These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 17:00 on 27-Apr-2017.

25.04.2017
Experimental 16:40:52 jim
LDAP Transactions 16:39:02 jim
2.16.840.1.113719.1.27.103.4 16:33:31 jim
EndGroupingNotice 16:32:46 jim
EDirectory LDAP Transaction 16:29:40 jim
EndGroupingResponse 16:27:21 jim
EndGroupingRequest 16:26:02 jim
CreateGroupingResponse 16:25:04 jim
CreateGroupingRequest 16:23:59 jim
2.16.840.1.113719.1.27.103.2 16:15:13 jim
2.16.840.1.113719.1.27.103.7 16:09:58 jim
GroupingControl 16:09:26 jim
CreateGroupValue 16:08:01 jim
GroupCookie 16:05:07 jim
2.16.840.1.113719.1.27.103.8 15:55:36 jim
CreateGroupType 15:54:43 jim
2.16.840.1.113719.1.27.103.1 15:51:48 jim
LDAP Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
LDAPv3 Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
Lightweight Directory Access Protocol (LDAP) Transactions 15:37:15 jim
23.04.2017
Novell Access Manager 19:40:54 jim
AS-REQ-REP 19:40:18 jim
ULA 11:49:27 jim
Unique Local IPv6 Unicast Addresses 11:49:00 jim
RFC 4193 11:47:09 jim
Private Network 11:45:35 jim
RFC 6598 11:36:06 jim
Carrier-grade NAT 11:35:21 jim
RFC 2640 11:26:05 jim
RFC 2460 11:25:09 jim
Internet Protocol Version 6 11:24:30 jim
IPv6 11:23:23 jim
RFC 791 11:19:35 jim
IPv4 11:18:49 jim
Internet Protocol Version 4 11:18:30 jim
RFC 1918 11:09:44 jim
Network Address Translation 11:01:31 jim
NAT 10:58:00 jim
Transparent Proxy 10:57:30 jim
Proxy 10:50:18 jim
The Onion Router 10:48:15 jim
Tor 10:46:05 jim
Socket Secure 10:41:41 jim
Response 10:34:23 jim
Request 10:32:51 jim
Clients 10:28:13 jim
Server 10:27:21 jim
Protocol Server 10:26:06 jim
Protocol Client 10:20:43 jim
Same Origin Policy 10:05:38 jim
Web Origin 10:05:06 jim
Port 10:03:50 jim
URI Authorities 10:02:57 jim
Hostname 10:01:19 jim
IP Address 10:00:21 jim
RFC 6454 09:55:37 jim
SOP 09:50:50 jim
URI Template 09:50:04 jim
RFC 6570 09:46:25 jim
Uniform Resource Identifier 09:45:17 jim
URI Query 09:43:14 jim
URI Path 09:41:50 jim
RFC 6838 09:35:36 jim
URI Fragment Identifiers 09:34:59 jim
RFC 7320 08:53:03 jim
RFC 6874 08:52:23 jim
URI Schemes 08:44:42 jim
Web Blog_blogentry_230417_1 08:26:59 jim
HOTP 08:20:49 jim
21.04.2017
LSTM 11:41:24 jim
Feedforward Neural network 11:40:32 jim
RNN 11:38:50 jim
Artificial Neuron 11:38:30 jim
ANN 11:38:07 jim
Artificial Neural network 11:30:59 jim
Long Short Term Memory networks 11:26:45 jim
Recurrent Neural networks 11:20:42 jim
Web Blog_blogentry_210417_1 11:03:58 jim
Paradox of Knowability 09:56:10 jim
Responsible 09:19:42 jim
Trust 09:06:57 jim
19.04.2017
Graded Authentication 14:24:18 jim
Single Sign-On 13:38:05 jim
Micro Focus 13:10:06 jim
LDAP Server Implementations 13:08:29 jim
BMC Software 13:05:12 jim
BMC 13:04:38 jim
HP OpenView Select Identity 13:03:24 jim
Hewlett Packard Enterprise 12:55:55 jim
HPE 12:53:53 jim
Web Services Federation 12:52:18 jim
WS-Federation 12:47:40 jim
18.04.2017
Abstraction 12:07:16 jim
Directed Acyclic Graph 11:01:01 jim
Merkle DAG 11:00:03 jim
DAG 10:58:12 jim
Git 10:54:51 jim
Inter-Planetary File System 10:53:34 jim
Object storage 09:55:32 jim
Object-oriented Programming 09:53:19 jim
Object-based 09:52:50 jim
Object 09:49:56 jim Objects ==> Object
Object-oriented 09:46:01 jim
Polymorphism 09:37:27 jim
Inheritance 09:30:45 jim
Encapsulation 09:22:59 jim
OOP 08:55:50 jim
Web Blog_blogentry_180417_1 08:54:21 jim
DIT Chaining 08:48:00 jim
Chaining 08:45:56 jim
Glossary Of LDAP And Directory Terminology 08:28:45 jim DefinitionChaining ==> DIT Chaining
16.04.2017
JSON for Linking Data 10:04:00 jim
Linked Data 10:03:20 jim
Advanced Key Processor 09:55:22 jim
Web Blog_blogentry_160417_1 09:53:51 jim
Active attacker 09:50:39 jim
NISTIR 7298 09:48:04 jim
Accountability 09:46:19 jim
Permission 09:40:50 jim
Protected Resource 09:35:57 jim
Resource 09:35:31 jim
Access Control 09:32:34 jim
Access 09:31:46 jim
Access Authority 09:31:07 jim
Identity Attributes 09:23:26 jim
Digital Identity 09:18:51 jim
14.04.2017
Verifiable Claims 09:19:25 jim
Web Blog_blogentry_140417_1 09:10:52 jim
Certificate Transparency 09:07:59 jim
13.04.2017
Personally Identifiable Information 14:19:54 jim
Account Linking 14:17:04 jim
Password Statistics 14:14:03 jim
Risk 14:08:03 jim
Password Guessing Attacks 13:31:15 jim
Password Dictionary 13:31:10 jim
Best Practices Password 12:27:47 jim
Authenticator App 12:24:29 jim
MAC 10:23:25 jim
Password Quality 10:17:11 jim
10.04.2017
Password Authentication is Broken 14:26:58 jim
Human Limitation 14:13:07 jim
Authentication Challenges 13:42:02 jim
Universal Product Code 13:38:40 jim
Barcode 13:37:51 jim
Shared Secret 13:37:19 jim
Year 1974 13:36:53 jim
UPC 13:36:31 jim
QR-code 13:29:51 jim
Quick Response Code 13:26:50 jim
Time-based One-time Password Algorithm 13:19:03 jim SharedSecret ==> Shared Secret
Mutual TLS Profiles for OAuth Clients 13:19:02 jim SharedSecret ==> Shared Secret
Pre-shared key 13:19:02 jim SharedSecret ==> Shared Secret
Web Blog_blogentry_100417_1 13:06:46 jim
Stateless 06:01:32 jim
status 05:58:24 jim
Replica convergence 05:47:29 jim
Basically Available Soft state Eventual consistency 05:46:23 jim
BASE 05:45:31 jim
Eventual consistency 05:42:01 jim
Replication 05:39:37 jim
Synchronization 05:36:13 jim DefinitionSynchronization ==> Synchronization
Changelog 05:34:48 jim
Attribute Usage Flags 05:33:48 jim
CAP theorem 05:15:01 jim
Node.js 04:46:24 jim
JavaScript 04:42:49 jim
ECMAScript 04:39:06 jim
Privacy 03:48:57 jim
IDM The Manager Dilemma 03:47:07 jim
09.04.2017
Password Reuse 14:46:19 jim
What To Do About Passwords 14:39:12 jim
Password Authentication 14:30:19 jim
08.04.2017
Password Policy 12:34:26 jim
Password Authentication Policy 12:34:11 jim
Password Expiration Warning 12:29:57 jim
Password-composition Policy 12:26:13 jim
Draft-behera-ldap-password-policy 12:22:53 jim
Usability 12:08:29 jim
Heuristic Attacks 11:59:37 jim
Password Management 11:19:31 jim
Password 11:13:46 jim
Traditional Registration 11:01:34 jim
06.04.2017
Bob 12:27:39 jim
Alice 12:27:27 jim
Alice And Bob 12:26:40 jim
Wendy 12:26:01 jim
Walter 12:24:55 jim
Trent 12:24:29 jim
Victor 12:24:07 jim
Sybil 12:23:53 jim
Peggy 12:22:04 jim
Oscar 12:21:18 jim
Faythe 12:20:25 jim
Craig 12:20:02 jim
Identifier 12:18:25 jim
Personal Name 12:05:48 jim
Identified 12:04:56 jim
Unlinkability 12:01:35 jim
Privacy Considerations 12:00:39 jim
Legal 11:59:38 jim
Real Name 11:56:29 jim
State 11:55:23 jim
Pseudonymity 11:54:03 jim
Pseudonymous 11:53:26 jim
Official Name 11:52:39 jim
Pseudonym 11:52:01 jim
Individual 11:44:38 jim
Identifiable 11:42:42 jim
Identifiability 11:40:59 jim
Anonymity Set 11:37:11 jim
Undetectability 11:35:55 jim
IOI 11:34:40 jim
Item of Interest 11:34:23 jim
PANOPTICLICK 11:32:34 jim
Fingerprinting 11:31:34 jim
Fingerprint 11:26:06 jim
Attack 11:18:03 jim
Observer 11:16:15 jim
Authorized 11:13:23 jim
Intermediary 11:11:20 jim
Recipient 11:09:44 jim
Initiator 11:08:32 jim
Enabler 11:07:15 jim
Telecommunications 11:07:02 jim
Unauthorized 11:05:23 jim
Eavesdropper 11:03:06 jim
RFC 4949 10:58:52 jim
Passive attacker 10:57:23 jim
RFC 6973 10:39:21 jim
NGI 10:22:09 jim
Next Generation Identification 09:42:08 jim
RISC 09:38:49 jim
AFIT 09:38:11 jim
Advanced Fingerprint Identification Technology 09:37:57 jim
Repository for Individuals of Special Concern 09:31:11 jim
Web Blog_blogentry_060417_1 09:18:04 jim
05.04.2017
DSBK 09:40:49 jim
Edirectory Backup Strategy 08:49:06 jim
Edirectory Disaster Recovery 08:29:40 jim
Edirectory Back-Ups And Clones 08:26:05 jim
NICI Configuration Files 08:19:06 jim
EmboxRecovery 08:15:42 jim
04.04.2017
Authentication Context Class vs Authentication Method Reference 12:14:49 jim
Authentication Method 12:06:44 jim
Authentication Context Class Values 11:58:08 jim
Authentication Context Class 11:54:44 jim
Authentication Method Reference Values 11:42:20 jim
Authentication Protocol 11:30:38 jim
Mutual Authentication 11:30:21 jim
Simple Authentication 11:29:30 jim
Internet Protocol Address Location 11:28:34 jim
Closed-Loop Authentication 11:27:27 jim
Open-Loop Authentication 11:25:07 jim
Authentication 11:16:38 jim
FIDO 10:40:09 jim
FIDO Authenticator 10:26:11 jim
U2F device 10:08:32 jim
FIDO Client 10:05:01 jim
FIDO Server 10:02:02 jim
FIDO Relying Party 09:42:29 jim
Authenticator 09:32:25 jim
Password-based 09:23:53 jim
Web Blog_blogentry_040417_1 09:23:02 jim
Credential Enrollment 09:04:20 jim
Level Of Assurance 08:57:40 jim
Identity Proofing 08:53:25 jim
Identity Assurance Level 08:46:19 jim
Identity Assurance 08:41:13 jim
Authenticator Assurance Levels 08:39:38 jim
Assurance 08:38:29 jim
Biometric Data Challenges 08:28:08 jim
03.04.2017
Openid-configuration 19:51:09 jim
HTTP POST 10:03:02 jim
Payment Services Directive 09:35:16 jim
Web Blog_blogentry_030417_1 09:33:36 jim
Banks 09:33:12 jim
AISP 09:30:11 jim
PISP 09:29:53 jim
P2P 09:29:35 jim
Payment Initiation Service Provider 09:29:15 jim
Account Information Service Provider 09:28:53 jim
PSD2 09:26:18 jim
Proffer 09:14:10 jim
02.04.2017
FIDO Standards 11:09:35 jim
Universal Second Factor 10:44:28 jim
Chrome 10:24:20 jim
Universal Second Factor Challenges 10:23:38 jim
Local device 10:08:30 jim
NIST Interagency Report 09:56:24 jim
NISTIR 09:54:03 jim
NIST.IR 7817 09:50:48 jim
Credential Management 09:32:19 jim
Credential Revocation 09:31:25 jim
Credential Issuance 09:22:50 jim
Credential Suspension 09:21:19 jim
Credential Reset 09:18:10 jim
Registration Authority 09:13:13 jim
Credential 08:59:35 jim
GitLab 08:12:42 jim
01.04.2017
Yubikey NEO 19:17:48 jim
Yubico 19:15:36 jim
EAL 19:01:11 jim
Evaluation Assurance Level 19:00:56 jim
SAR 18:58:37 jim
Security Assurance Requirement 18:58:14 jim
SFR 18:56:14 jim
Security Functional Requirements 18:55:47 jim
CC 18:53:59 jim
Common Criteria 18:53:25 jim
Common Criteria for Information Technology Security Evaluation 18:53:03 jim
Smart Card 18:52:26 jim
Universal Authentication Framework 18:35:54 jim
Bluetooth Special Interest Group 18:30:05 jim
Personal Area Networks 18:29:21 jim
Wireless 18:26:49 jim
Bluetooth Low Energy 18:26:32 jim
BLE 18:23:16 jim
Bluetooth 18:22:29 jim
USB 18:15:47 jim
Universal Serial Bus 18:15:31 jim
FIDO protocols 18:09:25 jim
Fast IDentity Online 18:07:35 jim
PKCS 11 17:56:10 jim
Internet Protocol Suite 17:23:11 jim
Communication Layers 17:20:06 jim
OSI-Model 17:19:58 jim
RFC 1122 17:19:18 jim
Internet Layer 17:14:21 jim
Link Layer 17:12:01 jim
Transport Layer 17:09:21 jim
Application Layer 17:05:37 jim
Internet Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
TCP-IP 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Transmission Control Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
User Datagram Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Router 16:45:02 jim
Gateway 16:40:12 jim
CISCO Commands 16:31:27 jim
Data-link Layer 16:30:31 jim
Network Layer 16:26:11 jim
Session Layer 16:22:42 jim
Presentation Layer 16:19:03 jim
Frame 16:12:17 jim
Packet 16:04:34 jim
Bit 16:01:20 jim
Payload 15:59:06 jim
Datagram 15:55:10 jim
RFC 1594 15:48:44 jim
Cable Connections 15:44:48 jim
Physical Layer 15:44:16 jim
Proxy Server 15:19:35 jim
RFC 1928 15:10:27 jim
SOCKS 15:05:51 jim
Logs and File Locations 15:05:06 jim
United States federal government 11:18:24 jim
United States Supreme Court 11:16:42 jim
United States Judiciary 11:13:35 jim
United States House of Representatives 11:02:34 jim
United States Senate 11:02:23 jim
United States Department of Justice 11:02:02 jim
DOJ 11:01:12 jim
FBI 10:59:49 jim
Federal Bureau of Investigation 10:59:26 jim
IAFIS 10:48:02 jim
Integrated Automated Fingerprint Identification System 10:47:42 jim
Fingerprint recognition 10:42:50 jim
Biometric 10:18:58 jim
Biometric Scanner 10:17:06 jim
Biometric Token 10:16:19 jim
Biometric Template 09:55:39 jim
ExtensibleMatch 09:00:12 jim
30.03.2017
Biometric Enrollment 17:41:30 jim
Voice recognition 17:22:40 jim
Bio-political tattooing 17:19:27 jim
United States Department of Veterans Affairs 17:18:40 jim
US-VISIT 17:16:00 jim
United States Department of Homeland Security 17:15:23 jim
DHS 17:14:24 jim
MITRE Corporation 17:13:54 jim
United States Customs and Border Protection 17:06:36 jim
United States Visitor and Immigrant Status Indicator 16:44:56 jim
Retinal recognition 16:27:15 jim
Facial recognition 16:23:46 jim
Tel 16:20:53 jim
Pattern-recognition 16:14:32 jim
Iris recognition 16:13:41 jim
Fpt 16:09:00 jim
Spoofing Attack 15:55:45 jim
FNMR 15:50:50 jim
False Non-Match Rates 15:50:33 jim
FMR 15:47:28 jim
False Match Rates 15:46:29 jim
NIST.SP.800-63B 15:26:43 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 26-Jul-2014 09:01 by 71.0.193.131