These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 14:42 on 2017-07-27.

27.07.2017
Password Dictionary 11:56:35 jim
OpenID Connect Session Management 11:38:50 jim
End_session_endpoint 11:38:12 jim
Check_session_iframe 11:37:37 jim
Who Owns the Data 11:29:19 jim
Ownership 11:28:38 jim
Data Ownership 11:25:11 jim
Electronic Fitness Device 11:20:49 jim
Vehicle 10:49:24 jim
Sensor 10:46:14 jim
Local device 10:44:38 jim
Mobile Device 10:43:03 jim
Device 10:37:48 jim
Internet of Things 10:31:08 jim
Personal Health Record 10:08:26 jim
Electronic Health Record 09:19:08 jim
Electronic Medical Record 09:16:04 jim
Health information 09:04:31 jim
HIPAA Privacy Rule 08:58:08 jim
HIPAA Covered Entity 08:42:55 jim
United States Department of Health and Human Services 08:31:41 jim
Protected Health Information 08:19:43 jim
26.07.2017
Best Practices Password 17:23:11 jim
Password Anti-Pattern 17:21:56 jim
Government Communications Headquarters 17:14:07 jim
GCHQ 17:10:01 jim
Password Expiration 17:07:47 jim The National Cyber Security Centre ==> National Cyber Security Centre
National Cyber Security Centre 17:07:46 jim The National Cyber Security Centre ==> National Cyber Security Centre
NCSC 17:07:37 jim
Password Hint 16:48:31 jim
Password Management 16:40:50 jim
Password Character Composition 16:38:53 jim
Password Maximum Length 16:30:08 jim
Refresh Token 12:09:56 jim
Offline_access 12:09:08 jim
OpenID Connect Back-Channel Logout 11:24:59 jim
Logout Token 11:12:23 jim
HTTP 400 11:10:17 jim
Backchannel_logout_session_required 10:56:27 jim
Backchannel_logout_uri 10:54:43 jim
OpenID Connect Front-Channel Logout 10:42:53 jim
RFC 2119 10:40:37 jim
PROHIBITED 10:34:51 jim
Backchannel_logout_session_supported 10:34:10 jim
Backchannel_logout_supported 10:30:50 jim
Frontchannel_logout_session_required 09:51:40 jim
Session ID 09:49:43 jim
Sid 09:49:04 jim
Frontchannel_logout_uri 09:47:27 jim
Uniform Resource Identifier 09:44:30 jim
NAM Customized JSP Pages 08:47:19 jim
Posting Credentials to NAM 08:46:29 jim
Standards Based SSO 08:45:56 jim
Iframe 08:45:07 jim
WebView 08:43:47 jim
Embedded user-agent 08:41:17 jim
Native application 08:38:00 jim
Application 08:33:23 jim
Hybrid apps 08:32:16 jim
Mobile App 08:30:58 jim
Firebug 08:18:51 jim
NAM Troubleshooting 08:18:15 jim
SFSafariViewController 08:16:53 jim
WebKit 08:13:18 jim
Safari 08:11:27 jim
System browser 08:08:51 jim
Chrome 08:08:01 jim
Chrome Custom Tabs 08:03:18 jim
25.07.2017
Pseudonym 17:37:12 jim
Pseudonymization 17:35:47 jim
Data anonymization 17:33:40 jim
MaaP 10:43:43 jim
Web Blog_blogentry_130717_1 10:42:55 jim
RCS 10:42:49 jim
Rich Communication Services 10:42:36 jim
RCS Universal Profile 10:39:50 jim
Messaging as a Platform 10:37:01 jim
FHIR Element 10:23:44 jim
Composite data type 10:22:11 jim
FHIR Resource 10:16:23 jim
Complex Attribute 10:10:49 jim
Component Syntax 10:09:05 jim
DirXML-Entitlement 10:07:44 jim
Reference data type 09:59:37 jim
Hyperlinks 09:57:26 jim
Primitive data type 09:56:49 jim
Data type 09:54:34 jim
Integer 09:35:06 jim
Fast Healthcare Interoperability Resources 09:16:42 jim
Digital Imaging and Communications in Medicine 09:05:26 jim
DICOM 09:01:21 jim
CDA 09:00:41 jim
Clinical Document Architecture 08:58:45 jim
Health Level Seven 08:52:21 jim
Reference Information Model 08:47:05 jim
RIM 08:42:39 jim
Integrating the Healthcare Enterprise 08:39:28 jim
IHE 08:37:10 jim
OpenEHR 08:36:21 jim
24.07.2017
Strategies for Using Power for Communication 11:33:58 jim
Terminology for Constrained-Node Networks 11:28:18 jim
Scaling Properties 11:26:54 jim
Classes of Energy Limitation 11:22:38 jim
Constrained Networks 11:18:38 jim
Constrained-Node Networks 11:16:36 jim
LoWPAN 11:15:10 jim
Low-Power and Lossy Network 11:06:57 jim
ROM 10:57:29 jim
EDirectory Synchronization 10:56:19 jim
Edirectory ReadOnly Replica 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Edirectory Replicas 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Removing Failed Server 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
NO-USER-MODIFICATION 10:54:00 jim
Mutability 10:53:06 jim
Remote Procedure Call 10:51:11 jim
GRPC 10:48:46 jim
MD5 10:25:29 jim
Triple DES 10:24:13 jim
Birthday Paradox 10:21:42 jim
3DES 10:17:41 jim
Revocation_endpoint 09:57:10 jim
Salesforce 09:54:43 jim
Web Blog_blogentry_240717_1 09:45:40 jim
Microsoft Active Directory Anomalies 09:13:28 jim
DNS NCACHE 09:09:20 jim
Negative Caching of DNS Queries 09:08:56 jim
RFC 2308 09:05:17 jim
PAPE 08:58:51 jim
OpenID.PAPE 08:58:01 jim
Social Login 08:56:51 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
OpenID Provider Authentication Policy Extension 08:56:50 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
Federal Identity Credential and Access Management 08:48:12 jim
FICAM 08:45:19 jim
Identity Credential and Access Management 08:42:02 jim
ICAM 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
Web Blog_blogentry_260815_1 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
23.07.2017
Web Blog_blogentry_230717_1 12:13:59 jim
Not For Identification Purposes 12:12:37 jim
Select_account 11:13:19 jim
Prompt Parameter 11:09:27 jim
SIM Swap 10:55:35 jim
Subscriber Identification Module 10:51:24 jim
Personally Identifiable Information 10:46:35 jim
Know Your Customer 10:45:19 jim
Nbf 10:39:09 jim
Mobile TAN 10:38:00 jim
Signalling System No. 7 10:31:38 jim
Paym 10:28:27 jim
SSN 10:22:19 jim
Anonymous 10:17:06 jim
Anonymous Identity 10:16:27 jim
Identity Broker 10:12:24 jim
Identity Correlation 10:11:47 jim
Resource Owner Password Credentials Grant 09:25:10 jim
OAuth 2.0 Security Considerations 09:09:46 jim
22.07.2017
LDAP_INVALID_CREDENTIALS 21:05:30 jim
Web Blog_blogentry_220717_1 19:56:56 jim
19.07.2017
Oidc-client-js 16:36:49 jim
Explicit Endpoint 14:16:17 jim
OAuth 2.0 Vulnerabilities 14:15:13 jim
OAuth 2.0 JWT Secured Authorization Request 10:34:18 jim
FETT 10:30:08 jim
OAuth 2.0 Threat Model and Security Configurations 10:21:27 jim
OAuth 2.0 Authorization Server Metadata 10:20:51 jim OAuth 2.0 Discovery ==> OAuth 2.0 Authorization Server Metadata
JSON Web Token Best Current Practices 09:36:46 jim
OAuth Security Topics 09:10:33 jim
Malicious Endpoint 09:05:46 jim
OAuth 2.0 Mix-Up Mitigation 09:02:20 jim
OAuth 2.0 08:53:39 jim
OAuth 2.0 Tokens 08:52:31 jim
Encoding claims in the OAuth 2 state parameter using a JWT 08:44:13 jim
OAuth state parameter 08:38:16 jim
Fragment Response Mode 08:35:16 jim
URI Fragment Identifiers 08:34:43 jim
17.07.2017
Web Blog_blogentry_170717_1 10:52:45 jim
OAuth 2.0 Token Revocation 10:43:56 jim
YubiKey 10:33:16 jim
U2F 10:32:41 jim
NIST.SP.800-63B 10:31:45 jim
Authenticator Assurance Levels 10:29:13 jim
Authenticator App 10:26:34 jim
CloudFlare 10:19:22 jim
Content Delivery Network 10:19:03 jim
CDN 10:18:41 jim
Apache 10:13:26 jim
SHA-1 Deprecation 10:12:47 jim
OAuth Scope Example 10:11:28 jim
Cipher Suite 10:09:57 jim
NGINX 10:09:30 jim
OpenID Connect Client 10:04:54 jim
Lua-resty-openidc 10:04:01 jim
Mod_auth_openidc 09:59:13 jim
RFC 7800 09:48:21 jim
JWT Confirmation Methods 09:47:42 jim
Authorization Request 09:40:05 jim
State 09:39:27 jim
NaCl 09:35:20 jim NaCL ==> NaCl
Networking and Cryptography library 09:35:07 jim
Special-Use Domain Names 09:18:55 jim
RFC 6761 09:17:32 jim
127.0.0.1 09:16:40 jim
Localhost 09:16:02 jim
Private-Use Networks 09:12:31 jim
RFC 5735 09:09:32 jim
Carrier-grade NAT 09:08:51 jim
Unique Local IPv6 Unicast Addresses 09:08:19 jim
RFC 1918 09:06:38 jim
Network Security 09:04:21 jim
Network Address Translation 09:03:46 jim Private Network ==> Private-Use Networks
Loopback 08:54:30 jim
16.07.2017
OAuth 2.0 Token Exchange 22:28:42 jim
XRDS 10:03:54 jim
EXtensible Resource Descriptor Sequence 10:03:35 jim (eXtensible Resource Descriptor Sequence ==> EXtensible Resource Descriptor Sequence
I-name 10:02:43 jim
I-number 09:59:42 jim
OpenID 09:54:23 jim
Yadis 09:42:33 jim
Web Blog_blogentry_160717_1 09:29:39 jim
Web Blog_blogentry_140717_1 08:48:44 jim
15.07.2017
Implicit Grant 11:56:54 jim
Implicit Flow 11:56:35 jim
Meaningless But Unique Number 10:55:42 jim
By-reference 10:54:53 jim
By-value 10:50:53 jim
Request_uri 10:50:21 jim
Request_object_encryption_enc_values_supported 10:49:37 jim
Request_object_encryption_alg_values_supported 10:48:49 jim
OAuth Dynamic Client Registration Metadata 10:47:45 jim
14.07.2017
OpenID Connect Certified 20:34:00 jim
OAuth 2.0 Incremental Authorization 20:29:57 jim
Google OpenID Connect 20:22:27 jim HttpsTools.ietf.orgHtmlDraft-wdenniss-oauth-incremental-auth-00 ==> OAuth 2.0 Incremental Authorization
Challenged Networks 11:21:07 jim
Constrained Nodes 11:12:26 jim
Subtree Delete Control 10:54:02 jim
RFC 4525 10:15:59 jim
LDAP Modify-Increment Extension 10:15:15 jim
13.07.2017
Identity Assurance Level 11:03:31 jim
IAL3 11:00:14 jim
IAL2 11:00:04 jim
IAL1 10:59:53 jim
Identity Verification Service 10:58:33 jim
Identity Proofing 10:57:00 jim
Password Recovery 10:55:31 jim
Verifier 10:44:50 jim
Knowledge-Based Authentication 10:42:52 jim
Identity questions 10:35:15 jim
Authentication Method Reference Values 10:21:13 jim
KBA 10:20:02 jim
12.07.2017
Base64 19:55:48 jim
Response_type 19:31:35 jim
Authorization Code 19:25:25 jim
Grant Types 19:20:12 jim
OpenID Connect Flows 19:07:59 jim
Hybrid Flow 19:05:11 jim
OAuth 2.0 Protocol Flows 18:48:05 jim
OpenAM Endpoints 18:42:56 jim
Mobile Connect 17:46:22 jim
Electronic IDentification Authentication and trust Services 17:44:25 jim
EIDAS 17:41:37 jim
Digital Identity Acceptance Policy 17:39:53 jim
STD 3 15:26:54 jim
Communication Layers 15:21:05 jim
RFC 1267 15:11:26 jim
RFC 2821 15:09:49 jim
RFC 821 15:09:05 jim
RFC Status 15:06:47 jim
BCP 15:06:11 jim
Best Current Practice 15:05:27 jim
Historic 15:04:59 jim
Experimental 15:04:36 jim
Informational 15:02:55 jim
Internet Draft 15:01:55 jim
ID 15:00:08 jim
Internet Standard 14:52:15 jim
STD 1 14:36:22 jim
Not All RFCs are Standards 14:35:18 jim
Internet Official Protocol Standards 14:34:10 jim
Standards Track 14:24:28 jim
Proposed Standard 14:20:41 jim
STD 14:16:23 jim
IESG 14:13:31 jim
Internet Engineering Steering Group 14:13:13 jim The Internet Engineering Steering Group ==> Internet Engineering Steering Group
RFC Sub-series 14:11:31 jim
RFC 13:15:52 jim
RFC 5000 13:15:17 jim
RFC 1796 13:07:47 jim
HOTP 12:46:24 jim
RFC 5842 12:43:46 jim
HTTP Status Code 12:39:37 jim
Server Error 12:31:50 jim
Client Error 12:25:01 jim
Redirection 12:22:38 jim
HTTP 407 12:09:45 jim
Basic Authentication Scheme 12:06:03 jim
SASL 12:02:57 jim
LDAP Proxy User 11:54:59 jim
Proxy-Authorization 11:51:30 jim Proxy Authorization ==> Proxy-Authorization
Proxy-Authenticate 11:50:05 jim Proxy-Authentication ==> Proxy-Authenticate
HTTP Authentication Framework 11:47:57 jim
Authentication Method 11:35:53 jim
Authentication Schemes 11:34:48 jim
PIN 11:28:15 jim
RFC 2753 11:24:52 jim
Policy Ignorant Node 11:23:49 jim
Glossary Of LDAP And Directory Terminology 11:21:34 jim DefinitionPolicyIgnorantNode ==> Policy Ignorant Node
Client Authentication Methods 11:18:57 jim
Simple Authentication 11:16:38 jim
LDAP Authentication Methods 11:11:12 jim
Authorization Header 11:04:44 jim
RFC 3492 10:52:03 jim
Punycode 10:51:12 jim
Internationalized Domain Name 10:49:36 jim
Internet Corporation for Assigned Names and Numbers 10:48:09 jim
ICANN 10:47:11 jim
Email Address 10:35:57 jim
Internationalized Resource Identifiers 10:34:34 jim
Hypertext Transfer Protocol 10:29:47 jim
Content-Type 10:20:16 jim
MIME Type 10:09:45 jim
Media-type 10:09:17 jim
Content-Encoding 10:05:25 jim
Content-Length 09:59:03 jim
HTTP Header Field 09:54:58 jim
HTTP Body 09:52:23 jim
HTTP Entity Header 09:44:21 jim
HTTP Response Header 09:39:33 jim
HTTP Request Header 09:38:45 jim
RFC 7235 09:31:29 jim
Private_key_jwt 09:14:22 jim
Client_secret_post 09:13:57 jim
Client_secret_basic 09:13:29 jim
11.07.2017
WikiWiki 22:21:21 jim
WikiName 22:20:31 jim
WikiEtiquette 22:17:59 jim
UnusedPages 22:16:27 jim
Automated Password Self Service 22:14:18 jim
APASS 22:13:07 jim
UndefinedPages 22:10:58 jim
RecentChanges 21:54:28 jim
OneMinuteWiki 21:52:31 jim
CopyrightNotice 21:49:12 jim
EditPageHelp 21:47:05 jim
Community 21:44:26 jim
ApprovalRequiredForUserProfiles 21:42:07 jim
ApprovalRequiredForPageChanges 21:41:25 jim
About 21:40:01 jim
A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents 21:23:33 jim
Production Implementation 17:04:19 jim
PageVersionTag 16:59:56 jim
Prototyping 16:54:47 jim
Sketching 16:52:45 jim
API Planing 16:51:02 jim
NspmDistributionPassword 16:08:27 jim
Operating-system-level virtualization 15:52:41 jim
Virtualization method 15:49:58 jim
Hardware Virtualization 15:49:08 jim
Paravirtualization 15:48:26 jim
Hypervisor 15:48:03 jim
Full Virtualization 15:46:37 jim
Virtual Machine 15:43:26 jim Virtual Machines ==> Virtual Machine
NMAS 15:22:00 jim
LCM 15:13:52 jim
Universal Password 15:07:40 jim
SPM_ALLOW_SPWD_SET 14:08:42 jim
NspmConfigurationOptions 14:07:44 jim
UniversalPasswordSecretBits 14:03:09 jim
Container 13:54:26 jim
DevOps 13:49:25 jim
Continuous Development 13:44:31 jim
Continuous Delivery 13:42:33 jim
Dr. Axel SchnellbÃGel 11:42:00 jim
Authentication Context Class Reference 10:33:22 jim
Acr_values_supported 10:17:54 jim
Request_object_signing_alg_values_supported 10:00:22 jim
Concise Binary Object Representation 09:58:28 jim
JSON-LD 09:56:45 jim
JSON Web Tokens 09:54:24 jim
Javascript Object Signing and Encryption 09:52:25 jim
JSON Object 09:50:34 jim
OpenID Connect Claims 09:45:03 jim
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants 09:11:57 jim
Authentication Context Class Values 09:09:02 jim
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants 09:03:29 jim
Acr 08:53:18 jim
Financial API 02:08:58 jim
UMA 2.0 01:55:07 jim
UMAFedAuthz 01:51:58 jim
Federated Authorization for UMA 2.0 01:51:37 jim
UMA 2.0 Grant for OAuth 2.0 Authorization 01:51:20 jim
UMAGrant 01:34:19 jim
Web Blog_blogentry_110717_1 01:28:32 jim
Runtime Application Self-Protection 00:59:07 jim
RASP 00:58:24 jim
10.07.2017
Device Flow 16:38:35 jim
Input-constrained device 16:36:35 jim
Constrained Application Protocol 16:28:10 jim
Authorization Grant 16:22:58 jim
06.07.2017
Increment 18:47:02 jim
Iteration Backlog 18:43:21 jim
Delivery Team 18:23:36 jim
05.07.2017
LDAPSyntaxes 12:14:24 jim
Lightweight Directory Access Protocol (LDAP) Parameters 12:12:52 jim
LDAP Object Identifier Descriptors 12:10:49 jim
Collective Attribute 12:08:24 jim
CollectiveAttributeSubentry 12:05:46 jim
LDAP Entry Collection 12:00:39 jim
CollectiveExclusions 11:52:38 jim
CollectiveAttributeSubentries 11:51:01 jim
COLLECTIVE Flag 11:31:34 jim
RFC 3671 11:30:58 jim
LDAP Subentry 11:29:49 jim
GidNumber 11:17:58 jim
USAGE 11:16:51 jim
EDirectory Extended LDAP Flags 11:14:03 jim
X-NDS_ACL_TEMPLATES 11:00:47 jim
ACL (eDirectory Attribute) 10:43:27 jim
SINGLE-VALUE 10:26:56 jim
X-NDS_BOTH_MANAGED 10:22:52 jim
X-NDS_FILTERED_OPERATIONAL 10:18:15 jim
X-NDS_ENCRYPTED_SYNC 10:15:27 jim
X-NDS_NON_REMOVABLE 10:13:06 jim
X-NDS_NONREMOVABLE 08:42:46 jim
Obituary 08:40:23 jim
NDS Obituaries 08:35:54 jim
2.16.840.1.113719.1.1.4.1.114 08:33:56 jim
Distributed Data Store 08:24:11 jim
Distributed File System 08:23:02 jim
Data lake 08:22:16 jim
Extract Transform Load 08:18:56 jim
Data warehouse 08:16:26 jim
ETL 08:15:24 jim Extract, Transform, Load ==> Extract Transform Load
Disk partition 08:09:57 jim
File System 08:09:13 jim
Data Store 08:08:03 jim
Data 08:05:51 jim
Structured data 08:05:33 jim
Unstructured data 08:03:14 jim
04.07.2017
Social Web 10:46:42 jim
Social Websites 10:46:02 jim
Instagram 10:45:24 jim
LinkedIn 10:44:05 jim
Google 10:42:59 jim
Facebook 10:39:04 jim
Social Identity 10:38:07 jim
Single Sign-On Scenarios 10:37:09 jim
Legitimacy of Social Login 10:36:13 jim
Life Management Platform 10:35:29 jim Social Networks ==> Social Websites
Administrative Identity 10:35:28 jim Social Networks ==> Social Websites
External Metrics 10:35:28 jim Social Networks ==> Social Websites
Identity Relationship Management 10:35:28 jim Social Networks ==> Social Websites
JF2 09:58:41 jim
JF2 Post Serialization Format 09:58:15 jim
Web Blog_blogentry_040717_1 09:53:54 jim
HTML5 09:46:54 jim
Microdata 09:42:32 jim
Microformats 09:41:27 jim
Micropub 09:39:40 jim
Service Provider 08:58:33 jim
Consumer of services 08:54:58 jim
03.07.2017
SynchronizedUpTo 12:40:41 jim
Naming Attributes 12:28:31 jim
FLAG_ATTR_IS_RDN 12:27:53 jim
FLAG_SCHEMA_BASE_OBJECT 12:26:13 jim
Bad-Pwd-Count 12:24:05 jim
BadPwdCount 12:16:59 jim
FLAG_ATTR_NOT_REPLICATED 12:13:48 jim
SystemFlags 12:11:49 jim
X-NDS_NEVER_SYNC 12:08:24 jim
Non-replicated 12:07:17 jim
Active Directory Locked Accounts 12:04:24 jim
GSS-SPNEGO 11:46:50 jim
NDS Authentication 11:44:17 jim
Novell Directory Services 11:40:18 jim
Multiple-channel Authentication 11:03:04 jim
Attack Effort 10:56:07 jim
Channel 10:40:25 jim
Protocol Stack 10:38:45 jim
Protocol Suite 10:34:43 jim
Protocol 10:32:36 jim
JSON Web Signature and Encryption Header Parameters Registry 09:56:01 jim
JOSE Header Parameter 09:54:06 jim
JOSE Header 09:51:33 jim
OpenID Connect 09:45:01 jim
Client Secret 09:37:18 jim
LeftMenu 09:34:17 jim
OAuth 09:33:55 jim
Error 09:26:59 jim
Success 09:25:53 jim
Status Events 09:24:54 jim
LDAP Client Error And Result Codes 09:21:19 jim
EDirectory and NDS Client Error Codes 09:18:07 jim
DIR-XML-Error-Variables 09:16:39 jim
LDAP Error Codes 09:13:49 jim
LDAP_LOCAL_ERROR 09:13:24 jim
Kerberos Error Codes 09:11:38 jim
DirXML Error 09:10:26 jim
URL redirection 09:08:24 jim
Server_error 09:07:34 jim
OAuth Error 09:03:25 jim
Authy 08:52:30 jim
OATH 08:49:57 jim
Initiative for Open Authentication 08:49:35 jim
Time-based One-time Password Algorithm 08:47:24 jim OATH ==> Initiative for Open Authentication
HMAC-based One-Time Password Algorithm 08:47:23 jim OATH ==> Initiative for Open Authentication
Google Authenticator 08:35:21 jim
App 08:29:02 jim
OAuth Public Client 08:23:25 jim
Browser-view 08:07:44 jim
30.06.2017
Nested Groups 10:34:48 jim
Negative Permission 10:32:28 jim
Permission 10:31:51 jim
Positive Permission 10:30:31 jim
Privilege Conflict 10:26:56 jim
Privilege 10:13:10 jim
Resource Action 10:05:44 jim
Access Control 09:54:02 jim
Access Management 09:52:32 jim
Access Request 09:49:53 jim
Access 09:48:06 jim
Privilege Management Infrastructure 08:19:11 jim
Access Control Models 08:16:08 jim
Access Authority 08:10:39 jim
Physical Access Control 07:57:50 jim
Logical Access Control 07:56:49 jim
29.06.2017
NIST.SP.800-192 15:43:03 jim
Cyclic Inheritance 15:10:38 jim
Groups Are Bad 15:07:03 jim
Access Control Policy 15:01:34 jim
NIST.SP.800 Computer Security 14:49:00 jim
NIST Special Publication 14:48:14 jim
28.06.2017
API-Gateway 17:05:52 jim
API-Gateway/OAuth_diagrams-04-768x1065.png 16:46:57 jim OAuth_diagrams-04-768x1065
Dynamic Authorization Management 16:41:12 jim
EXtensible Access Control Markup Language 16:40:44 jim
Password Minimum Length 15:45:45 jim
NspmComplexityRules 15:43:37 jim
Password Quality 15:41:48 jim
Password Modification Policy 15:35:40 jim
Password Validity Policy 15:35:20 jim
Password Policy 15:32:31 jim
Heuristic Attacks 15:19:53 jim
Password Validator 15:02:04 jim
Credential Leaked Databases 14:52:58 jim
Credential Leakage 14:50:36 jim
Derived Credential 14:36:40 jim
Credential 14:34:13 jim
Compromised Credential 14:33:17 jim
Privacy Paradox 13:19:34 jim
Privacy 13:10:51 jim
World Privacy Forum 12:25:15 jim
X.690 11:58:37 jim
UnicodePwd 11:55:55 jim
One-Time Pad 10:48:38 jim
Web Blog_blogentry_280617_1 10:42:19 jim
FLUSH+RELOAD 10:41:31 jim
OTP 10:16:13 jim
Information-theoretic Secure 10:03:29 jim
Side-channel attacks 09:48:09 jim
Computational Hardness Assumption 09:40:32 jim
Information Leakage 09:27:58 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-3) was last changed on 11-Jul-2017 21:54 by jim