMV Terms 09:47:18 jim
Demand Deposit Account 09:37:57 jim
European Banking Authority 09:23:37 jim
EBA 09:22:27 jim
ProtectingIdentityBasedInformation 09:18:30 jim
General Data Protection Regulation 09:16:02 jim
26.05.2018
Access Control List 09:26:09 jim
CommonName 09:22:41 jim
Cn 09:14:00 jim
LDAP_SERVER_RANGE_OPTION_OID 08:56:03 jim
Anomaly 08:53:37 jim
25.05.2018
Trillion 10:46:44 jim
UCC 10:18:26 jim
GS1 Company Prefix 10:18:11 jim
Unique Country Code 10:17:23 jim
Uniform Commercial Code 10:09:36 jim
Electronic Payments Network 10:03:50 jim
Automated Clearing House 10:01:21 jim
Financial Settlement 10:00:39 jim
Clearing house 10:00:11 jim
Financial transaction 09:54:14 jim
Agreement 09:53:13 jim
Account 09:51:05 jim
Trustee 09:36:44 jim
Beneficiary 09:34:28 jim
Fiduciary Responsibility 09:31:26 jim
Resource 09:13:16 jim
Asset 09:11:16 jim
Data 08:57:01 jim
Cookie 08:46:41 jim
24.05.2018
Cryptographic Primitive 15:29:33 jim
Symmetric cipher 15:28:50 jim
Asymmetric cipher 15:28:29 jim
Cipher 15:24:25 jim
Involutory function 15:12:38 jim
Bitwise operation 15:10:48 jim
Function 15:07:10 jim
Cryptographic Collision 12:53:20 jim
Security 12:38:20 jim
Block cipher mode of operation 12:10:47 jim
Electronic Code Book 12:07:27 jim
ECB 12:03:35 jim
OAuth 2.0 Incremental Authorization 11:11:27 jim
Italy 10:07:37 jim
Japan 10:06:52 jim
Germany 10:03:40 jim
France 10:00:10 jim
Country Code 09:55:19 jim
Replacement fertility rate 09:51:35 jim
Web Blog_blogentry_240518_1 09:49:16 jim
23.05.2018
FIPS 202 12:31:48 jim
Extendable-Output Function 12:30:14 jim
XOF 12:14:58 jim
Secure Hash Algorithm 12:12:27 jim
RFC 4634 12:07:35 jim
RFC 6234 12:07:19 jim
FIPS 180 12:02:34 jim
Federal Information Processing Standard 11:56:18 jim
HMAC-SHA 11:53:18 jim
Requesting Attributes by Object Class 11:44:08 jim
RFC 4529 11:38:41 jim
Turn Operation 11:31:29 jim
RFC 4531 11:25:01 jim
RFC 4616 11:23:46 jim
EdirMIBTraps 11:21:40 jim
MIB 11:20:36 jim
EdirectoryMonitoringMIB 11:19:46 jim
RFC 2605 11:18:49 jim
RFC 2222 11:17:06 jim
Collective Attribute 11:16:28 jim
LDAP Server Standards and Specifications 11:14:54 jim
Network Information Service 11:05:33 jim
NIS 11:04:44 jim
KRACKs 11:01:44 jim
Key Reinstallation AttaCKs 11:01:27 jim
Wi-Fi Protected Access 2 11:01:12 jim
WPA2 10:54:18 jim
Public Wi-Fi 10:53:27 jim
Access Point 10:44:43 jim
Proxy Auto-Config 10:37:53 jim
Malicious PAC 10:34:24 jim
Web Proxy Auto-Discovery Protocol 10:32:21 jim
DHCP 10:29:13 jim
WPAD 10:27:30 jim
PAC 10:04:00 jim
Web Blog_blogentry_230518_1 10:03:27 jim
22.05.2018
WAR 13:52:02 jim
Jurisdiction 13:51:48 jim
Web Blog_blogentry_220518_1 13:35:54 jim
Year 2019 09:26:38 jim
21.05.2018
Michael B. Jones 12:50:56 jim
20.05.2018
Best Practices OpenID Connect 18:56:01 jim
OAuth 2.0 Security Considerations 18:55:41 jim
OAuth 2.0 Security Best Current Practice 18:55:26 jim OAuth Security Topics ==> OAuth 2.0 Security Best Current Practice
Blockchain 07:16:33 jim
17.05.2018
Security Token Service 09:10:43 jim
Architecture 09:08:38 jim
Enterprise Access Manager Product 09:03:33 jim
Identity and Access Management 09:01:34 jim
Security Token 08:28:49 jim
OAuth 2.0 Token Exchange 08:24:58 jim
Delegation vs Impersonation 08:19:16 jim
16.05.2018
Bank Secrecy Act 16:59:30 jim
Citizen 16:58:54 jim
Law of Consistent Experience Across Contexts 16:57:59 jim
Law of Pluralism of Operators and Technologies 16:56:46 jim
NOFORN 16:55:43 jim
AS_REQ 15:39:20 jim
AS_REP 15:39:02 jim
AP_REP 15:38:50 jim
TGS Exchange 15:14:58 jim
TGS_REP 15:13:55 jim
TGS_REQ 15:11:10 jim
Kerberos Cryptosystem Negotiation Extension 14:51:53 jim
AP_REQ 14:46:19 jim
Kerberos Encryption Types 14:25:06 jim
Negotiate SSP 14:10:01 jim
Kerberos Encryption Types/as_resp-kerberos.png 13:54:52 jim as_req-kerberos
Kerberos Encryption Types/as_req-kerberos.png 13:54:36 jim as_req-kerberos
Etype 13:46:36 jim
Kerberos Pre-Authentication 11:12:47 jim
DES3 10:37:55 jim
Triple DES 10:37:38 jim
NIST.SP.38 10:36:43 jim
Cipher-based Message Authentication Code 10:34:39 jim
CMAC 10:28:45 jim
MsDS-SupportedEncryptionTypes 10:26:51 jim
RFC 4757 10:24:08 jim
RFC 3962 10:22:44 jim
RFC 3961 10:21:41 jim
Cipher Suite 09:46:52 jim
Anonymous Cipher Suite 09:42:33 jim
TLS_NULL_WITH_NULL_NULL 09:41:55 jim
Cyclic Redundancy Check 09:38:10 jim
CRC 09:31:22 jim
SHA1 09:28:38 jim
Ciphertext stealing 08:50:29 jim
CTS 08:50:09 jim
MsDS-SupportedEncryptionTypes/MMC-msDS-SupportedEncryptionTypes.png 08:37:26 jim MMC-msDS-SupportedEncryptionTypes
1.2.840.113556.1.4.1963 08:33:20 jim
FLAG_ATTR_IS_CRITICAL 08:32:47 jim
SchemaFlagsEx 08:30:27 jim
X-SCHEMAFLAGSEx 08:25:17 jim
Web Blog_blogentry_160518_1 08:15:14 jim
14.05.2018
Marketing 09:11:57 jim
Account-Based Marketing 09:05:24 jim
Advertising 09:03:34 jim
Advertisement 09:03:14 jim
Product 09:01:47 jim
Goods 08:59:16 jim
Payment 08:55:48 jim
Advertising technology 08:47:35 jim
13.05.2018
Data processing 19:40:29 jim
Data In Process 19:29:34 jim
Adtech 19:09:08 jim
Web Blog_blogentry_130518_1 19:08:19 jim
BitShares 10:48:46 jim
USD 10:39:40 jim
DAC 10:27:54 jim
Decentralized Autonomous Corporation 10:27:24 jim
Decentralized Autonomous Organization 10:26:30 jim
OpenLedger 10:13:59 jim
BTS 10:10:14 jim
Data Ownership 08:39:39 jim
Possession Factor 08:25:07 jim
Control 08:20:22 jim
12.05.2018
Martin Hellman 20:41:15 jim
Whitfield Diffie 20:40:10 jim
Year 1975 20:39:03 jim
Diffie-Hellman 20:38:41 jim
Strict-Transport-Security 18:22:31 jim
HTTP Strict Transport Security 18:12:46 jim
Token Binding over HTTP 17:53:24 jim
Governance 08:56:22 jim
Federation 08:46:59 jim
Federated Identity 08:45:09 jim
Law of agency 08:42:10 jim
Data aggregator 08:35:25 jim
Data Pedigree 08:30:30 jim
Data Processor 08:27:57 jim
Actionable Intelligence 08:25:22 jim
Velocity 08:24:35 jim
Data Swamp 08:15:44 jim
Data Provenance 07:49:02 jim
11.05.2018
Username 11:25:55 jim
Password Validator 11:25:13 jim
Memorized secrets 11:03:27 jim
Verifier 10:44:32 jim
Verification 10:43:02 jim
Authentication 10:41:54 jim
Authenticator 10:36:28 jim
Life cycle 10:13:58 jim
NIST.SP.800-63 10:13:20 jim
NIST Electronic Authentication Guideline 10:11:50 jim
FIPS 199 10:08:56 jim
Personally Identifiable Information 10:06:27 jim
Magnitude of the Potential loss 10:03:50 jim
Data Security Impact 10:01:45 jim
NIST.SP.800-122 09:55:45 jim
HIPAA Covered Entity 09:44:26 jim
Patient 09:37:42 jim
Health Insurance Portability and Accountability Act 09:36:58 jim
United States Cryptography Export-Import Laws 09:29:12 jim
RSA_EXPORT 09:27:03 jim
Self-regulating Provisioning 09:25:23 jim
Financial Industry Regulatory Authority Inc 09:24:28 jim
Regulatory Risk 09:17:35 jim
Criminal action 09:15:36 jim
United States Federal Standard 09:14:48 jim
LdapStdCompliance 09:13:45 jim
2.16.840.1.113719.1.27.4.82 09:08:29 jim
Regulatory Burden 09:03:40 jim
Compliance Burden 09:01:58 jim
Compliance 08:57:52 jim
Regulatory compliance 08:51:20 jim
10.05.2018
NDSPKISDKeyServerDN 17:46:43 jim
SASSecurity 17:36:42 jim
NDSPKISDKeyAccessPartition 17:27:59 jim nDSPKISDKeyAccessPartition ==> NDSPKISDKeyAccessPartition
Key Access Partition 17:20:05 jim
SAS Data Flow Manager 17:06:17 jim
SASDFM 17:04:25 jim
SASService 16:59:39 jim
Data Processing Agreement 12:28:10 jim
Pseudonymization 12:22:50 jim
Data anonymization 12:22:26 jim
Data Controller 12:00:18 jim
Curators 11:58:28 jim
Data Collection 11:57:55 jim Content curation ==> Data curation
Data curation 11:57:55 jim Content curation ==> Data curation
Data subject 11:42:33 jim
09.05.2018
2.16.840.1.113719.1.48.4.1.9 15:09:03 jim
NDSPKIKeyMaterialDN 15:07:49 jim
NovellS Challenge Response System 15:03:19 jim
2.16.840.1.113719.1.1.4.1.120 15:00:56 jim
2.16.840.1.113719.1.39.6.1.2 14:55:13 jim
SAS 14:44:37 jim
Secure Authentication Services 14:44:19 jim
SASLoginSecretKey 14:35:48 jim
Software library 14:23:13 jim
Loadable Module 13:57:11 jim
NDSD Loadable Module 13:51:15 jim
Session Key 13:48:56 jim
Server Storage Key 13:45:07 jim
TreeKey 13:41:35 jim
SDI Key 13:38:36 jim
Security Domain Infrastructure 13:30:44 jim
NICISDI Keys 13:29:05 jim
NICI 13:21:23 jim
Niciext 12:34:38 jim
NDS Connection States 12:18:36 jim
NDSTRACE Examples 12:16:25 jim
NDS Threads 11:51:32 jim
Curses 11:21:40 jim
Utility 11:18:27 jim
ReplicaUpTo 11:03:46 jim replicaUpTo ==> ReplicaUpTo
RFC 8392 00:15:10 jim
CBOR Web Token 00:14:19 jim
08.05.2018
Open Source 14:08:26 jim
CTAP 13:47:16 jim
1.2.840.113556.1.4.805 11:04:33 jim
LDAP_SERVER_TREE_DELETE_OID 11:04:05 jim
Subtree Delete Control 11:02:36 jim
Deleted object 11:00:41 jim
1.2.840.113556.1.4.2058 10:53:23 jim
IsRecycled 10:52:55 jim
Deleted-objects 10:49:52 jim
Tombstone 10:48:34 jim
Recycled-object 10:47:48 jim
X-SYSTEMFLAGS 10:28:01 jim
SystemFlags 10:25:39 jim
FLAG_ATTR_IS_CONSTRUCTED 10:21:13 jim
FLAG_ATTR_REQ_PARTIAL_SET_MEMBER 10:20:43 jim
1.2.840.113556.1.2.48 10:13:23 jim
IsDeleted 10:13:07 jim
1.2.840.113556.1.5.72 10:02:32 jim
NTDSService 10:01:31 jim
1.2.840.113556.1.2.54 09:54:46 jim
TombstoneLifetime 09:54:29 jim
Microsoft Active Directory 09:40:12 jim
Mutual TLS 08:48:04 jim
How SSL-TLS Works 08:43:59 jim
JSON Web Token Best Current Practices 08:06:11 jim
07.05.2018
NICI Version 23:28:47 jim
NICI 3.0 23:28:24 jim
EDirectory Version 23:24:15 jim
Key server 23:14:17 jim
NICISDITreeKeyProviderFaultTolerance 23:12:21 jim
Universal Password 22:38:42 jim
NICITreeKeyProvider 22:33:55 jim
SDIDIAG 22:10:02 jim
DirXML Engine Version 18:16:45 jim
DirXML-DriverVersion 18:14:02 jim
Assurance Level 14:48:41 jim
Financial damage 14:45:53 jim
Real Risk 14:44:57 jim
Level Of Assurance 14:31:10 jim
High 14:04:25 jim
Moderate 14:03:51 jim
Low 14:03:20 jim
Level of Assurance (LoA) Profiles 13:58:50 jim
M-04-04 Level of Assurance (LOA) 13:48:41 jim
Evaluation Assurance Level 13:45:24 jim
Identity Ecosystem Framework 13:40:25 jim
Identity Assurance Framework 13:39:29 jim
Identity Assurance Level 13:38:44 jim
Best Practices for LDAP Security 13:36:24 jim
Privacy Considerations 13:34:26 jim
SSL-TLS Interception 13:32:46 jim
Contingency Planning 13:31:27 jim
Poodle 13:28:33 jim
Controlled Unclassified Information 13:22:55 jim
Risk Assessment 12:36:41 jim
Federation Assurance Level 12:21:14 jim
GOST 11:30:13 jim
Social Websites 11:28:51 jim
Russia 11:28:04 jim
Russian Federation 11:27:31 jim
Soviet Union 11:26:16 jim
CIS 11:21:35 jim
Commonwealth of Independent States 11:21:10 jim
RFC 4491 11:13:00 jim
RFC 4055 11:10:26 jim
EncipherOnly 11:03:09 jim
DecipherOnly 11:02:56 jim
CRLSign 10:59:18 jim
KeyAgreement 10:57:32 jim
ContentCommitment 10:55:59 jim
NonRepudiation 10:54:33 jim
PathLenConstraint 10:53:22 jim
CA Constraint 10:47:30 jim
Basic Constraints 10:43:31 jim
KeyCertSign 10:36:09 jim
KeyEncipherment 10:32:55 jim
DataEncipherment 10:32:10 jim
Key Management 10:31:01 jim Key Usage ==> KeyUsage
KeyUsage 10:31:01 jim Key Usage ==> KeyUsage
Certificate Extensions 10:30:48 jim
06.05.2018
DEA 10:58:44 jim
Drug Enforcement Administration 10:57:55 jim
United States Attorney General 10:56:50 jim
Attorney General 10:56:18 jim
VPOTUS 10:47:18 jim
Vice President of the United States 10:46:58 jim
United States Cabinet Department 10:42:38 jim
United States Congress 10:38:02 jim
United States Department of Education 10:31:49 jim
Family Educational Rights and Privacy Act 10:28:47 jim
Personal Information Protection and Electronic Documents Act 10:08:01 jim
Sarbanes-Oxley Act 10:06:25 jim
Protected Data 10:04:22 jim
Data Access Governance 10:03:48 jim
NIST.SP.800-53 09:58:22 jim
Controlled Technical Information 09:57:47 jim
Cardholder Data 09:56:17 jim
Federal Tax Information 09:54:26 jim
Export restrictions 09:53:52 jim
Protected Health Information 09:53:22 jim
Financial Data 09:52:44 jim
Data Classification 09:49:28 jim Data Constraint ==> Protected Data
FTI 09:40:50 jim
Commerce Control list 09:34:10 jim
EAR 09:34:05 jim
ECCN 09:27:20 jim
Export Control Classification Number 09:27:00 jim
CCL 09:24:16 jim
Export Administration Regulations 09:15:26 jim
Code of Federal Regulations 08:38:41 jim
Federal Register 08:34:34 jim
CFR 08:28:10 jim
Treatment, Payment and Health care Operations 08:24:16 jim
Health Care Provider 08:23:13 jim
Federal Acquisition Regulation 08:22:04 jim
FAR 08:17:09 jim
DFARS 08:10:49 jim
Defense Federal Acquisition Regulation Supplement 08:10:17 jim
CTI 08:06:47 jim
05.05.2018
Disclosure-Alteration-Destruction 11:33:30 jim
Data Loss Prevention 11:33:06 jim
DSI 11:31:50 jim
Availability 11:31:18 jim
Data loss 11:21:21 jim
Data Disposal 11:18:20 jim
Data Protection 10:31:05 jim
Data Management 10:20:40 jim
Information Rights Management 10:13:24 jim
DAD 09:53:03 jim
Identity Attributes 09:42:33 jim
Personal data 09:30:12 jim
04.05.2018
Sexual orientation 15:58:41 jim
Sex 15:58:34 jim
Gender 15:57:36 jim
Genome 15:53:56 jim
Genetic Data 15:51:51 jim
EC 15:49:18 jim
European Commission 15:48:59 jim
03.05.2018
Privacy Policy 11:42:42 jim
Cloud Access Security Broker 08:45:19 jim
02.05.2018
DunbarS Numbers 15:30:16 jim
Individual 15:11:52 jim
Community of Interest 15:07:31 jim
Society 15:06:59 jim
Creative Network 15:05:53 jim
Friends 14:55:01 jim
Tribe 14:53:51 jim
Megaband 14:53:32 jim
Hunter-gather 14:53:00 jim
Sympathy group 14:52:10 jim
Clique 14:51:35 jim
Social contract 14:44:17 jim
If men were angels 13:23:39 jim
Web Blog_blogentry_020518_1 13:21:55 jim
Bruce Schneier 13:13:25 jim
Liars and Outliers 13:02:34 jim
Trust 12:26:01 jim
NIST Special Publication 09:26:54 jim
Menezes-Qu-Vanstone 09:26:02 jim
Key-Exchange 09:23:05 jim
Key-Establishment 09:20:25 jim
NIST.SP.800-56A 09:17:05 jim
ECMQV 09:11:01 jim
HMQV 09:07:00 jim
MQV 09:04:45 jim MenezesQuVanstone ==> Menezes-Qu-Vanstone
Fully Hashed Menezes-Qu-Vanstone 08:59:51 jim
FHMQV 08:54:24 jim
Elliptic Curve Menezes-Qu-Vanstone 08:53:05 jim
Elliptic Curve 08:47:03 jim
Attack Effort 08:32:35 jim
Cryptanalysis 08:31:08 jim
Key size 08:28:29 jim
01.05.2018
Hash Function Security 09:31:41 jim
Cryptographic Hash Function Comparrison 09:30:19 jim
Hash Function 09:22:32 jim
Key 09:17:35 jim
NIST.SP.800-107 09:11:42 jim
Secret-key 09:06:16 jim
Keying material 09:04:15 jim
Key agreement 08:56:55 jim
Shared Secret 08:54:28 jim
Key Derivation Function 08:46:23 jim
NIST.SP.800-70 08:35:21 jim
Collision Resistance 08:26:15 jim
Second Preimage Resistance 08:25:42 jim
Preimage Resistance 08:19:55 jim
Message-Digest 08:17:47 jim
30.04.2018
Yadis ID 17:09:16 jim
Yet Another Distributed Identity System 17:08:21 jim
Drummond Reed 16:53:28 jim
EXtensible Data Interchange 16:51:55 jim
XDI 16:50:06 jim
Respect Network CORP 16:48:36 jim
Respect Trust Framework 16:42:13 jim
Evernym INC. 16:40:35 jim
Sovrin 16:34:32 jim
Decentralized Public Key Infrastructure 16:33:03 jim Evernym ==> Evernym INC.
Web of Trust 16:19:29 jim
DKMS 16:16:15 jim
Decentralized Key Management System 16:15:59 jim
29.04.2018
WS-Specifications 10:04:40 jim
Web Services Distributed Management 10:02:05 jim
WSDM 10:01:35 jim
Web Services Resource Framework 10:00:06 jim
WSRF 09:56:20 jim
Web Services Federation 09:54:10 jim
WS-Trust 09:52:51 jim
Web Services Security 09:52:32 jim
Business Process Execution Language 09:51:50 jim
Web Services Addressing 09:50:58 jim
WS-Addressing 09:49:00 jim
Identity Web Services Framework 09:43:56 jim
Circle of Trust 09:36:45 jim
IAF 09:31:21 jim
Openliberty.org 09:24:10 jim
Identity Governance Framework 09:18:38 jim
Liberty Alliance 09:11:17 jim
ID-FF 09:00:55 jim
Identity Federation Framework 09:00:38 jim
Standard compliance 08:53:56 jim
Regulatory technology 08:52:59 jim
Governance Risk Management And Compliance 08:50:40 jim
RegTech 08:28:06 jim
Web Blog_blogentry_290418_1 08:27:31 jim
28.04.2018
Help Desk 09:18:01 jim
Employee Badge 09:16:05 jim
Knowledge-Based Authentication 09:13:50 jim
KBV 08:50:56 jim
Knowledge-Based Verification 08:50:37 jim
NIST.SP.800-63-3 08:45:18 jim
27.04.2018
CaseIgnoreIA5SubstringsMatch 10:07:39 jim
1.2.840.113556.1.4.803 10:06:58 jim
MatchingRule 10:02:48 jim
CaseIgnoreListMatch 09:59:57 jim
2.5.13.11 09:56:58 jim
Bitmask 09:53:05 jim
1.3.6.1.4.1.1466.109.114.3 09:49:14 jim
TRUE 09:42:54 jim
1.3.6.1.4.1.1466.109.114.2 09:42:10 jim
CaseIgnoreIA5Match 09:41:20 jim
LDAP Internationalized String Preparation 09:38:16 jim
RFC 4510 09:36:38 jim
LDAPSyntaxes 09:16:55 jim
LDAP Syntaxes and Matching Rules 09:15:09 jim
Simple Authentication 08:39:16 jim
26.04.2018
AuxiliaryClassFlag 22:33:27 jim
KnowledgeInformation 22:31:09 jim
Token68 14:37:08 jim
Hexadecimal 14:33:49 jim
Base16 14:33:31 jim Base 16 ==> Base16
Web Blog_blogentry_260418_1 14:30:22 jim
23.04.2018
Intruder Detection 21:01:22 jim
Account Restrictions 21:00:30 jim
Managed Service Account 20:58:27 jim
Security Account Manager 20:53:26 jim
Computer account 20:50:41 jim
Account Inactivity 20:49:53 jim
Application Accounts 16:00:08 jim
Protocol Vulnerability 15:37:59 jim
Implementation Vulnerability 15:37:45 jim
Vulnerability 15:35:15 jim
Web Blog_blogentry_230418_1 15:24:06 jim
Malicious Software 15:22:24 jim
Thread 15:18:14 jim
Buffer overflow 15:15:34 jim
SQL Injection 15:10:38 jim
Phishing 15:05:50 jim
Credential Reuse 15:02:07 jim
Password Generator 14:58:47 jim
SQLi 14:48:02 jim
Page Fault 14:20:08 jim
Swap Space 14:18:18 jim
Virtual Memory 14:05:35 jim
International System of Units 08:33:49 jim
ISO 80000 08:14:17 jim
Byte 08:13:23 jim
SI 08:08:04 jim
ISQ 07:53:33 jim
Seconds 07:52:57 jim
International System of Quantities 07:50:31 jim
21.04.2018
Kibibyte 11:55:33 jim
Terminology for Constrained-Node Networks 11:52:32 jim
KiB 11:50:19 jim
Device Flow 08:28:51 jim
Zero Trust 08:04:35 jim
20.04.2018
DevOps 08:17:08 jim
Increment 08:14:32 jim
Release Management 08:13:43 jim
Release 08:11:28 jim
Continuous Development 08:08:30 jim
AAL2 07:53:17 jim
AAL1 07:53:13 jim
AAL3 07:52:51 jim
Impersonation-resistant 07:51:29 jim
Web Blog_blogentry_190418_1 07:43:09 jim
Identity Provider (IDP) 07:40:59 jim
Attribute references 07:39:34 jim
Authentication intent 07:35:36 jim
19.04.2018
Risk-Based Authentication 18:45:27 jim
Authentication Context Class vs Authentication Method Reference 18:14:17 jim
Non-interactive 18:07:29 jim
Interactive 18:01:44 jim
Windows Logon Types 17:45:43 jim
Windows Event Log 17:41:56 jim
Windows Security Log Event 17:40:31 jim
Windows Security Event Log 17:39:54 jim Security Event Log ==> Windows Security Event Log
System Access Control List 17:37:30 jim
Create a MAD Service To Run 17:32:54 jim
Windows registry 17:31:46 jim
Service Control Manager 17:31:37 jim
SCM 17:19:09 jim
Active Directory Account Lockout 17:14:42 jim
18.04.2018
ipProtocolNumber 17:58:27 jim
1.3.6.1.1.1.2.3 17:54:35 jim
IpServiceProtocol 17:54:00 jim
IpService 17:50:53 jim
1.3.6.1.1.1.1.15 17:47:01 jim
IpServicePort 17:46:08 jim ipServicePort ==> IpServicePort
NisNetgroupTriple 17:42:35 jim
NisNetgroup 17:39:41 jim
MemberNisNetgroup 17:36:12 jim
PosixGroup 17:22:13 jim
MemberUid 17:18:42 jim
ShadowInactive 17:12:12 jim
ShadowLastChange 17:11:32 jim
ShadowAccount 17:08:51 jim
ShadowFlag 17:06:06 jim
1.3.6.1.4.1.42.2.27.8.1.28 17:04:02 jim
ShadowExpire 17:03:43 jim
1.3.6.1.1.1.1.9 17:00:37 jim
2.5.13.15 16:57:05 jim
IntegerOrderingMatch 16:56:47 jim
ShadowWarning 16:54:09 jim
ShadowMax 16:48:18 jim
1.3.6.1.1.1.1.7 16:46:46 jim
ShadowMin 16:45:44 jim
1.3.6.1.1.1.1.6 16:44:39 jim
shadowLastChange 16:40:56 jim
LoginShell 16:38:02 jim
IA5String 16:33:51 jim
1.3.6.1.4.1.1466.115.121.1.26 16:33:27 jim
HomeDirectory 16:32:22 jim
CaseExactIA5Match 16:30:04 jim
Gecos 16:23:59 jim
GidNumber 16:18:58 jim
UidNumber 16:14:26 jim
automountMapName 14:24:27 jim
NisDomainObject 14:18:19 jim
1.3.6.1.1.1.2.15 14:17:07 jim
NisDomain 14:15:36 jim
SchemaRFC2307Bis 14:07:10 jim
Draft-howard-rfc2307bis 14:05:56 jim
2.5.13.13 13:27:18 jim
1.3.6.1.4.1.1466.101.120.6 13:26:43 jim
1.3.6.1.1.11.1.1 13:25:31 jim
2.5.4.50 13:25:03 jim
2.5.13.20 13:24:33 jim
1.3.6.1.4.1.4203.1.3.5 13:24:09 jim
1.3.6.1.4.1.1466.101.120.7 13:23:46 jim
1.3.6.1.4.1.1466.101.120.13 13:23:31 jim
2.5.23.4 13:23:10 jim
2.5.4.65 13:22:32 jim
1.3.6.1.4.1.11.1.3.1.1.2 13:22:00 jim
2.5.4.41 13:20:55 jim
2.5.21.8 13:20:25 jim
2.5.21.4 13:20:04 jim
2.5.13.14 13:19:29 jim
0.9.2342.19200300.100.1.9 13:18:54 jim
2.5.21.10 13:18:27 jim
2.5.13.28 13:17:59 jim
2.5.13.27 13:17:38 jim
1.2.840.113549.1.9.1 13:16:42 jim
EmailAddress 13:15:55 jim
1.3.6.1.4.1.11.1.3.1.2.5 13:10:26 jim
DITContentRules 13:08:13 jim DitContentRules ==> DITContentRules
Understanding DIT Content Rules 13:08:00 jim
Subschema 13:07:29 jim
OperationalAttribute 13:06:57 jim
ObjectClass 13:06:35 jim
DIT Content Rule Description 13:06:14 jim
DIT Content Rule 13:05:58 jim
2.5.21.2 13:05:38 jim
1.2.36.79672281.1.13.6 13:03:00 jim
AllComponentsMatch 13:02:41 jim
OpenAssertionType 12:58:54 jim
1.2.36.79672281.1.5.3 12:51:41 jim
1.2.36.79672281.1.13.7 12:48:03 jim
DirectoryComponentsMatch 12:47:39 jim
DepartmentNumber 12:41:28 jim
2.5.18.7 12:39:58 jim
2.5.20.2 12:39:32 jim
2.5.18.12 12:39:02 jim
2.5.23.5 12:38:41 jim
2.5.13.4 12:38:01 jim
2.5.23.6 12:37:24 jim
CaseIgnoreMatch 12:35:42 jim
2.5.13.2 12:30:38 jim
2.5.13.7 12:30:12 jim
1.3.6.1.4.1.1466.109.114.1 12:29:39 jim
2.5.13.6 12:29:14 jim
2.5.13.5 12:23:40 jim
DomainComponent 12:22:23 jim
DC 12:20:34 jim
RFC 1034 12:12:47 jim
RFC 2181 12:12:25 jim
RFC 1123 12:10:08 jim
RFC 5891 12:03:10 jim
RFC 5890 12:01:53 jim
IDNA 11:56:15 jim
Internationalizing Domain Names in Applications 11:55:43 jim
RFC 3490 11:55:02 jim
Dc 11:52:18 jim
2.16.840.1.113719.1.167.6.2.1 11:51:01 jim
1.3.6.1.4.1.1466.344 11:50:38 jim
0.9.2342.19200300.100.4.13 11:50:17 jim
RFC 4234 11:48:02 jim
0.9.2342.19200300.100.1.25 11:45:32 jim
2.16.840.1.113719.1.8.4.5 11:31:15 jim
2.5.6.6 11:30:48 jim
Person 11:30:26 jim
Company 11:23:16 jim
Digital Identity 11:18:32 jim
Identity Cube 10:18:28 jim
Credential 09:56:11 jim
Credential Repository 09:45:00 jim
Edirectory Back-Ups And Clones 09:43:16 jim
Backup 09:42:21 jim
Incremental Backup 09:41:26 jim
Berkeley DB Java Edition 09:38:29 jim BerkeleyDBJavaEdition ==> Berkeley DB Java Edition
Glossary Of LDAP And Directory Terminology 09:37:53 jim
LDAP Indexes 09:30:54 jim
Changelog 09:29:18 jim
Back-end 09:27:56 jim
17.04.2018
0.9.2342.19200300.100.4.5 19:07:34 jim
2.5.23.2 19:07:09 jim
1.3.6.1.4.1.1466.101.120.1 19:04:56 jim
AdministratorsAddress 19:03:52 jim
0.9.2342.19200300.100.1.8 19:02:06 jim
0.9.2342.19200300.100.1.5 19:01:44 jim
0.9.2342.19200300.100.1.4 18:59:59 jim
0.9.2342.19200300.100.1.2 18:59:28 jim
CarLicense 18:45:12 jim
2.16.840.1.113730.3.1.1 18:44:07 jim
INTEGER 18:34:55 jim
BIT STRING 18:26:52 jim
BitStringMatch 18:24:19 jim
2.5.13.16 17:58:56 jim
RFC 2798 17:52:17 jim
RFC 4519 17:50:58 jim
1.3.6.1.1.3.1 17:48:23 jim
UidObject 17:46:09 jim
LDAP Family 17:40:29 jim
LDAP Message 17:34:18 jim
LDAP Object Identifier Descriptors 17:23:23 jim
VPIMUser 17:22:02 jim
RFC 4237 17:16:04 jim
Reciprocal OAuth 09:35:46 jim
Web Blog_blogentry_170418_1 09:32:46 jim Reciprocal Authorization Flow ==> Reciprocal OAuth
16.04.2018
IDM Tricks 20:43:47 jim
Novell IDM Driver Filters 20:43:29 jim
Troubleshooting DirXML 20:32:28 jim
AdministrativeRole 11:59:25 jim
CollectiveAttributeInnerArea 11:58:28 jim
CollectiveAttributeSpecificArea 11:58:11 jim
SubschemaAdminSpecificArea 11:58:00 jim
AccessControlSpecificArea 11:57:45 jim
AutonomousArea 11:57:27 jim
ApplicationEntity 11:53:27 jim
RFC 2256 11:48:58 jim
Version 11:44:58 jim
Newsuperior 11:42:19 jim
2.16.840.1.113730.3.1.11 11:39:07 jim
Modify 11:37:19 jim
Newrdn 11:35:49 jim
Moddn 11:34:05 jim
Dn 11:32:13 jim
Delete 11:30:32 jim
Add 11:23:11 jim
Deleteoldrdn 11:22:10 jim
Changetype 11:21:30 jim
EntryDN 11:15:43 jim
2.5.23.3 11:02:21 jim
AccessControlInnerArea 11:01:13 jim
RFC 3296 10:54:19 jim
RFC 8284 10:50:48 jim
RFC 5020 10:49:40 jim
RFC 2589 10:48:38 jim
RFC 2247 10:47:05 jim
RFC 6109 10:46:03 jim
RFC 7612 10:44:30 jim
RFC 3712 10:43:43 jim
RFC 4403 10:41:33 jim
RFC 7532 10:39:49 jim
RFC 2293 10:38:29 jim
RFC 2739 10:37:22 jim
RFC 2164 10:35:57 jim
RFC 4104 10:34:52 jim
Audio 09:43:31 jim
X-NOT-HUMAN-READABLE 09:34:11 jim
1.3.6.1.4.1.1466.115.121.1.4 09:32:05 jim
0.9.2342.19200300.100.1.55 09:21:13 jim
1.3.6.1.4.1.1466.115.121.1.20 09:12:06 jim
DSE Type 09:10:18 jim
Attribute Type Description 08:57:24 jim
1.3.6.1.4.1.1466.115.121.1.1 08:54:30 jim
ACI Item 08:53:58 jim
ACI 08:53:17 jim
Microsoft Active Directory Syntax 08:45:37 jim
Zero 08:42:17 jim
Signed int 08:38:28 jim
ADSTYPE_DN_WITH_BINARY 08:29:12 jim
2.5.5.15 08:26:13 jim
ADSTYPE_NT_SECURITY_DESCRIPTOR 08:24:16 jim
1.2.840.113556.1.4.907 08:24:07 jim
ADSTYPE_BOOLEAN 08:17:58 jim
ADSTYPE_OCTET_STRING 08:16:29 jim
SID string 08:14:27 jim
Security Identifier 08:11:33 jim
15.04.2018
SDDL 20:09:32 jim
NT-Sec-Desc 20:09:12 jim
ABNF 20:07:08 jim
RFC 5234 20:06:38 jim
Security Descriptor Description Language 20:04:46 jim
Security Descriptor 20:01:46 jim
2.5.5.14 19:46:26 jim
2.5.5.13 19:45:05 jim
2.5.5.12 19:43:29 jim
2.5.5.10 19:41:02 jim
ADSTYPE_INTEGER 19:39:14 jim
Enumeration syntax 19:38:56 jim
2.5.5.8 19:37:30 jim
2.5.5.7 19:32:58 jim
2.5.5.6 19:27:42 jim
2.5.5.5 19:24:24 jim
Telex 19:22:30 jim
2.5.5.2 19:21:15 jim
MSADTS 19:16:46 jim
Microsoft Active Directory Technical Specification 19:16:29 jim
2.5.5.3 19:14:26 jim
2.5.5.11 19:13:53 jim
ADSTYPE_CASE_EXACT_STRING 19:07:39 jim
1.2.840.113556.1.4.905 19:03:36 jim
UTCTime 18:57:13 jim
Decision Tree 18:35:07 jim
Machine Learning Algorithms 18:33:21 jim
Naive Bayes 18:28:12 jim
Training dataset 18:27:41 jim
GeneralizedTime 17:34:09 jim
Presentation Address 17:32:24 jim
ADSTYPE_LARGE_INTEGER 17:26:43 jim
VisibleString 12:59:31 jim
VideotexString 12:59:17 jim
UTF8String 12:59:09 jim
UniversalString 12:58:59 jim
TeletexString 12:58:51 jim
SYNTAX 12:57:28 jim Printable String ==> PrintableString
Telephone Number LDAP Syntax 12:57:28 jim Printable String ==> PrintableString
CaseExactMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactOrderingMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactSubstringsMatch 12:57:27 jim Printable String ==> PrintableString
PrintableString 12:57:27 jim Printable String ==> PrintableString
Supertype 12:56:48 jim IA5 String ==> IA5String
DNSName 12:56:47 jim IA5 String ==> IA5String
GraphicString 12:56:13 jim
GeneralString 12:56:05 jim
BMPString 12:55:42 jim
CaseIgnoreString 12:53:44 jim Directory String ==> DirectoryString
DirXML-NTAccountName 12:53:44 jim Directory String ==> DirectoryString
Directory (Case Ignore) String 12:53:44 jim Directory String ==> DirectoryString
NickName 12:53:44 jim Directory String ==> DirectoryString
SupportedSASLMechanisms 12:53:44 jim Directory String ==> DirectoryString
1.3.6.1.4.1.1466.115.121.1.15 12:53:43 jim Directory String ==> DirectoryString
DirectoryString 12:53:43 jim Directory String ==> DirectoryString
ADSTYPE_NUMERIC_STRING 12:52:09 jim Numeric String ==> NumericString
Object Class Description 12:52:09 jim Numeric String ==> NumericString
1.3.6.1.4.1.1466.115.121.1.36 12:52:08 jim Numeric String ==> NumericString
NumericString 12:52:08 jim Numeric String ==> NumericString
Component Matching Rules 12:48:41 jim
RFC 3687 12:38:28 jim
LDAP String Matching 12:37:23 jim
CaseExactString 12:21:26 jim
2.5.5.1 12:15:17 jim
ADSTYPE_DN_WITH_STRING 12:04:36 jim
ADSTYPE_CASE_IGNORE_STRING 12:04:06 jim
ADSTYPE_DN_STRING 12:03:39 jim
ADSTYPE_UTC_TIME 12:02:22 jim
ADsType 12:01:58 jim
2.5.5.4 12:00:53 jim
DNWithString 11:54:34 jim
1.2.840.113556.1.4.904 11:52:04 jim
OR-Name 10:22:27 jim
1.2.840.113556.1.4.1221 10:16:45 jim
1.2.840.113556.1.4.903 10:16:11 jim
Draft-armijo-ldap-syntax-00 10:13:14 jim
DNWithOctetString 10:11:50 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 10:09:23 jim DN-Binary ==> DNWithOctetString
1.2.840.113556.1.4.1362 10:02:15 jim
OID Syntax 09:56:22 jim
1.3.6.1.4.1.1466.115.121.1.38 09:51:29 jim
Replica Link 09:32:30 jim
1.3.6.1.4.1.1466.115.121.1.43 09:26:42 jim
2.5.5.9 08:51:54 jim
Interval Syntax 08:47:12 jim
OctetString 08:28:12 jim
1.3.6.1.4.1.1466.115.121.1.40 08:26:24 jim
System-Id-Guid 08:17:27 jim
1.2.840.113556 08:15:02 jim
Country-Code 08:10:20 jim
14.04.2018
Web Blog_comments_170914_1 11:52:34 AKUJineafe
International Standard Recording Code 10:55:56 jim
ISO 4217 10:51:10 jim
Currency Code 10:48:18 jim
ISO 3166-1 alpha-2 10:34:17 jim
Data Country Codes 10:16:57 jim
CountryName 10:15:41 jim
Co 10:14:52 jim
FriendlyCountryName 10:13:23 jim
Language-Tag 10:04:44 jim
Language 09:59:07 jim
CountryCode 09:49:08 jim
1.2.840.113556.1.4.25 09:09:25 jim
Web Blog_blogentry_140418_1 09:00:32 jim
13.04.2018
ETH 10:39:31 jim
Compare Request 09:27:30 jim
Modify DN Response 09:24:25 jim
ModifyDNRequest 09:21:58 jim
Delete Response 09:20:50 jim
Delete Request 09:16:08 jim
LDAP Result 09:14:08 jim
Add Response 09:13:28 jim
Add Request 09:09:32 jim
Modify Response 09:08:36 jim
Modify Request 09:06:44 jim
SearchResultDone 09:05:32 jim
SearchResultEntry 09:03:17 jim
SearchRequest 09:01:30 jim
Unbind Request 09:00:32 jim
Bind Request 08:58:35 jim
Bind Response 08:58:16 jim
EDirectory LDAP Transaction 08:52:12 jim
Transaction 08:39:20 jim
Distributed Ledger Technology 08:32:43 jim
Ethereum 08:24:59 jim
Ether 08:16:15 jim
Nakamoto consensus 08:12:19 jim
Web Blog_blogentry_130418_1 07:59:20 jim
Sovereign-source Identity 07:47:35 jim
SSI 07:42:46 jim
Self-Sovereign Identity 07:41:27 jim
12.04.2018
Legitimacy of Social Login 16:33:00 jim
Cloud Identity Providers 16:21:31 jim
Web Blog_blogentry_090418_1 16:07:57 jim
Google OpenID Connect 14:45:24 jim
Include_granted_scopes 14:36:25 jim
Active Directory and Passwords 10:12:17 jim
Decentralized Exchange 09:54:48 jim
Perspectives Project 09:51:18 jim
EFF 09:48:27 jim
Free Software Foundation 09:47:35 jim
Electronic Frontier Foundation 09:47:20 jim
Intellectual Property 09:46:52 jim
Digital Rights Management 09:45:09 jim
Digital Asset 09:42:02 jim
Web Blog_blogentry_120418_1 09:28:07 jim
Containerization 09:18:12 jim
Network devices 09:16:41 jim
Data Center 09:16:20 jim
Host 09:15:27 jim
Container Orchestration 09:12:34 jim
Operating-system-level virtualization 08:56:40 jim
Docker 08:55:58 jim
Virtual Machine 08:46:44 jim
Virtualization method 08:41:17 jim
Container 08:35:51 jim
Ephemeral 08:34:54 jim
Functions as a Service 08:33:25 jim
Computing Service 08:30:47 jim
Platform as a Service 08:30:18 jim
Software as a Service 08:27:37 jim
Infrastructure as a Service 08:26:22 jim
EdirectoryPasswords 07:56:24 jim
Password Management 07:52:06 jim
PWFILTER Windows Events 07:49:10 jim
DirXML PWFILTER.DLL 07:48:16 jim
AD Driver version 4.0.0.4 07:46:43 jim
AD Password Filters 07:46:00 jim
11.04.2018
Extract Transform Load 18:09:20 jim
NetworkAddress 15:33:03 jim
Bug 15:27:59 jim
Product Backlog 15:25:33 jim
Backlog 15:23:32 jim
Iteration Planning 15:22:00 jim
Sprint Backlog 15:16:26 jim
Iteration Backlog 15:11:49 jim
Product Owner 14:06:02 jim
Delivery Team 14:02:42 jim
Scrum Team 13:59:56 jim
Development Team 13:46:22 jim
Web Blog_blogentry_090318_1 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
WebAuthn 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
FIDO Standards 12:59:25 jim
K-Nearest Neighbor 12:49:58 jim
Supervised Learning 12:46:45 jim
KNN 12:45:18 jim
Artificial Intelligence 12:11:45 jim
Cognitive Security 12:08:36 jim
Anomaly Detection 08:29:40 jim
Data-lake 08:23:32 jim
Buzzword 08:20:35 jim
Data mining 08:18:36 jim
Web Blog_blogentry_110418_1 08:06:26 jim
10.04.2018
Centralized Exchange 11:01:51 jim
DEX 10:59:29 jim
Digital Currency Exchange 10:45:28 jim
Fiat Currency 10:14:12 jim
Commodity 10:11:12 jim
Money 10:05:49 jim
Cryptocurrency 09:48:44 jim
Distinguished Names 09:07:05 jim
DistinguishedNameMatch 08:51:07 jim
String Representation of Distinguished Names 08:45:24 jim
DN Syntax 08:35:19 jim
09.04.2018
Authentication Context Class 17:08:00 jim
Graded Authentication 16:41:54 jim
Incremental authorization 16:25:18 jim
Network-Auth 16:07:10 jim
Implicit Scopes 16:00:55 jim
OAuth Scope Example 15:57:53 jim
Trust Elevation 15:45:24 jim
Event 4625 15:28:56 jim
Event 4624 15:22:20 jim
Active Directory Group Related Searches 15:08:32 jim
08.04.2018
ERC20 21:23:51 jim
Repudiation 20:26:00 jim
Zero-knowledge proof 20:07:36 jim
ZKP 20:04:15 jim
07.04.2018
Common Event Format 13:58:00 jim
ArcSight 13:53:49 jim
CEF 13:52:59 jim
Event System 13:47:43 jim
NDS Unknow Entries 13:31:04 jim
Flat Cleaner 13:24:21 jim
Limber 13:22:47 jim
EDirectory Synchronization 13:15:45 jim
Change Cache 13:13:32 jim
Imonitor 12:57:31 jim
Translation Processor 12:39:57 jim
Out of Band Requests 12:39:07 jim
Events vs Commands 12:38:35 jim
DirXML Out-of-Band Requests 12:29:29 jim IDM Out-of-Band Requests ==> DirXML Out-of-Band Requests
DirXML Trace File Searches 12:25:57 jim
DirXML Toolbox 12:25:38 jim
DirXML 12:25:22 jim
DirXML Required Reading 12:23:56 jim Novell IDM Required Reading ==> DirXML Required Reading
DirXML Level Three Trace 12:20:09 jim NIDM Trace File Searches ==> DirXML Trace File Searches
Jims Toolbox 12:14:10 jim IDM Toolbox ==> DirXML Toolbox
Single Logout 12:08:03 jim
Logged out 12:07:34 jim
OpenID Connect Back-Channel Logout 12:05:40 jim
Why Use Tokens 12:04:14 jim
SAML V2.0 12:02:32 jim
Remember Me 11:59:01 jim
PostMessage 11:56:57 jim
Response_mode 11:56:37 jim
Check_session_iframe 11:56:02 jim
Logging Out 11:54:39 jim Window.postMessage ==> PostMessage
Single Logout Profile 11:18:41 jim
IDP Metadata 11:17:39 jim
Transport Layer Security 09:54:14 jim
Secure connection 09:43:50 jim
Pre-Shared Key 09:38:43 jim
Internet Threat Model 09:25:34 jim
Threat Model 09:19:16 jim
TLS 1.3 09:11:30 jim
0-RTT Handshakes 09:10:14 jim
TLS Session Resumption 08:56:17 jim
06.04.2018
OAuth 2.0 JWT Secured Authorization Request 09:54:14 jim
04.04.2018
Identity Lifecycle Management 10:55:52 jim
Account termination 10:52:54 jim
Logout Mechanism 10:50:30 jim
JSESSIONID 10:44:35 jim
Session 10:42:16 jim
LAG-catalina.out 10:41:42 jim
OpenID Connect Session Management 10:34:05 jim
OpenID Connect Front-Channel Logout 10:33:47 jim
03.04.2018
Token Revocation 10:48:58 jim
GraphQL 10:19:32 jim
Round-Trip Time 10:09:25 jim
RTT 10:04:19 jim
Round-trips 10:00:55 jim
Representational State Transfer 09:56:19 jim
Hypermedia As The Engine Of Application State 08:57:28 jim
Link Relation Types 08:48:40 jim
HTTP PATCH 08:23:10 jim
01.04.2018
Revocation model 08:45:39 jim
OAuth 2.0 Token Introspection 08:41:07 jim
30.03.2018
2.5.18.1 10:43:08 jim
CreateTimestamp 10:42:45 jim
Timeout 10:07:11 jim
Logout Process 09:38:35 jim
What is missing in OAuth 2.0 09:21:06 jim
29.03.2018
DirXML Events and Commands 17:13:54 jim
Translation Processor/tranlation-processor-sub.jpg 17:03:22 jim translation-processor
Schema Mapping Policy 12:37:25 jim
XDS Document 12:32:58 jim
DirXML event 12:15:46 jim
DirXML command 12:11:48 jim
DirXML Engine 12:05:48 jim
Event Transformation Policy Set 12:02:11 jim
Merge operation 11:57:43 jim
DirXML Engine/newfishbonediagram.png 11:07:54 jim newfishbonediagram.png
LDAP 4 10:59:25 jim
X-NDS_NOT_CONTAINER 10:50:06 jim
Leaf 10:49:37 jim
ObjectClass=unknown 10:45:05 jim
Forward Reference 10:00:40 jim
Web Blog_blogentry_290318_1 09:52:47 jim
28.03.2018
MemberQueryURL 14:12:26 jim
MemberQuery 14:12:07 jim
ObjectSID 13:07:05 jim
Impersonation Token 12:51:32 jim
NO_IMPERSONATION_TOKEN 12:50:38 jim
Access Token 12:17:10 jim
Primary Access Token 12:15:00 jim
PrimaryGroupID 11:39:57 jim
1.2.840.113556.1.4.98 11:36:09 jim
RID 11:26:00 jim
Relative IDentifier 11:25:43 jim Relative ID ==> Relative IDentifier
Operating System 10:42:59 jim
Well-known Security Identifiers 10:40:44 jim
27.03.2018
CachedInteractive 17:27:12 jim
RemoteInteractive 17:23:43 jim
Remote Desktop Protocol 17:20:54 jim
RDP 17:18:42 jim
NewCredentials 17:15:20 jim
NetworkCleartext 17:13:24 jim
Unlock-Device 17:10:11 jim
Service-Auth 17:05:30 jim
Batch-Auth 17:03:35 jim
Login ID 14:35:30 jim
Uid 14:35:00 jim
Web Blog_blogentry_270318_1 13:34:22 jim
26.03.2018
Fine Grained Password Policies 15:55:09 jim
PSO 15:52:40 jim
MsDS-PasswordSettings 15:52:01 jim
Group Policy Object 15:49:41 jim Group Policy ==> Group Policy Object
GPO 15:49:16 jim
PwdProperties 15:48:44 jim
Max-Pwd-Age Attribute 15:48:20 jim
Local Security Authority 15:48:02 jim
LAN Manager authentication level 15:47:44 jim
How passwords are used in Windows 15:47:27 jim
Dynamic Access Control 15:46:41 jim
AD Determining Password Expiration 15:46:23 jim
1.2.840.113556.1.4.2023 15:39:36 jim
MsDS-PasswordSettingsPrecedence 15:38:55 jim
MsDS-PSOAppliesTo 15:32:10 jim
1.2.840.113556.1.4.2013 15:25:53 jim
1.2.840.113556.1.4.2014 15:25:33 jim
1.2.840.113556.1.4.2015 15:25:02 jim
1.2.840.113556.1.4.2016 15:24:32 jim
1.2.840.113556.1.4.2017 15:24:13 jim
1.2.840.113556.1.4.2018 15:23:40 jim
1.2.840.113556.1.4.2019 15:23:15 jim
1.2.840.113556.1.4.2020 15:22:42 jim
MsDS-PasswordSettingsContainer 15:19:18 jim
MsDS-LockoutThreshold 15:18:56 jim
MsDS-LockoutDuration 15:16:58 jim
MsDS-LockoutObservationWindow 15:15:08 jim
MsDS-PasswordReversibleEncryptionEnabled 15:12:06 jim
MsDS-PasswordHistoryLength 15:10:02 jim
MsDS-PasswordComplexityEnabled 15:09:26 jim
MsDS-MinimumPasswordLength 15:02:43 jim
1.2.840.113556.1.4.2011 14:58:38 jim
1.2.840.113556.1.4.2012 14:58:07 jim
MsDS-MinimumPasswordAge 14:57:38 jim
MsDS-MaximumPasswordAge 14:53:14 jim
Ms-DS-Password-Settings-Container 13:38:07 jim
Web Blog_blogentry_260318_1 13:33:47 jim
25.03.2018
Revision 10:38:51 jim
1.3.6.1.4.1.36733.2.1.1.59 10:32:16 jim
Etag 10:28:49 jim
SCIM meta 10:24:28 jim
Lucky 13 10:22:16 jim
JOSE Header 10:16:14 jim
Bitcoin block 10:15:22 jim
Header 10:13:15 jim
IPG 10:09:46 jim
Datagram 10:08:50 jim
Packet 10:07:56 jim
Packet switching 09:56:54 jim
Circuit switching 09:54:38 jim
Telephone Circuit 09:42:56 jim
Ethernet 09:39:48 jim
IEEE 802 09:35:22 jim
IEEE 802.25 09:14:35 jim
IEEE 802.24 09:14:29 jim
IEEE 802.23 09:14:24 jim
IEEE 802.22 09:14:20 jim
IEEE 802.21 09:14:16 jim
IEEE 802.20 09:14:11 jim
IEEE 802.19 09:14:06 jim
IEEE 802.18 09:14:01 jim
IEEE 802.17 09:13:57 jim
IEEE 802.16.2 09:13:53 jim
IEEE 802.16.1 09:13:48 jim
IEEE 802.16 09:13:44 jim
IEEE 802.15.7 09:13:36 jim
IEEE 802.15.6 09:13:32 jim
IEEE 802.15.5 09:13:09 jim
IEEE 802.15.4 09:12:24 jim
IEEE 802.15.3 09:10:40 jim
IEEE 802.15.2 09:10:33 jim
IEEE 802.15 09:10:25 jim
IEEE 802.13 09:10:04 jim
IEEE 802.14 09:09:53 jim
IEEE 802.12 09:09:41 jim
IEEE 802.10 09:09:32 jim
IEEE 802.9 09:09:22 jim
IEEE 802.8 09:08:55 jim
IEEE 802.7 09:08:45 jim
IEEE 802.4 09:08:30 jim
IEEE 802.2 09:06:50 jim
Logical Link Control 09:06:01 jim
IEEE 802.5 09:04:16 jim
Metropolitan Area Network 09:03:01 jim
Data-link Layer 08:47:41 jim
Bridge 08:43:41 jim
Distributed-Queue Dual-Bus 08:33:19 jim
DQDB 08:30:07 jim
24.03.2018
IEEE 802.6 22:42:47 jim
Wide Area Network 22:39:38 jim
MAN 22:39:23 jim
Token Ring 22:31:47 jim
Network Switches 20:19:47 jim
Network Repeater 14:30:52 jim
Network hub 14:28:55 jim
Routing 13:50:12 jim Bridges ==> Bridge
IEEE 802.1 13:50:11 jim Bridges ==> Bridge
IEEE 802.1Q 13:50:11 jim Bridges ==> Bridge
Node 13:43:05 jim
Gateway 13:42:06 jim
Router 13:40:29 jim
IDM Related Compliance Items 09:15:36 jim
Novell Access Manager 09:12:08 jim
NT LAN Manager 09:03:07 jim
Ping Identity 08:59:56 jim
X.500 08:56:04 jim
Identity Aware Proxy 08:51:01 jim
GCP Virtual Private Cloud 08:50:10 jim
Transparent Proxy 08:49:15 jim
Nevis Security Suite 08:48:53 jim
Managed Security Service Provider 08:48:25 jim
Firewall 08:47:44 jim
23.03.2018
Geocast 13:35:22 jim
Anycast 13:32:47 jim
Broadcast 13:31:44 jim
Virtual LAN 13:14:55 jim
Bridging 13:14:16 jim
Wireless LAN 13:06:48 jim
IEEE 802.1X 13:06:07 jim
RFC 2284 13:03:01 jim
Extensible Authentication Protocol 13:00:39 jim
RFC 3748 12:55:20 jim
Authentication Mechanism 12:53:34 jim
Authentication Method 12:53:09 jim
EAP 12:50:24 jim
RFC 5247 12:50:04 jim
Authentication, Authorization and Accounting (AAA) Transport Profile 12:44:58 jim
RFC 3539 12:42:18 jim
RFC 4960 11:22:43 jim
Stream Control Transmission Protocol 11:22:03 jim
SCTP 11:18:43 jim
DIAMETER 11:17:04 jim
Protocol 11:15:00 jim Diameter (protocol) ==> DIAMETER
Internet Layer 10:27:48 jim
Link Layer 10:26:59 jim
Application Layer 10:25:50 jim
Session Layer 10:25:35 jim
Transport Layer 10:25:24 jim
Network Layer 10:25:12 jim
Physical Layer 10:23:58 jim
Presentation Layer 10:17:21 jim
OSI-Model 10:14:26 jim
Password Authentication Protocol 10:11:13 jim
PPP 10:10:42 jim
Point-to-Point Protocol 10:10:24 jim
Octal 10:04:45 jim
Asynchronous Transfer Mode 10:02:36 jim
Octet 10:02:08 jim
Content-Length 10:01:02 jim Octets ==> Octet
DNS Resource Records 10:01:02 jim Octets ==> Octet
ES256 10:01:02 jim Octets ==> Octet
Frame 10:01:02 jim Octets ==> Octet
Time-Division Multiplex 09:55:00 jim
TDM 09:54:30 jim
TDMA 09:54:04 jim
Time-Division Multiple Access 09:53:38 jim
SDH 09:40:10 jim
Synchronous Digital Hierarchy 09:39:53 jim
Synchronous Optical NETworking 09:35:45 jim
SONET 09:29:13 jim
3G 09:23:54 jim
4G 09:19:28 jim
InterPacket Gap 09:11:42 jim
InterFrame Gap 09:11:02 jim
IFG 09:10:38 jim
BCP 62 08:58:25 jim
Automatic Repeat-reQuest 08:57:04 jim
ARQ 08:55:10 jim
Packet segmentation 08:51:56 jim
Segment 08:44:43 jim
User Application Clustering 08:37:56 jim
VLAN 08:30:29 jim
Trust Inferer 08:28:59 jim
Access Proxy 08:28:45 jim
Trust Tier 08:28:35 jim
Resource Inventory Service 08:28:21 jim
Device Inventory Service 08:27:18 jim
22.03.2018
Access Control Models 16:40:42 jim
Adaptive Policy-based Access Management 16:39:10 jim
Lattice Based Access Control 16:33:08 jim
Contextual Attributes 16:24:02 jim
Data State 13:22:04 jim
Data Metadata 13:21:53 jim
Application Attributes 13:20:09 jim
Network Attributes 13:19:09 jim
Resource Action 13:18:57 jim
Geolocation Attributes 13:18:02 jim
Organizational Attributes 13:12:35 jim
Data Origin 11:55:52 jim
Attribute Based Access Control 11:29:18 jim
REL 11:28:02 jim
Rights Expression Language 11:27:08 jim
Metadata 11:11:35 jim
ABAC 10:44:39 jim
Subject Attributes 10:29:43 jim
RBAC vs ABAC 10:28:54 jim
Operating System Attributes 10:19:11 jim
Context Based Access Control 10:08:57 jim
21.03.2018
OAuth Client 10:30:20 jim
Covert Redirect Vulnerability 09:40:55 jim
Unvalidated redirects and forwards 09:40:25 jim
OAuth 2.0 Security-Closing Open Redirectors in OAuth 09:17:37 jim
HTTP Referer 09:04:41 jim
HTTP Request Header 08:56:08 jim
Open redirect 08:48:49 jim
Covert Redirect 08:48:15 jim
20.03.2018
W3C Credential Management API 15:58:46 jim
Content-Security-Policy 14:24:35 jim
Cross-site scripting 14:22:07 jim
Discovery Mechanism 14:02:20 jim
Web Services Dynamic Discovery 14:02:02 jim
Universal Description, Discovery, and Integration 14:01:20 jim
RootDSE 13:55:37 jim
PASSWD_NOTREQD 13:53:17 jim
Processes 13:39:47 jim
Multitasking 13:39:10 jim
LWP 13:38:37 jim
Light-Weight Process 13:38:20 jim
FLUSH+RELOAD 13:29:46 jim
FanOutDriverPlatformReceiverRunModes 13:22:53 jim
System Metrics 13:22:35 jim
Instruction cycle 13:20:55 jim
Internal Metrics 13:20:06 jim
Central Processing Unit 13:18:52 jim
CPU 13:18:03 jim
Windows user 12:54:32 jim
Security Principal Objects 12:53:09 jim
Windows Client 12:50:56 jim
Password Policy 12:27:10 jim
Windows Default Password Policy 12:25:48 jim Windows Server 2003 Default Password Policy ==> Windows Default Password Policy
FGPP 12:24:19 jim
UserAccountControl 11:59:30 jim
User-Account-Control Attribute 11:58:45 jim
Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs) 09:39:01 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:38:46 jim
Login_hint 09:03:27 jim
19.03.2018
NDSBACKUP 13:35:03 jim
EDirectory 9.1.0.0 (40101.29) 12:57:43 jim
EDirectory 9.0.4.0 (40006.33) 12:57:34 jim
EDirectory 9.0.3.1 (40005.13) 12:57:19 jim
Partition 12:21:48 jim
Cn=Partition, cn=Agent, cn=monitor 12:11:13 jim
Cn=Monitor 12:08:47 jim
Monitor Entry 12:07:55 jim
Maximum Ring Delta 12:00:25 jim
EDirectory 9.0.1.0 (40003.37) 11:13:44 jim
EDirectory 9.0.1.1 (40003.38) 11:13:24 jim
EDirectory 9.0.2.2 (40004.44) 11:12:42 jim
Input-constrained device 10:08:22 jim
18.03.2018
Reverse Proxy 19:39:04 jim
Proxy Server 19:38:22 jim Load-Balancing ==> Load Balancing
Load Balancing 19:38:21 jim Load-Balancing ==> Load Balancing
Query 11:00:19 jim
Graph 10:54:10 jim
Cooperation for Open Systems Interconnection Networking in Europe 10:41:33 jim
Reliable protocol 10:37:56 jim
Unreliable protocol 10:35:55 jim
Hypertext Transfer Protocol 10:33:28 jim
HTML link 10:23:20 jim
HTML Element 10:20:29 jim
Hyperlinks 10:18:56 jim
HTTP Method 10:06:23 jim
Verb 10:05:16 jim
OAuth 2.0 10:03:52 jim
RESTful 10:01:54 jim
Hypermedia 10:00:57 jim
Link 10:00:23 jim
Hypertext 09:59:56 jim
Cheat Sheets 09:48:19 jim
Open Web Application Security Project 09:44:23 jim
Session Management 09:15:33 jim
Proprietary Session Management 08:44:16 jim
Session ID 08:38:49 jim
16.03.2018
API versioning 07:59:42 jim
Web Service 07:53:05 jim
14.03.2018
External Security Managers (ESM) 16:40:20 jim
ACF2 16:39:33 jim
Access Control Facility 16:39:05 jim
Hosted domain 12:03:22 jim
Hd 11:57:32 jim
Openid-configuration 11:42:31 jim
Revocation_endpoint 11:17:32 jim
OAuth 2.0 Token Revocation 11:16:03 jim
Token_type_hint 10:42:39 jim
Revocation Request 10:28:47 jim
OK 10:25:01 jim
Service Unavailable 10:13:08 jim
Retry-After 10:11:39 jim
HTTP 503 10:05:25 jim
11.03.2018
Replication 09:25:37 jim
Master-slave 09:19:40 jim
Multi-master replication 09:18:13 jim
Distributed system 08:58:00 jim
Decentralised system 08:52:09 jim
Eventual consistency 08:36:05 jim
Distributed Data Store 08:34:17 jim
Consensus 08:32:49 jim
Consistency 08:28:21 jim
10.03.2018
Year 11:11:30 jim
BCE 11:05:42 jim
YYYY 11:02:38 jim
Year 1917 11:01:52 jim
TAD 11:01:16 jim
Thinking About Today 11:00:55 jim
Web Blog_blogentry_100318_1 10:59:09 jim
LDIF Sort Tools 09:29:32 jim
LDAP Tools From Others 09:19:58 jim
09.03.2018
Policy 10:11:23 jim
Identity Management Architecture 10:03:32 jim
Identity Governance and Administration 09:58:40 jim
IGA 09:57:10 jim
BeyondCorp 09:25:36 jim
Authentication cookie 09:17:38 jim
08.03.2018
Stateless 14:59:01 jim
Intermediary 14:54:52 jim
Null style 14:31:46 jim
Constraint 14:25:36 jim
OpenID Connect Discovery 10:40:54 jim
Request_uri_parameter_supported 10:24:39 jim
Response_modes_supported 10:21:01 jim
Sid 10:05:37 jim
Frontchannel_logout_session_supported 09:59:22 jim
Frontchannel_logout_supported 09:56:57 jim
End_session_endpoint 09:13:38 jim
06.03.2018
IANA Registry 10:38:28 jim
Center for Applied Internet Data Analysis 10:07:12 jim
CAIDA 10:06:40 jim
IP spoofing 10:02:09 jim
EdirectorySizingHardware 09:53:25 jim
Application Shell Architecture 09:50:59 jim
Secret Files 09:49:34 jim
ISP 09:46:37 jim
Internet Service Providers 09:46:11 jim
GGC 09:45:47 jim
BCP 36 09:39:47 jim
Spoofing Attack 09:34:32 jim
Least Recently Used 09:27:14 jim
Cache 09:26:34 jim
Cache replacement algorithms 09:25:38 jim
LRU 09:23:10 jim
Name Service Cache Daemon 09:20:23 jim
NSCD 09:19:27 jim
Queue 09:16:14 jim
Memcached 09:11:49 jim
05.03.2018
Ripple Company 10:16:44 jim
Ripple Transaction Protocol 10:07:46 jim
OAuth 2.0 Authorization Server Metadata 09:29:10 jim
04.03.2018
Retry 11:33:02 jim
Fatal 11:31:18 jim
DirXML Status Events 11:30:31 jim
Warning 11:29:10 jim
HTTP Warn Codes 11:28:48 jim
RFC 7234 11:15:59 jim
Page Cache 10:52:56 jim
Cache-Control 10:51:59 jim
HTTP Cache Directive 10:48:08 jim
HTTP Header Field 10:37:06 jim
URI Fragment Identifiers 10:19:36 jim
Uniform Resource Identifier 10:15:20 jim
Form Post Response Mode 10:13:51 jim
Fragment Response Mode 09:59:33 jim
Identity Token 09:05:28 jim
03.03.2018
Identity Proofing 12:13:56 jim
Internet Security Glossary 12:12:49 jim
Registration 12:08:58 jim
Enrollment 12:04:48 jim
Credential Enrollment 11:59:00 jim
User Provisioning 11:27:06 jim
Authentication Channel 11:18:56 jim
Message Authentication 10:28:33 jim
Entity Authentication 10:04:04 jim
Explicit Endpoint 09:23:58 jim
02.03.2018
RFC 6819 21:36:46 jim
P-256 20:29:53 jim
Digital Signature Standard 20:29:11 jim
Elliptic Curve Digital Signature Algorithm 20:25:15 jim
MGF 17:51:49 jim
Mask Generation Function 17:51:34 jim
MGF1 17:49:52 jim
RSASSA-PSS 17:46:58 jim
PS256 17:43:19 jim
Response Type 17:31:46 jim
OAuth 2.0 Multiple Response Type Encoding Practices 17:24:34 jim
Authorization Code Flow 16:59:36 jim
S_hash 11:05:53 jim
Identity Token Validation 10:53:27 jim
At_hash 10:44:51 jim
Access Token Validation 10:43:09 jim
RS256 10:35:35 jim
Token_endpoint_auth_signing_alg_values_supported 10:26:49 jim
Wildcard Certificates 10:05:16 jim
28.02.2018
OAuth Scopes 14:03:42 jim
Phone 13:56:00 jim
OpenID Connect Scopes 13:54:27 jim
OpenID Connect Standard Claims 13:44:35 jim
Default Profile Claims 13:40:30 jim
RFC 5646 13:03:17 jim
Openid scope 13:00:07 jim
UserInfo Response 12:32:14 jim
OAuth Scope Validation 12:29:34 jim
Voluntary Claim 12:16:37 jim
Userinfo_endpoint 11:57:03 jim
UserInfo Request 11:41:47 jim
27.02.2018
Validation 21:34:08 jim
Identity Token Claims 21:24:41 jim
Azp 21:16:07 jim
Authorized party 21:15:47 jim
Authorization Response 20:40:11 jim
25.02.2018
Assertion Value 11:34:31 jim
24.02.2018
Contract of Adhesion 10:16:23 jim
Disintermediation 10:08:08 jim
Contract 10:06:46 jim
Web Blog_blogentry_240218_2 09:35:09 jim
23.02.2018
Tax 11:16:20 jim
National Identification Number 11:10:37 jim
Social Security 11:07:43 jim
Medicare 11:05:50 jim
Smart-On-FHIR profile 11:03:36 jim
Tax avoidance 11:02:53 jim
Tax Evasion 11:00:54 jim
Indirect Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Payroll Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Direct Tax 10:56:56 jim Direct Taxes ==> Direct Tax
United States Federal Agency 10:52:09 jim
United States Social Security Administration 10:50:17 jim
SSA 10:47:51 jim
Taxes 10:47:17 jim
Centers for Medicare and Medicaid Services 10:36:31 jim
TANF 10:34:54 jim
Temporary Assistance for Needy Families 10:34:35 jim
Supplemental Security Income 10:32:05 jim
Government Benefit 10:31:19 jim
Social Security Act 10:20:04 jim
Medicaid 10:19:16 jim
Federal Health Care Law 10:13:22 jim
OASDI 10:09:18 jim
Old-Age, Survivors, and Disability Insurance 10:09:02 jim
Year 1935 09:35:50 jim
National Provider Identifier 09:22:39 jim
NPI 09:19:05 jim
Fast Healthcare Interoperability Resources 09:08:31 jim
22.02.2018
Why OpenID Connect 17:47:00 jim
Why OAuth 2.0 17:37:24 jim
Web Blog_blogentry_200615_1 17:37:02 jim
Man-In-The-Middle 12:00:03 jim
Historic 11:57:21 jim
Internet Official Protocol Standards 11:53:24 jim
RFC 2700 11:51:33 jim
RFC 2800 11:45:37 jim
RFC 2900 11:43:52 jim
RFC 3000 11:43:00 jim
RFC 3300 11:41:12 jim
RFC 3700 11:37:05 jim
RFC 3600 11:36:38 jim
Internet Standard 11:26:09 jim
Bluetooth 11:24:24 jim
Informational 11:22:05 jim
HTTP 100 11:21:21 jim
Draft Standard 11:13:54 jim
Standard 11:13:14 jim
Not All RFCs are Standards 11:11:32 jim
Open Standard 11:06:54 jim
Open Access 11:05:38 jim
Ambiguous 11:01:15 jim
Specification 11:00:02 jim
Special Interest Group 10:57:11 jim
SIG 10:55:07 jim
Web Blog_blogentry_220218_1 10:51:21 jim
SPDY 10:19:25 jim
Hypertext Transfer Protocol Version 2 10:13:41 jim
RFC 7540 10:10:54 jim
RFC 2068 10:09:39 jim
HTTP2 10:08:26 jim
Opportunistic encryption 10:03:36 jim
RFC 8164 10:01:42 jim
RFC 7435 10:00:02 jim
RFC 7345 09:59:19 jim
Opportunistic Security 09:54:08 jim
Opportunistic TLS 09:53:16 jim
RFC 7672 09:44:42 jim
LDAPS 09:42:04 jim
StartTLS 09:38:30 jim
21.02.2018
Clock skew 09:54:47 jim
Nbf 09:52:46 jim
Kerberos Error Codes 09:51:41 jim
Exp 09:50:50 jim
19.02.2018
OAuth Token Request 18:24:03 jim
OAuth Token Response 18:17:53 jim
Authorization Request 17:27:45 jim
Authorization Request Parameters 17:23:32 jim
Authorization Grant 17:14:08 jim
17.02.2018
Logistic Regression 08:47:19 jim
16.02.2018
LDIF Generator 17:21:44 jim
15.02.2018
EditFindAndReplaceHelp 14:22:11 jim
TextFormattingRules 14:20:43 jim
Jim 14:17:55 jim
Jim Willeke Resume 13:59:45 jim
Recommended 13:53:55 jim
Biometric data 13:44:46 jim
LDAP 13:43:00 jim
Business to Employee 13:39:51 jim
AD 13:38:14 jim
Decade 13:36:55 jim
WikiName 13:30:23 jim
Image Styles 13:25:52 jim
Haddock Template 13:24:42 jim
Image Styles/woman-face.jpg 13:22:20 jim woman-face.jpg
Image Styles/poppy-small.jpg 13:22:01 jim poppy-small.jpg
Image Styles/haddock.jpg 13:21:36 jim haddock.jpg
Image Styles/bear-big.jpg 13:21:09 jim bear-big.jpg
Pic/net.png 13:01:15 jim net.png
Pic 12:58:39 jim
Image 12:46:15 jim
Pic/yahoo.png 12:38:37 jim yahoo.png
Pic/blueDot.png 12:34:32 jim blueDot.png
Pic/windows.png 12:31:02 jim windows.png
Pic/xml.png 12:21:33 jim xml.png
Pic/update.png 12:21:11 jim update.png
Pic/tech.png 12:20:55 jim tech.png
Pic/smile.png 12:19:52 jim smile.png
Pic/rss.png 12:09:44 jim rss.png
Pic/rdf.png 12:09:13 jim rdf.png
Pic/phone.png 12:08:51 jim phone.png
Pic/personal.png 12:08:34 jim personal.png
Pic/perl.png 12:08:15 jim perl.png
Pic/people.png 12:07:48 jim people.png
Pic/pdf.png 12:07:26 jim pdf.png
Pic/paperclip_xsm.png 12:07:09 jim paperclip_xsm.png
Pic/paperclip_sm.png 12:06:52 jim paperclip_sm.png
Pic/note.png 12:05:36 jim note.png
Pic/news.png 12:04:54 jim news.png
Pic/new.png 12:04:36 jim new.png
Pic/music.png 12:04:03 jim music.png
Pic/movies.png 12:03:41 jim movies.png
Pic/mail.png 12:03:20 jim mail.png
Pic/mac.png 12:02:40 jim mac.png
Pic/linux.png 12:02:23 jim linux.png
Pic/java.png 12:02:01 jim java.png
Pic/grouchy.png 12:01:38 jim grouchy.png
Pic/downGreenArrow.png 11:46:55 jim downGreenArrow.png
Pic/dev.png 11:46:35 jim dev.png
Pic/computer.png 11:46:10 jim computer.png
Pic/cb_on.png 11:45:45 jim cb_on.png
Pic/books.png 11:41:43 jim books.png
Pic/cb_off.png 11:41:19 jim cb_off.png
Pic/INFO.jpg 11:40:27 jim INFO.jpg
WikiVariables 11:28:51 jim
SystemInfo 11:09:12 jim
SearchPageHelp 11:03:08 jim
SandBox 11:01:34 jim
RecentChanges 10:57:40 jim
PageAlias 10:53:54 jim
OneMinuteWiki 10:50:54 jim
JSPWiki-2.10.3 10:50:03 jim
Community 10:44:55 jim
Main 10:34:22 jim
LoginHelp 10:30:09 jim
InstallationTips 10:25:03 jim
EditPageHelp 10:18:22 jim
14.02.2018
Web Blog_blogentry_140218_1 10:10:47 jim
08.02.2018
Amazon Simple Storage Service 12:31:33 jim
Authenticated Encryption with Associated Data 09:03:47 jim
07.02.2018
LDAP Descriptor 12:34:42 jim
Attribute-Names 12:29:28 jim
ObjectClasses 12:27:25 jim
Name Form Description 11:16:43 jim
Matching Rule Use Description 11:16:17 jim
Matching Rule Description 11:15:43 jim
DIT Structure Rule Description 11:14:50 jim
ObjectIdentifierFirstComponentMatch 10:54:56 jim
2.5.21.7 10:46:48 jim
NameForms 10:46:19 jim
Name Form 10:45:44 jim
1.3.6.1.4.1.1466.115.121.1.17 10:37:40 jim
DITStructureRules 10:37:22 jim
2.5.21.1 10:34:51 jim
2.5.20.1 10:25:29 jim
Schema 09:53:24 jim
Apache Hadoop 09:47:27 jim
Google Cloud Storage 09:46:01 jim
05.02.2018
Paxos Protocol 13:55:41 jim
Distributed Consensus 13:51:17 jim
Chubby Lock Service 13:51:06 jim
Reliable Asynchronous Event Transport 12:05:55 jim
RAET 12:04:37 jim
Plenum Byzantine Fault Tolerant Protocol 11:59:18 jim
Federated Byzantine Agreement 11:40:42 jim
Stellar Consensus Protocol 11:40:11 jim
Ripple Consensus Protocol Algorithm 11:32:00 jim
Proof-of-Stake 11:23:56 jim
PoW 11:03:15 jim
Proof-of-Work 11:02:48 jim
PBFT 10:53:28 jim
Practical Byzantine Fault Tolerance 10:53:11 jim
RBFT 10:50:05 jim
Redundant Byzantine Fault Tolerance 10:49:45 jim
Web Blog_blogentry_050218_1 10:45:09 jim
Model 10:12:27 jim
04.02.2018
Linux Foundation 09:27:44 jim
Linux 09:25:31 jim
Hyperledger 09:17:28 jim
02.02.2018
MiTM 10:07:24 jim
HTTPS Inspection 09:59:49 jim
TLS Proxy 09:50:39 jim
HTTPS Interception 09:45:57 jim
HTTPS Interception Weakens TLS Security 09:45:19 jim
Legal TLS Interception 09:34:56 jim
Web Blog_blogentry_271215_1 09:32:12 jim
Certificate Validation Tools 09:31:43 jim
RFC 5246 09:22:54 jim
24.01.2018
IDN homograph attack 09:29:50 jim
IDN 09:26:29 jim
Internationalized Resource Identifiers 09:20:39 jim
URIs, URLs, and URNs 09:15:06 jim
BCP 190 08:55:07 jim
BCP 212 08:54:38 jim
Best Current Practice 08:52:48 jim
21.01.2018
Digital Subject 09:19:11 jim
17.01.2018
Authorization API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
Protection API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
UMA Implementer Guide 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
12.01.2018
Java Card 08:59:09 jim
10.01.2018
2.5.13.1 10:10:16 jim
Identity Function 08:55:46 jim
08.01.2018
DTD 09:42:43 jim
Document type definition 09:42:15 jim
XML Schema Definition Language 09:36:40 jim
XSD 09:36:18 jim
XML schema 09:32:59 jim
Extensible Resource Descriptor 09:25:41 jim
XRD 09:24:11 jim
Host-meta 09:17:51 jim
LRDD 09:17:21 jim
Link-based Resource Descriptor Documents 09:17:03 jim
Web host-meta data 09:05:10 jim Web Host Metadata ==> Web host-meta data
07.01.2018
Doc Searls 10:51:16 jim
Harvard University 10:42:51 jim
Berkman Center for Internet & Society 10:41:42 jim
ProjectVRM 10:37:05 jim
Kinit 10:33:45 jim
RSA 10:30:54 jim
FreeIPA 10:30:34 jim
Year 1861 10:29:57 jim
MIT 10:29:29 jim
Massachusetts Institute of Technology 10:29:14 jim
Kerberos 10:26:57 jim
OPAL 10:22:44 jim
Open Algorithm 10:22:03 jim
OPAL Project 10:21:46 jim
OpenPDS 10:14:43 jim
CoreID 10:08:54 jim
MIT TRUST DATA CONSORTIUM 09:57:33 jim
MIT Internet Trust Consortium 09:55:17 jim
MITREid Connect 09:48:44 jim
MITRE Corporation 09:44:17 jim
05.01.2018
MAD Determine the Classes Associated With an Entry 14:16:59 jim
1.2.840.113556.1.5.6 14:14:58 jim
SecurityPrincipal 14:14:28 jim
1.2.840.113556.1.4.221 13:56:22 jim
04.01.2018
Cash 22:55:27 jim
Curity 22:31:15 jim
Customer Identification Program 17:07:25 jim
Know Your Customer 17:06:04 jim
Block 11:12:18 jim
Pay To Script Hash 11:02:39 jim
P2SH 11:00:05 jim
Pay-To-Public-Key-Hash 10:58:32 jim
P2PKH 10:57:33 jim
Bitcoin address 10:49:03 jim
Target Resource 09:49:38 jim
Protected Resource 09:48:07 jim
Email 09:43:53 jim
Simple Mail Transfer Protocol 09:43:11 jim
Telecommunications 09:40:27 jim
Permissionless System 09:04:44 jim
03.01.2018
Zcash 20:00:47 jim
Monero 19:48:27 jim
Best Practices For Unique Identifiers 16:09:16 jim
Machine Learning Taxonomy 15:58:07 jim
Feedforward Neural network 15:56:44 jim
Mapping function 15:55:12 jim
Features 15:52:47 jim
Dependent variables 15:49:37 jim
Independent variable 15:49:06 jim
Linear Regression 15:48:15 jim
Regression Trees 15:43:57 jim
Regression analysis 15:41:22 jim
Regression 15:40:56 jim
Least Absolute Shrinkage and Selection Operator 15:31:11 jim
RSS 15:30:25 jim
Sum of Squared Errors 15:29:56 jim
Residual Sum of Squares 15:29:15 jim
LASSO 15:24:38 jim
Regularization 15:24:02 jim
Ordinary Least Squares 15:23:25 jim
Ridge Regression 15:17:47 jim
Dropout Regularization 15:11:06 jim
Hyperparameters 14:40:17 jim
02.01.2018
Perceptron 15:21:48 jim
Perceptron/perceptron.jpg 15:20:30 jim
ACH 14:53:28 jim
Federal Reserve Wire Network 14:41:32 jim
Machine Learning 13:31:36 jim
Feature detection 13:27:32 jim
Lowercase 13:22:44 jim
UPPERCASE 13:22:31 jim
Case-sensitive 13:22:18 jim
Cluster analysis 13:15:14 jim
Stimulus-Response 13:13:54 jim
Ground truth 13:13:25 jim
Reinforcement learning 13:12:06 jim
Classification Trees 12:54:47 jim
Supervised Learning/Supervised Learning.png 12:38:24 jim
Unsupervised Learning 12:23:38 jim
Regularization/l2-term.png 11:59:52 jim
Overfitting 11:36:41 jim
Cost function 11:35:05 jim
Learning 10:23:34 jim
Inductive Learning 10:22:43 jim
Evidence 10:21:57 jim
Episodic Learning 10:21:23 jim
Machine Learning model 10:06:40 jim
Variance error 10:02:57 jim
Bias error 10:02:21 jim
Hidden layer 09:44:44 jim
Input layer 09:43:36 jim
Output node 09:40:37 jim
Loss function 09:38:24 jim
Underfitting 09:35:31 jim
Target Function 09:33:40 jim
01.01.2018
Scalar 09:58:04 jim
Backpropagation 09:13:41 jim
Algorithm 09:08:14 jim
31.12.2017
JSON Resource Descriptor 21:20:35 jim
Classification and Regression Trees 11:43:13 jim
Classification and Regression Trees/Example-Decision-Tree.png 11:36:22 jim
CART 11:19:37 jim
Web Blog_blogentry_311217_1 11:11:22 jim
28.12.2017
Probabilistic Neural Network 14:01:53 jim
Classification 13:34:52 jim
Artificial Neural network 13:22:50 jim
Gradient descent 11:30:37 jim
Pseudorandom function 11:26:17 jim
Sigmoid function 11:23:46 jim
Exponential function 11:21:33 jim
Logistic function 11:18:28 jim
Eigenvector 11:06:53 jim
27.12.2017
Matrix multiplication 12:37:19 jim
Matrix multiplication/vector-multiplication.png 12:32:37 jim
Linear transformation 12:28:38 jim
Matrix 12:23:21 jim
Vector 12:08:04 jim
Unitary matrix 12:06:52 jim
Basis vectors 12:03:36 jim
Identity matrix 11:59:10 jim
Identity matrix/identity-matrix.png 11:53:35 jim identity-matrix
Matrices 11:48:00 jim
Array 11:45:32 jim
Matrix/Matrix.svg.png 11:37:40 jim Matrix
26.12.2017
Loss function/Screen Shot 2017-12-26 at 06.51.34.png 11:52:31 jim Loss Function
Cost function/Screen Shot 2017-12-26 at 06.17.00.png 11:17:46 jim Cost Function
Mean Squared Error 10:58:59 jim
Mean Squared Error/Screen Shot 2017-12-26 at 05.56.09.png 10:57:02 jim MSE
Input neuron 10:27:11 jim
Convolutional Neural Network 10:25:56 jim
Sigmoid neuron 10:20:02 jim
MLP 10:13:04 jim
Activation Function 10:11:33 jim
25.12.2017
Double Ratchet Algorithm 08:49:41 jim
Password-Based Key Derivation Function 08:48:32 jim
PKCS5 08:48:01 jim
PBKDF2 08:47:37 jim
KDF 08:46:29 jim
Web Blog_blogentry_251217_1 08:42:20 jim
24.12.2017
BTF 12:07:31 jim
Bitcoin Faith 12:07:11 jim
Bitcoin Gold 12:01:49 jim
Bitcoin 11:56:52 jim
BCD 11:53:53 jim
Bitcoin Diamond 11:49:15 jim
BCH 11:40:18 jim
Bitcoin Cash 11:39:59 jim
BTG 11:39:20 jim
BTC 11:38:33 jim
Consent Receipts 09:59:52 jim
Consent 09:01:03 jim
23.12.2017
Funds Transfer System 16:11:40 jim
Society for Worldwide Interbank Financial Telecommunication 16:09:20 jim
Payment Network 16:04:41 jim
CHIPS 16:01:22 jim
Fedwire 15:47:16 jim
Federal Reserve 15:40:20 jim
FedACH 15:30:44 jim
EPN 15:27:56 jim
Savings Account 15:04:22 jim
FOMC 14:09:20 jim
National Bank 14:05:51 jim
Federal Open Market Committee 13:58:15 jim
FRB 13:52:26 jim
FDIC 13:40:21 jim
National Bank Act 13:38:54 jim
OCC 10:35:38 jim
Web Blog_blogentry_231217_1 10:31:25 jim
Third-party Risk 10:24:55 jim
21.12.2017
USCB 15:10:52 jim
United States Census Bureau 15:10:28 jim
Electoral College 15:08:56 jim
Consumer Credit Reporting Agency 14:56:39 jim
Experian 14:50:47 jim
Web Blog_blogentry_211217_1 14:48:19 jim
Certificate Validation 11:13:36 jim
CA-Browser Forum 10:52:02 jim
Certification Authority Browser Forum 10:50:36 jim
20.12.2017
Protection API Token 19:31:07 jim
Grant Types 10:24:35 jim
Sociality 10:13:24 jim
JSPWiki Community 10:08:40 jim
Partner API 10:07:33 jim
Sovereignty 10:06:43 jim
Currency 09:49:32 jim
Central Banking System 09:41:34 jim
FED 09:38:09 jim
Routing Transit Number 09:33:17 jim
Federal Reserve Act 09:31:42 jim
Year 1913 09:19:48 jim
Future Prediction 09:06:24 jim
SAE International Levels of Driving Automation 08:57:00 jim
Autonomous Automobile 08:53:27 jim
Web Blog_blogentry_201217_1 08:49:48 jim SAE InternationalS Levels of Driving Automation ==> SAE International Levels of Driving Automation
Web Blog_blogentry_111017_1 08:25:16 jim
United States Code 08:11:27 jim
18 U.S.C. 08:04:31 jim
Computer Fraud and Abuse Act 08:03:27 jim
19.12.2017
Subscriber Identification Module 12:32:45 jim
Mobile Station International Subscriber Directory Number 12:03:20 jim
International Mobile Subscriber Identity 12:01:07 jim
Digital Subscriber Line 11:51:06 jim
Local Exchange 11:49:08 jim
Telephone Line 11:46:17 jim
Phone Number 11:43:35 jim
NDC 11:39:57 jim
PBX 11:38:49 jim
Private Branch Exchange 11:38:29 jim
Subscriber Number 11:37:49 jim
National Destination Code 11:37:18 jim
Telephone Numbering Plan 11:36:06 jim
Mobile Network Code 11:12:21 jim
Integrated Circuit Card Identifier 11:07:48 jim
Account Number 11:01:57 jim
ROC 09:58:03 jim
PRC 09:57:35 jim
China 09:56:57 jim
India 09:55:40 jim
Issuer Identification Number 09:54:02 jim
Operation Aurora 09:53:28 jim
Collapsible List 09:44:22 jim
Group of 20 09:40:21 jim
Aadhaar 09:39:03 jim
Web Blog_blogentry_191217_1 09:26:52 jim
18.12.2017
API-Gateway 12:01:16 jim
KuppingerCole 11:59:06 jim
Martin Kuppinger 11:57:05 jim
Groupthink 09:53:51 jim
Groupthink/1200-608292-the-psychological-phenomenon-of-groupthink.jpg 09:53:14 jim groupthink
Bias 09:50:58 jim
Psychological phenomenon 09:48:09 jim
Web Blog_blogentry_181217_1 09:36:12 jim
CEO 09:30:00 jim
Alphabet Inc 09:29:22 jim
American 09:24:49 jim
Google X 09:23:15 jim
Verily 09:21:22 jim
Waymo 09:19:27 jim
Google 09:11:15 jim
AppConfig Community 09:05:08 jim
De-anonymization 08:34:34 jim
17.12.2017
Gemalto 19:25:58 jim
Open Badges 16:08:27 jim
Employer 11:32:56 jim Employers ==> Employer
Administrative Identity 11:31:49 jim
Education 11:30:44 jim
InCommon 11:30:33 jim
Educational Entity 11:28:17 jim
Blockcerts 10:50:39 jim
RTXP 10:33:33 jim
XRP 10:22:15 jim
Permissioned Systems 10:02:48 jim
Certificate Revocation 09:55:05 jim
Cancelable Biometrics 09:52:46 jim
Credential Revocation 09:50:37 jim
Consent Revocation 09:49:34 jim
NIST.SP.800-63B 09:47:04 jim
Smart contracts 09:39:28 jim
Merkle Tree 09:25:21 jim
16.12.2017
LeftMenu 16:23:48 jim
15.12.2017
Serverless 11:02:18 jim
13.12.2017
Implantable Myoelectric Sensor 15:43:32 jim
Web Blog_blogentry_131217_1 15:38:41 jim
Strength of Function for Authenticators - Biometrics 13:25:27 jim
12.12.2017
Liveness Detection 16:09:41 jim
Advanced Persistent Threat 15:47:50 jim
Opportunistic Attack 15:45:22 jim
Targeted Attack 15:43:11 jim
Attack 15:39:11 jim
Presentation Attack Detection 15:21:08 jim
Cross-site request forgery 15:19:47 jim
Mallory 15:16:58 jim
Presentation Attack 15:16:22 jim
Imposter 15:15:11 jim
Strength of Function for Authenticators 15:01:08 jim
11.12.2017
Softmax function 10:18:18 jim
Exponential function/expo-function.jpg 10:16:44 jim expo-function
Logistic function/LogReg_1.png 10:10:14 jim LogisticRegression
Logistic function/Logistic-curve640px.png 10:01:10 jim Logistic-curve640px
Web Blog_blogentry_111217_1 09:07:25 jim
10.12.2017
Rectified Linear Unit 20:18:59 jim
ReLU 17:03:33 jim
09.12.2017
Output layer 20:47:39 jim
Vectors of Trust 19:48:43 jim
Privacy Considerations Distributed Ledger Technology 11:17:19 jim
Anonymous bind 11:08:25 jim
Anonymity Set 11:04:07 jim
Anonymous Identity 11:02:51 jim
Anonymous 11:01:09 jim
RFC 3261 10:58:35 jim
RFC Editor 10:41:19 jim
RFC 4844 10:38:40 jim
RFC Author 10:31:05 jim
STYLE-WEB 10:29:02 jim
RFC Style Guide 10:21:25 jim
RFC 7322 10:12:03 jim
RFC 2223 10:11:30 jim
Guidelines for Writing RFC Text on Security Considerations 10:08:24 jim
RFC 3552 10:05:41 jim
BCP 72 10:02:32 jim
Security Considerations 10:01:31 jim
Key words for use in RFCs to Indicate Requirement Levels 09:52:31 jim
BCP 14 09:45:25 jim
BCP 9 09:44:34 jim
08.12.2017
ApacheDS 12:58:54 jim
LDAP Server Implementations 12:57:38 jim
Apache Fortress 12:56:14 jim
INCITS 359-2012 12:55:13 jim
INCITS 359-2004 12:54:54 jim
INCITS 359 12:54:30 jim
Apache Directory Project 12:42:24 jim
NIST RBAC 12:40:30 jim
INCITS 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
International Committee for Information Technology Standards 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
Solaris 12:26:15 jim
Berkeley Software Distribution 12:24:26 jim
BSD 12:19:16 jim
Determine OS Version 12:18:30 jim
Certificate Version 11:58:00 jim
Server 11:55:26 jim
LdapServer 11:54:48 jim
2.16.840.1.113719.1.6.6.1 11:54:21 jim
2.16.840.1.113719.1.450.6.100 11:54:09 jim
2.16.840.1.113719.1.33.6.1 11:53:40 jim
2.16.840.1.113719.1.27.6.2 11:53:29 jim
2.16.840.1.113719.1.138.6.1.1 11:53:15 jim
2.16.840.1.113719.1.1.6.1.22 11:52:46 jim
2.16.840.1.113719.1.1.4.1.112 11:52:23 jim
Version (LDAP Attribute) 11:51:59 jim Version x (LDAP Attribute) ==> Version (LDAP Attribute)
SEPOS 11:30:55 jim
Secure Enclave 11:26:41 jim
Java Authentication and Authorization Service 11:19:00 jim
I2C 11:17:37 jim
UART 11:13:37 jim
General-purpose input-output 11:12:53 jim
GPIO 11:10:19 jim
Secure Element 10:53:08 jim
Reliability 10:35:40 jim
Reasoning 10:34:14 jim
Converting Certificate Formats 09:57:34 jim
NIS To LDAP Tool 09:57:06 jim
Import Conversion Export 09:53:56 jim
LDAP Data Interchange Format 09:53:12 jim
Screen Scraping 09:52:56 jim
Data Scraping 09:52:41 jim
Data Extraction Transformation 09:52:13 jim
Web scraping 09:47:28 jim
Web Blog_blogentry_081217_1 09:21:59 jim Screen Scraping ==> Data Scraping
Financial Technology 09:16:05 jim
FinTech 09:14:41 jim
No Market Need 09:09:13 jim
06.12.2017
Artificial Neuron 11:52:01 jim
Synapses 11:48:58 jim
Weight 11:06:51 jim
Forward propagation 10:57:21 jim
Python 10:38:52 jim
Deep Neural networks 10:28:23 jim
Pattern-recognition 10:27:56 jim
Computer vision 10:27:28 jim
Deep Learning 10:26:03 jim
Amazon Web Services 09:54:33 jim
AWS Lambda 09:53:37 jim
AWS Cognito 09:52:32 jim
05.12.2017
NdsHomeDirectory 12:01:07 nanda
02.12.2017
MoreMenu/Mail Administrator.vcf 17:08:12 Mandygrove Null mandyscardino
Gong Needham Yahalom logic 09:27:25 jim
Web Blog_blogentry_021217_1 09:19:24 jim
BAN logic 09:12:00 jim
Burrows Abadi Needham logic 09:11:44 jim Burrows--Abadi--Needham logic ==> Burrows Abadi Needham logic
01.12.2017
Legal Entity Identifier 09:27:03 jim
Permid 09:25:40 jim
Financial Stability Board 09:15:17 jim
FSB 09:14:35 jim
G-20 09:10:51 jim
LEI 09:05:14 jim
Web Blog_blogentry_011217_1 08:57:17 jim
29.11.2017
Directory Information Tree 09:49:44 jim
Predictor variable 09:37:31 jim
Summation layer 09:35:33 jim
28.11.2017
OAuth 2.0 Vulnerabilities 19:56:14 jim
Social Security Number 12:20:22 jim
DigiD 12:09:47 jim
Web Blog_blogentry_281117_1 11:58:57 jim
25.11.2017
Multicast 19:21:42 jim
Unicast 19:17:53 jim
Byzantine Fault Tolerance 19:07:35 jim
Swirlds hashgraph consensus algorithm 18:59:15 jim
Gossip protocol 18:54:53 jim
Hashgraph 18:49:23 jim
Web Blog_blogentry_251117_1 18:40:34 jim
Web Blog_blogentry_270815_1 18:39:01 jim
U-Prove 18:38:24 jim
Separation of Duty 18:36:49 jim
Collusion 18:34:50 jim
PNN 11:41:29 jim
Hidden node 11:28:28 jim
Perception 11:00:44 jim
Speech recognition 10:58:47 jim
Sound recognition 10:57:37 jim
Classifier 10:47:36 jim
Sensor 10:13:45 jim
NLP 10:09:39 jim
Voice recognition 10:08:04 jim
Natural Language Processing 10:03:33 jim
Taxonomy 09:43:31 jim
24.11.2017
Sigmoid function/stock-vector-sigmoid-function-451998487.jpg 12:57:08 jim sigmoid-function
Relational Learning 12:38:10 jim
Motor Learning 12:37:11 jim
Observational Learning 12:36:12 jim
Spatial Learning 12:30:23 jim
Auditory Learning 12:30:05 jim
Understanding DIT Structure Rules 12:24:07 jim
Inheritance 12:22:42 jim
Placement Policy Set 12:22:31 jim
GCP Resource 12:21:45 jim
Forest Root Domain 12:21:16 jim
Directory Partition Hierarchy 12:20:41 jim
RBAC Hierarchical 12:19:04 jim
Hierarchical 12:18:02 jim
OID 12:17:01 jim
Hierarchy 12:15:03 jim
NAME 12:13:19 jim
Variable 12:12:46 jim
Shift Invariant Artificial Neural Network 11:42:51 jim
Space Invariant Artificial Neural Network 11:41:49 jim
SIANN 11:37:49 jim
CNN 11:28:44 jim
23.11.2017
OAuth 2.0 NOT an Authentication protocol 11:29:45 jim
21.11.2017
10BASE-T 11:41:40 jim
History of LDAP 11:41:11 jim
Z-Wave 11:28:53 jim
Z-Wave Primary Controller 11:23:36 jim
Z-Wave Controller 11:21:17 jim
Manchester code 11:18:15 jim
Z-Wave Home ID 11:13:39 jim
Z-Wave Node ID 11:11:56 jim
Z-Wave Network 10:54:38 jim
Z-Wave Node 10:51:41 jim
RFC 0793 10:47:47 jim
CBOR Object Signing and Encryption 10:43:48 jim
Strategies for Using Power for Communication 10:40:06 jim
Classes of Energy Limitation 10:36:56 jim
Scaling Properties 10:35:52 jim
LoWPAN 10:35:16 jim
Low-Power and Lossy Network 10:33:30 jim
Constrained Nodes 10:26:41 jim
Device 10:22:21 jim
Unified Extensible Firmware Interface 10:17:39 jim
EFI 10:14:40 jim
Extensible Firmware Interface 10:14:23 jim
UEFI 09:51:17 jim
Firmware 09:50:29 jim
Basic Input-Output System 09:47:05 jim
BIOS 09:44:34 jim
Web Blog_blogentry_211117_1 09:38:52 jim
20.11.2017
WholeSubtree 17:20:08 OrangeDog Completely wrong: was describing SubordinateSubtree
Trusted Execution Environment 00:49:51 jim
16.11.2017
HTTP 101 14:30:16 jim
URL redirection 14:08:30 jim
API Economy 13:19:27 jim
Resource Owner Password Credentials Grant 00:26:14 jim
Resource Owner Password Credentials Grant/OAuth2 — Resource Owner Password Credential Grant.jpg 00:24:45 jim Resource Owner Password Credential Grant
15.11.2017
Well-Known URIs 14:06:47 jim
Well-known 14:04:20 jim
WebFinger 13:29:01 jim
Web Linking 13:13:36 jim
QUIC 02:30:31 jim
Quick UDP Internet Connections 02:29:16 jim
User Datagram Protocol 02:22:24 jim
14.11.2017
Eran Hammer 14:25:49 jim
RFC 5849 14:06:35 jim
RFC 6749 14:05:59 jim
OAuth 14:03:37 jim
WEB Access Management 13:41:03 jim
Access Control Service 13:37:36 jim
Access Control Engine 13:35:03 jim
RFC 4949 13:32:22 jim
Diffie-Hellman key-exchange 12:47:25 jim
OAuth 2.0 for Native Apps 12:42:04 jim
12.11.2017
Client_id 20:41:38 jim
Creating an OAuth 2.0 Client Application 20:35:17 jim
Open Trust Taxonomy for OAuth2 20:00:48 jim
User-Managed Access 19:49:28 jim
RqP 19:29:39 jim
Requesting Party 19:28:25 jim
JSON Web Algorithms 14:49:28 jim
JSON Object Signing and Encryption Registry 14:44:23 jim
JSON Web Key Types 14:43:45 jim
JWK Set 14:42:30 jim
Jwks_uri 14:25:12 jim
JWK 14:08:57 jim
OAuth Dynamic Client Registration Metadata 14:06:48 jim
Jwks 14:05:12 jim
11.11.2017
Year 1959 14:22:58 jim
Neuron 14:21:44 jim
Learn 14:11:54 jim
Problem Solving 13:56:32 jim
Linguistic 13:55:32 jim
08.11.2017
Mutual TLS Sender Constrained Resources Access 14:10:09 jim
Digital certificate request 13:58:14 jim
OAuth Token Endpoint Authentication Methods 13:28:01 jim
OAuth Parameters Registry 13:16:54 jim
Certificate-based Authentication 12:59:30 jim
Non-Repudiation 12:57:25 jim
Certificate Chain 12:53:45 jim
07.11.2017
Virtual Integrated Network Service 18:06:00 jim
StreetTalk 18:04:45 jim
IEEE 802.11 17:51:22 jim
XNS 17:34:47 jim
Xerox Network Systems 17:33:06 jim
VINES 17:22:24 jim
Banyan VINES 17:19:21 jim
VINES Internetwork Protocol 17:14:32 jim
Directory Service 17:11:27 jim
Linked Data 13:18:22 jim
JSON for Linking Data 13:18:05 jim
04.11.2017
Schema Extensions 13:37:50 jim
03.11.2017
Determining the FDN 16:40:49 jim
02.11.2017
Ian Glazer 21:24:23 jim
Edge Proxy 14:18:22 jim
Web Blog_blogentry_021117_1 14:16:12 jim
30.10.2017
DNS Certification Authority Authorization 09:42:40 jim
RR 09:34:59 jim
RFC 6844 09:30:17 jim
CAA 09:28:18 jim
User-agent 09:21:23 jim
HPKP 09:19:44 jim
Public Key Pinning Extension for HTTP 09:19:20 jim
Certificate Transparency 09:17:48 jim
29.10.2017
JSON-LD Examples 15:33:38 jim
28.10.2017
JAN 19:35:37 jim
Japanese Article Number 19:35:18 jim
Global Trade Item Number 19:34:08 jim
International Article Number 19:32:46 jim
ISO 10957 19:31:51 jim
ISMN 19:30:44 jim
International Standard Music Number 19:30:24 jim
ISSN 19:27:25 jim
International Standard Serial Number 19:27:02 jim
European Article Number 19:23:42 jim
International Standard Book Number 19:14:26 jim
ISBN 19:10:19 jim ISBNs ==> ISBN
Manufacturer Code 19:08:26 jim
Product Code 19:08:10 jim GS1 Prefix ==> GS1 Company Prefix
Check Digit 19:01:49 jim
EAN 18:44:08 jim
GS1 18:43:22 jim
Universal Product Code 18:40:57 jim
Google Group 14:38:32 jim
27.10.2017
Universal Links 11:59:06 jim
AppAuth 11:48:05 jim
IOS.URIScheme 11:45:33 jim
Private-Use URI Scheme Redirection 11:40:03 jim
Claimed Https Scheme URI Redirection 11:39:52 jim
Loopback Interface Redirection 11:39:34 jim
OAuth 2.0 Client Registration 11:39:20 jim
Private URI Scheme 11:21:38 jim
Custom URI scheme 10:58:39 jim
RFC 7595 10:56:46 jim
Web Blog_blogentry_261215_1 10:23:02 jim
SFSafariViewController 10:22:30 jim
OpenID Connect Use Cases 10:21:21 jim
OAuth Public Client 10:20:47 jim
Custom URI scheme pattern 10:13:08 jim
Same-Document Reference 09:26:27 jim
Absolute URI 09:09:24 jim
Cleartext 08:56:56 jim
Plaintext 08:56:33 jim
URI Schemes 08:48:14 jim
Password Storage Scheme 08:41:49 jim
RC4 08:39:27 jim
Authentication Password Syntax 08:31:58 jim
SupportedAuthPasswordSchemes 08:28:29 jim
AuthPasswordSyntax 08:22:13 jim
AuthPasswordObject 08:17:36 jim
AuthPassword 08:14:12 jim authPassword ==> AuthPassword
RFC 3112 08:13:50 jim
GroupOfEntries 08:03:39 jim
LDAP Group 08:00:46 jim
GroupOfNames 07:57:28 jim
26.10.2017
Media Access Control 13:40:20 jim
LLC 13:24:44 jim
Media Access Control Address 13:21:06 jim
IEEE 802.3 13:19:38 jim
IEEE 802.15.1 13:17:54 jim
Certificate Pinning 12:52:51 jim
IMT-Advanced 12:50:16 jim
3rd Generation Partnership Project 12:48:25 jim WiFi ==> Wi-Fi
Wi-Fi 12:48:25 jim WiFi ==> Wi-Fi
General Packet Radio Service 12:42:29 jim
3GPP 12:41:10 jim
ETSI 12:40:48 jim
European Telecommunications Standards Institute 12:40:27 jim
5G-ENSURE 12:33:52 jim
5G 12:33:12 jim
LTE 12:28:12 jim
Long Term Evolution 12:27:57 jim
International Telecommunication Union 12:25:46 jim
ITU Radiocommunication Sector 12:18:37 jim
ITU-R 12:17:39 jim
Web Blog_blogentry_261017_1 12:04:06 jim
Responsive Organizations 11:46:27 jim
15.10.2017
Provenance 10:14:52 jim
JSON-LD 09:49:56 jim
Inspector-verifier 09:46:48 jim
Holder 09:44:37 jim
Verifiable Claims 09:38:25 jim
Identifier 09:00:05 jim
14.10.2017
Leap year 09:12:05 jim
Day 09:06:15 jim
Minute 08:59:11 jim
Coordinated Universal Time 08:49:45 jim
UTC 08:48:53 jim
DateTime 08:46:31 jim
Week 08:34:19 jim
Month 08:26:42 jim
Calendar 08:25:10 jim Months ==> Month
Year 1952 08:14:33 jim
13.10.2017
PADME 11:34:27 jim
Policy Access Decision Management Engine 11:33:56 jim
Policy Based Management System 11:32:03 jim
Istio 11:29:02 jim
SPIFFE 11:17:52 jim
Secure Production Identity Framework For Everyone 11:17:20 jim
Open Policy Agent 11:10:52 jim
OPA 11:08:31 jim
12.10.2017
SPARQL 13:23:11 jim
GCP Cloud VPN 08:41:08 jim
Web Blog_blogentry_121017_1 08:39:39 jim
Google Cloud Security 08:38:25 jim
GRPC 08:33:14 jim
11.10.2017
VR 16:02:54 jim
AR 16:02:38 jim
Virtual Reality 16:02:15 jim
Augmented Reality 16:00:40 jim
Web Hypertext Application Technology Working Group 09:30:58 jim
Document Object Model 09:27:41 jim
XMLHttpRequest 09:27:09 jim
Single-Page Application 09:26:45 jim
SPA 09:26:21 jim
AJAX 09:25:50 jim
WC3 09:25:22 jim
WHATWG 09:24:04 jim
DOM 09:19:55 jim
OAuth 2.0 Protocol Flows 08:53:37 jim
10.10.2017
Web Blog_blogentry_101017_1 18:43:20 jim
09.10.2017
PCT 18:17:26 jim
Subject Relationship 17:52:53 jim
OAuth 2.0 Actors 17:50:13 jim
07.10.2017
RFC 8252 22:38:51 jim
Web Blog_blogentry_071017_1 22:28:49 jim
Faythe 08:14:52 jim
Key Deletion 08:12:45 jim
Crypto-shredding 08:12:16 jim
06.10.2017
HAL 10:34:51 jim
JSON Hypertext Application Language 10:34:29 jim Hypertext Application Language ==> JSON Hypertext Application Language
05.10.2017
HostServer 12:52:43 jim hostServer ==> HostServer
Year 1987 10:47:28 jim
Perl 10:40:19 jim
NMAS Get Password Request 10:38:28 jim
Universal Password Policy Definitions 10:31:00 jim
What To Do About Passwords 10:30:04 jim
FreeRADIUS Password Request 10:27:44 jim
Remote Authentication Dial-In User Service 10:26:03 jim
RFC 2058 10:17:36 jim
RADIUS 10:10:24 jim
Web Blog_blogentry_051017_1 09:46:31 jim
04.10.2017
Jspwiki.policy 12:38:28 jim
JSPWiki Permission 12:36:48 jim
Using User Attribute Values for Tomcat Roles 12:21:33 jim
WIKI-Security Policy 12:09:58 jim
WIKI-ACLs 11:58:25 jim
WIKI-Roles 11:54:40 jim
JSPWiki Roles and Groups 11:41:56 jim
Dynamic Authorization Management 08:53:49 jim
XACML 08:52:54 jim
Policy Information Block 08:38:49 jim Policy Information Blocks ==> Policy Information Block
PIB 08:38:37 jim
Policy Decision Point 08:15:30 jim
PRP 08:03:32 jim
Policy Retrieval Point 08:03:17 jim
Environment 07:49:07 jim
RFC 2904 07:36:57 jim
03.10.2017
Policy Based Management System/XACML_Architecture_&_Flow.png 21:56:06 jim Policy Based Access Management
Common Active Directory Bind Errors 14:25:41 jim
Countering the Financing of Terrorism 11:00:55 jim
CFT 11:00:41 jim CFT) ==> CFT
EIDV 10:51:48 jim
Web Blog_blogentry_031017_1 10:48:41 jim
Iss 09:02:08 jim
02.10.2017
Spyware 11:47:39 jim
EvilRegime 11:47:19 jim
Web Blog_blogentry_021017_1 11:46:08 jim
22.09.2017
Sovrin Steward 13:48:58 jim
Sovrin Foundation 13:34:52 jim
20.09.2017
Web Blog_blogentry_200917_1 09:09:08 jim
RFC 6410 09:04:49 jim
RFC 2026 09:03:50 jim
FYI 09:02:22 jim
RFC 8174 09:00:21 jim
RFC 2119 08:55:42 jim
Same-site Cookies 08:46:49 jim
CXRF 08:39:58 jim
19.09.2017
Walter 09:40:44 jim
Trent 09:40:23 jim
Sybil 09:39:36 jim
Victor 09:38:56 jim
Peggy 09:38:07 jim
Oscar 09:37:11 jim
Craig 09:35:24 jim
Eve 09:34:08 jim
Bob 09:33:10 jim
Alice 09:32:51 jim
Alice And Bob 09:32:20 jim
Resource Server 09:31:21 jim
Authorization Server 09:29:42 jim
Resource Owner 09:23:51 jim
Actor 09:22:48 jim
14.09.2017
Security Support Provider Interface 10:15:01 jim
Decentralized Identifier 09:33:22 jim
LDAP_SERVER_NOTIFICATION_OID 08:33:30 jim
LDAP Extensions and Controls Listing 08:25:21 jim
13.09.2017
Reputation System 15:01:37 jim
11.09.2017
Card Issuer 20:12:38 jim
07.09.2017
Front-channel communication 08:53:52 jim
OpenID.FrontChannel 08:45:58 jim
OpenID.BackChannel 08:45:30 jim
OpenID.Session 08:44:58 jim
06.09.2017
Web Blog_blogentry_060917_1 11:22:31 jim
31.08.2017
Four-Party Credit Card System 09:01:28 jim
Card Not Present 08:50:19 jim
CNP 08:43:51 jim
28.08.2017
About 10:26:55 jim
REST Profile of XACML 10:14:15 jim
Web Blog_blogentry_231215_1 10:01:27 jim
Authorization 09:59:39 jim
AllAuthenticatedUsers 09:23:59 jim
AllUsers 09:23:22 jim
GCP IAM Policy 09:22:16 jim
GCP Identity 09:16:19 jim
Group 09:07:18 jim
Google Account 09:00:58 jim
27.08.2017
GCP Domain 20:08:19 jim GCP Cloud Identity Domain ==> GCP Domain
Google Cloud IAM 20:01:38 jim
GCP Bucket 19:45:43 jim
GCP Role 19:30:37 jim
25.08.2017
Rinse and Repeat 13:02:43 jim
IMA Interoperability Framework 12:48:27 jim
IMA Policies 12:46:35 jim IMAPolicies ==> IMA Policies
IMA Data Architecture 12:45:30 jim IMADataArchitecture ==> IMA Data Architecture
IMA Technical Reference Architecture 12:42:35 jim IMATechnicalReferenceArchitecture ==> IMA Technical Reference Architecture
Technical Positions Statements 12:38:40 jim TechnicalPositionsStatements ==> Technical Positions Statements
24.08.2017
Web Blog_blogentry_240817_1 07:26:41 jim
23.08.2017
Google App Engine 16:02:07 jim
21.08.2017
Session Affinity 12:14:14 jim
Connection Draining 12:10:39 jim
Web Blog_blogentry_210817_1 12:05:34 jim
GCP Networking Products 10:04:02 jim
VPC 09:59:48 jim
Invalid_scope 08:08:55 jim
Invalid_grant 08:02:58 jim
20.08.2017
OpenID Connect Client 08:46:26 jim
OpenID Connect 08:45:01 jim
19.08.2017
G-Suite User 16:42:40 jim
G-Suite Group 16:42:19 jim
G-Suite Domain 16:41:50 jim
G-Suite 16:40:59 jim
17.08.2017
Access Complexity 09:48:52 jim
Advanced Local Procedure Call 09:40:14 jim
ALPC 09:38:50 jim
Local Procedure Call 09:35:12 jim
LPC 09:31:33 jim
Golden Ticket 09:03:19 jim
16.08.2017
Analytics 19:32:14 jim
Metric Analysis 19:31:29 jim
Gigabyte 19:27:46 jim
Terabyte 19:25:45 jim
PB 19:24:54 jim
Petabyte 19:24:33 jim Terabytes ==> Terabyte
TB 19:24:33 jim Terabytes ==> Terabyte
BigQuery 19:21:05 jim
Google Cloud Platform 19:10:01 jim
GCP Multi-Regional 19:07:05 jim
GCP Location 19:03:24 jim
GCP Zonal 19:00:54 jim
GCP Storage Classes 18:54:54 jim
GCP Cloud Load Balancing 18:52:10 jim
GCP Regional 18:51:50 jim Google Regional ==> GCP Regional
Google Cloud Interconnect 18:35:59 jim
Google Edge Points of Presence 18:23:28 jim
Google Global Cache 18:15:24 jim
Google Data Centers 18:14:58 jim
Google Network Infrastructure 18:07:52 jim
Edge-Node 17:57:04 jim
HBase 11:14:20 jim
GCP Storage Products 11:07:49 jim
Relational Database Management System 11:05:11 jim
RDBMS 10:57:55 jim
15.08.2017
EDirectory 9.0.2.1 (40004.44) 20:23:41 jim
GCP Cloud CDN 10:37:40 jim
Google Cloud DNS 10:32:39 jim
ScaleFT 09:58:45 jim
Google Persistent Disk 09:20:17 jim
Google Cloud DataStore 09:16:40 jim
NoSQL 09:14:16 jim
BigTable 09:12:37 jim
Google Cloud SQL 09:09:50 jim
Google Drive 09:03:50 jim
GCP Compute Products 08:41:21 jim
Web Blog_blogentry_150817_1 08:33:19 jim
Object storage 08:25:00 jim
E-residency 08:11:42 jim
PayPal 08:11:28 jim
14.08.2017
BFT 10:25:29 jim
Two Generals Problem 10:21:26 jim
Fair Information Practices 10:03:01 jim
Create The Vision 10:02:16 jim
JLINC 09:44:36 jim
American National Standards Institute 09:42:27 jim
Stellar Network 09:41:49 jim
Stellar Ledger 09:40:55 jim
Our Approach 09:34:11 jim
We 09:28:55 jim
ContactUs 09:25:34 jim
Informed Consent 09:14:19 jim
13.08.2017
GCP ACL 11:08:22 jim
Durability 10:33:24 jim
12.08.2017
Open Banking Security Profile 22:01:28 jim
Open Banking 21:57:48 jim
GCP Project Owner 11:17:07 jim
Google Cloud Project 11:16:31 jim
GCP Project Creator 11:16:16 jim
GCP Permission 10:58:37 jim
GCP Organizational Viewer 10:35:54 jim
G-Suite Super Admin 10:23:05 jim
GCP Organizational Admin 10:11:06 jim
IT Infrastructure Library 09:08:57 jim
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework 09:07:34 jim
IMA Governance Framework And Organizational Context 09:06:22 jim
The OAuth 2.0 Authorization Framework 09:05:51 jim
Resource Description Framework 09:05:07 jim
Universal Authentication Framework 09:04:10 jim
Mobile Security Framework 09:02:37 jim
Open Identity Trust Framework 08:56:06 jim
HTTP Authentication Framework 08:54:34 jim
.NET 08:48:49 jim
Geneva Framework 08:47:52 jim
Implementation 08:45:05 jim
Design 08:44:35 jim
Trust Framework 08:18:54 jim
Framework 08:16:45 jim
Software Architecture Model 07:57:01 jim
Best Practices 07:53:23 jim
11.08.2017
Google Container Engine 11:49:11 jim
Google Coldline 10:36:43 jim
Google Nearline 10:35:39 jim
Data Store Service 10:32:04 jim
Elasticity 09:21:13 jim
SaaS 09:00:25 jim
Identity as a Service 08:59:52 jim
Identity Relationship Management 08:59:36 jim
Cloud Services Model 08:59:05 jim
Azure 08:58:49 jim
Authentication Challenges 08:58:32 jim
PaaS 08:57:18 jim
Google Compute Engine 08:27:41 jim
10.08.2017
IAP 12:32:39 jim
Gsutil 09:11:06 jim
Gcloud 09:09:57 jim
Google Cloud SDK 09:02:49 jim
Microservice 08:47:59 jim
Polyglot 08:44:26 jim
Atomicity 07:46:21 jim
09.08.2017
Interface Description Language 19:50:16 jim
Distributed Computing Environment 19:48:31 jim
Isolation 19:39:32 jim
Single Responsibility Principle 19:25:23 jim
Google Cloud Client Libraries 14:42:14 jim
Google API Explorer 14:36:24 jim
Google Cloud Shell 14:29:09 jim
Role 13:51:56 jim
GCP 13:36:07 jim
Google Cloud Resource Manager API 13:33:02 jim
Google Cloud Platform Console 13:30:56 jim
Cloud computing 13:30:24 jim
Computing 09:21:18 jim
Data Store 09:10:02 jim
IBM 701 08:24:06 jim
Web Blog_blogentry_090817_1 08:19:50 jim
08.08.2017
Tensors 14:23:32 jim
TensorFlow 13:57:38 jim
Attribute Value Assertion 10:49:44 jim
LDAP URL Extension 10:40:47 jim
2.5.18.5 10:38:48 jim
LDAP Administrative Role 10:38:20 jim
LDAP Schema Element Type 10:27:49 jim
Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) 10:03:49 jim
Lightweight Directory Access Protocol (LDAP) Parameters 10:01:02 jim
AttributeTypes 09:36:28 jim
TypesOnly Flag 09:34:08 jim
AttributeSelection 09:28:18 jim
DESC 09:13:24 jim
Security Information and Event Management 09:07:36 jim
Security Event Manager (SEM) 09:04:27 jim
SHA-224 08:49:05 jim
07.08.2017
Terms 15:29:22 jim
Web Blog_blogentry_070817_1 11:24:54 jim
06.08.2017
Publisher Flow 12:04:31 jim
Subscriber Flow 12:03:44 jim
Subscriber Channel 12:02:43 jim
Challenge-response 11:55:01 jim
Request-Response 11:49:57 jim
Publish-Subscribe 11:46:44 jim
Fan-out 11:37:14 jim
Messaging pattern 11:34:19 jim
Subscriber 11:33:52 jim
Publisher 11:33:30 jim
Message 11:20:30 jim
Consent Mechanism 11:00:29 jim
Privilege 10:58:59 jim
Intelligence Assessment 10:58:18 jim
Security Incident 10:56:04 jim
ETP 10:54:46 jim
Complex Event Processing 10:46:58 jim
SubmitEventRequest 10:45:35 jim
Event Correlation 10:44:43 jim
Unfortunate event 10:42:39 jim
Novell Audit 10:42:03 jim
Event Cache 10:41:17 jim
XDAS Event 10:40:48 jim
Domain Event 10:37:53 jim
LDAP Monitoring Overview 10:36:17 jim
Event Monitoring 10:34:11 jim EventMonitoring ==> Event Monitoring
CAP theorem 09:47:22 jim
LATA 08:51:44 jim
Local Access and Transport Area 08:46:52 jim
Point-of-Presence 08:42:01 jim
PoP 08:31:32 jim
05.08.2017
Blockstack 08:42:33 jim
Public Key Infrastructure Weaknesses 08:26:14 jim
04.08.2017
Event-triggered 15:27:44 jim
Event 15:24:03 jim
Logout Token 15:22:03 jim
Triggerless vs Triggered Publication 15:19:59 jim
GBR 12:32:07 jim
USA 12:30:51 jim
ISO 9834.1 12:02:15 jim
X.660 12:01:31 jim
DCC 11:50:44 jim
2.16.840.1.113883 11:41:52 jim
Health Level Seven 11:41:16 jim
HL7 11:40:43 jim
ISO 11:29:38 jim
CCITT 11:28:40 jim
2.16.840.1.113730 11:17:38 jim
Netscape Communications Corp 11:04:53 jim
Virtual List View Control 11:01:17 jim
VLV 10:59:07 jim
Virtual Directory 10:57:10 jim
Oracle 10:54:01 jim
Oracle Passwords 10:51:27 jim
Event Sequencer 10:23:26 jim
AlertErrorEvent 10:16:54 jim
EDirectory 10:11:07 jim
Web Blog_blogentry_040817_1 10:05:46 jim
Persistent Compute Objects 09:18:17 jim
OpenWhisk 08:56:39 jim
Azure Functions 08:49:57 jim
Google Cloud Functions 08:45:31 jim
Webtask 08:42:57 jim
Web Blog_blogentry_131016_1 08:41:21 jim
03.08.2017
Centrify 21:04:01 jim
Web Blog_blogentry_030817_1 21:01:00 jim
02.08.2017
Service Worker 14:37:53 jim
Progressive Web Application 14:09:39 jim
Web Blog_blogentry_020817_1 13:51:17 jim
RFC 2891 11:39:31 jim
RFC 3447 10:54:24 jim
Digital Signature Algorithm 10:48:13 jim
RFC 8017 10:46:27 jim
RSA Digital Signature Algorithm 10:45:31 jim
RFC 3279 10:44:34 jim
Signature Primitive 10:29:58 jim
Verification Primitive 10:25:48 jim
Digital Signature 09:57:42 jim
FIPS 186 08:56:21 jim
Electronic Signatures 08:41:08 jim
Electronic IDentification Authentication and trust Services 08:36:34 jim
01.08.2017
BCP 107 14:26:48 jim
NIST.SP.800-133 14:21:27 jim
Key Generation 14:20:19 jim
Key Revocation 14:18:00 jim
DPKI 13:59:18 jim Decentralized PKI ==> Decentralized Public Key Infrastructure
Keystore 13:55:31 jim
DID method 11:38:59 jim
DID record 11:35:42 jim
FHIR Element 10:45:10 jim
Health Relationship Trust 10:27:15 jim
Non Permissioned System 09:55:02 jim
Attestation 08:59:30 jim
Web Blog_blogentry_010817_1 08:43:30 jim
31.07.2017
Cryptographic Hash Function 09:39:34 jim
Keyed-Hash Message Authentication Code 09:38:44 jim
FIPS 198-1 09:37:10 jim FIPS198-1 ==> FIPS 198-1
MAC 09:31:56 jim
Message Authentication Code 09:31:12 jim
OWHF 08:32:40 jim
One-Way Hash Function 08:32:24 jim
Web Blog_blogentry_310717_1 07:49:32 jim
30.07.2017
Sub 14:13:29 jim
Web Blog_blogentry_300717_1 14:07:40 jim
Web Blog_blogentry_030117_1 13:34:53 jim
Resource Provisioning 13:32:23 jim
Privilege Conflict 13:31:14 jim
Identity Credential and Access Management 13:30:43 jim
IDPro 13:29:48 jim
API Service Delivery 13:28:47 jim
Information Lifecycle Management 12:19:41 jim
Vendor Relationship Management 12:18:31 jim
Privacy by Design 12:17:17 jim
Customer Relationship Management 12:03:06 jim
Access Control Policy 11:48:11 jim
Human Limitation 11:38:06 jim
Attacker 11:33:21 jim
Verizon Data Breach Investigations Report 11:26:53 jim
Organizational-centric 11:20:08 jim
Local Area Network 11:18:09 jim
Untrusted network 11:16:27 jim
Trusted network 11:15:13 jim
Forrester 11:11:24 jim
Application-centric 10:56:37 jim
Bounded Context 10:49:04 jim
Releasability 10:31:57 jim
Data Security Analytics 09:58:49 jim
Data Visibility 09:54:11 jim
Data Discovery 09:51:17 jim
Reference Information Model 08:46:14 jim
State 08:43:35 jim
Password Modify Operation 08:31:03 jim
29.07.2017
Sensitive Data 21:53:10 jim
Data-centric 21:47:18 jim
Authenticity 09:51:01 jim
Stagefright 09:47:20 jim
APT 09:38:50 jim
Partners 09:37:20 jim
Voice over IP 09:29:30 jim
Internet Relay Chat 09:28:14 jim
IRC 09:26:16 jim
Instant Messaging 09:22:43 jim
Web Blog_blogentry_290717_1 08:46:12 jim
SOAP back-channel 08:38:09 jim
Code Division Multiple Access 08:36:19 jim
Protocol Data Unit 08:35:41 jim
QoP 08:34:16 jim
Quality of Protection 08:34:01 jim
Implementing and Integration 08:31:03 jim
Back-channel Communication 08:30:14 jim
Near Field Communication 08:29:40 jim
Inter-Process Communication 08:27:52 jim
Communication Layers 08:25:32 jim
Digital communication 08:24:01 jim
Communication 08:22:47 jim
Voice 08:21:57 jim
Proprietary Protocol 07:55:53 jim
Universal Inbox 07:52:51 jim
Facebook Messenger 07:50:26 jim
IM 07:50:21 jim
Rich Communication Services 07:37:24 jim
Off-the-Record Messaging 07:17:52 jim
Extensible Messaging and Presence Protocol 07:16:58 jim
Short Message Service 07:13:29 jim
Mobile Application Part 07:06:41 jim
MAP 07:06:18 jim
28.07.2017
Proxy 21:10:43 jim
SOA 20:49:25 jim
Web Blog_blogentry_280717_1 20:20:56 jim
User-centric Identity 11:05:11 jim
Privacy 10:48:28 jim
LIGHTest 10:37:11 jim
Cross-domain authentication 10:09:28 jim
Cross Origin Resource Sharing 10:09:17 jim
Cross-domain 10:08:27 jim Cross-Domain ==> Cross-domain
Update 09:21:07 jim
Read 09:20:08 jim
Create 09:17:56 jim
Create Read Update Delete 09:04:15