Overview#
Application in computing, is a specific set of operations for a computer to perform.Application is also Media-type
Application vs SDK vs API#
A Software Development Kit is typically collections of Application Programing Interfaces used to develop an Application.Mobile App#
Mobile Apps are Application designed for Mobile Devices.Application are created by Programming
More Information#
There might be more information for this subject on one of the following:- 0-RTT Handshakes
- 3rd Generation Partnership Project
- API Economy
- API Planing
- AP_REQ
- AS Exchange
- AWS API-Gateway
- AWS CloudHSM
- AWS Cognito
- AWS Elastic Beanstalk
- AWS Elastic Block Store
- AWS Elastic Container Service
- AWS Elastic File System
- AWS Serverless Application Repository
- AWS Shield
- Abstraction
- Access Control Engine
- Access Control List
- Access Control Models
- Access Control Policy
- Access Proxy
- AccountExpires
- Act (Actor) Claim
- Advanced Message Queuing Protocol
- Advertising ID
- Agile Principles
- Amazon Web Services
- AnyPolicy
- App
- AppConfig Community
- Application Attributes
- Application Directory Partitions
- Application Programming Interface
- Application Shell Architecture
- Application Virtualization
- Application-centric
- ApplicationObjectSchema
- Application_data
- Application_type
- Arbitrary code execution
- Architecture
- Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
- Assurance Level
- Attack Orchestrator
- Attack Service
- Attack Surface
- Audit Log
- Authenticator App
- Authorization Code Flow
- Authorization Server
- Behavioral analytics
- Best Practices for LDAP Security
- BeyondCorp
- Biometric Data Challenges
- Blockchain
- Blockstack
- Blue-Green Deployment
- Booting
- Bot
- Bounded Context
- Browser-view
- Buffer overflow
- Bug
- Certificate Renewal
- Certification Authority Browser Forum
- Channel Binding
- Cheat Sheets
- Chrome Custom Tabs
- Chrome OS
- Chromium OS
- Class
- Client Application
- Client To Authenticator Protocol
- Client_id
- Cloud Native
- Cloud Zone
- Cloud computing
- Code injection
- Codebase
- Computing
- Computing platform
- Concurrency
- Container
- Context Provider
- Continuous Development
- Control character
- Creating an OAuth 2.0 Client Application
- CredSSP
- Credential Vault
- Credential stuffing
- Cross Origin Resource Sharing
- CryptoAPI
- DIAMETER
- DNC Decryption Flow
- DNS Resource Records
- DNS-Based Authentication of Named Entities
- DROPOUTJEEP
- DS_FLAG
- Data In Process
- Data Ownership
- Data Structure
- Data-centric
- DataEncipherment
- Delegation vs Impersonation
- Dependency
- DevOps
- Digital Identity
- DirXML Status Events
- Discovery Mechanism
- Docker
- Domain
- Dotdot
- Draft-ietf-pkix-generalname-00
- Dynamic Authorization Management
- Dynamic Cache Mode
- EDirectory LDAP Transaction
- EMV Terms
- Electronic Fitness Device
- Embedded user-agent
- Enterprise Service Bus
- Entity
- Epic Systems Corporation
- Event
- Event Correlation
- Event sourcing
- Extreme Programming
- FIDO
- FIDO Client
- Facebook Messenger
- Federated Authorization for UMA 2.0
- Fetch API
- Financial API
- Fingerprint
- Fingerprinting
- Firebase
- Firmware
- Fixed-point
- Form Post Response Mode
- Functions as a Service
- GCP Cloud CDN
- GCP Cloud Load Balancing
- GCP Networking Products
- GRAM
- Geneva Framework
- Gluu Server
- Google Authenticator
- Google Cloud DNS
- Google Cloud DataStore
- Google Native Client
- Grant
- Grant Negotiation and Authorization Protocol
- Grant Types
- Graph
- Groups Are Bad
- Host Card Emulation
- Hybrid apps
- Hybrid cryptosystem
- Hyperledger
- Hypermedia As The Engine Of Application State
- Hypertext Transfer Protocol
- Hypervisor
- IDM Related Compliance Items
- IDM The Application Developers Dilemma
- IDM The User Dilemma
- ISO 3166-1 alpha-2
- Identification
- Identifier
- Identifier registry
- Identity Assurance Framework
- Identity Correlation
- Identity Governance and Administration
- Identity State
- Identity Web Services Framework
- IdentityServer
- Implementation
- Implicit Grant
- Incident Management
- Indirect Identifier
- Information Lifecycle Management
- Infrastructure As Code
- Infrastructure as a Service
- Inter-Planetary File System
- Inter-Process Communication
- Internationalization and Localization
- Internet Protocol Suite
- Internet Relay Chat
- Internet Research Task Force
- Internet Threat Model
- Internet of Things
- JSON-LD
- Java Card
- Javascript Object Signing and Encryption
- Kerberos
- Kerberos SSP
- Kernel
- Key Management Service
- Key wrapping
- Key-value
- KeyEncipherment
- Kubernetes Node
- Kubernetes Service
- LoRaWAN
- Local Security Authority
- Logging Out
- Logout Mechanism
- Logout Process
- Macaroons
- Machine Learning
- Malicious Software
- Media-type
- Message queue
- Message-oriented Middleware
- Messaging Application Programming Interface
- Metrics
- Microservice
- Middleware
- Mix network
- Mobile App
- Mobile Security Framework
- Monetization
- Monitoring
- Multiple Virtual Storage
- NDS Authentication
- NDS Result Code
- NICI
- NIST.SP.800-107
- NIST.SP.800-57
- NT-Sec-Desc
- Native application
- Negotiate SSP
- Network Security
- Network Security Services
- Novell Access Manager
- OAuth 2.0 Actors
- OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer
- OAuth 2.0 Incremental Authorization
- OAuth 2.0 Token Revocation
- OAuth 2.0 Use Cases
- OAuth 2.0 for Native Apps
- OAuth Client
- OAuth Public Client
- OAuth Scope Example
- OAuth Scopes
- OSI-Model
- OXD
- Observability
- Off-the-Record Messaging
- Oidc-client-js
- Ontology
- Open Bank Project
- Open Banking
- Open Source
- Open Web Application Security Project
- OpenID Connect Client Initiated Backchannel Authentication Flow
- Openliberty.org
- Operation Aurora
- Orchestration
- PARC Universal Packet
- PASSWD_NOTREQD
- POST
- Page Cache
- Password Authentication is Broken
- Password Spraying
- Passwordless Authentication
- Passwordless SMS Authentication
- Payment Initiation Service Provider
- Peer
- Peer-to-peer
- Platform as a Service
- Policy
- Policy Decision Point
- Polyglot
- Portable Document Format
- Preparation, Enforcement, and Comparison of Internationalized Strings
- Primary Refresh Token
- Privacy Considerations
- Private URI Scheme
- Private-Use URI Scheme Redirection
- Privileged Account Management
- Privileged Identity
- Privileged User Management
- Processes
- Production tier
- Programming
- Progressive Web Application
- Proof Key for Code Exchange by OAuth Public Clients
- Protocol Buffers
- Proxy Server
- Public Key Infrastructure Weaknesses
- Publish-Subscribe
- Python
- QUANTUM
- Quick UDP Internet Connections
- RFC 1123
- RFC 2377
- RFC 3492
- RFC 3550
- RFC 4519
- RFC 7564
- RFC 8264
- Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- Record Protocol
- Refresh Token
- Requesting Party
- Requirement
- Resource Inventory Service
- Resource Owner Password Credentials Grant
- Resource ReSerVation Protocol
- Runtime Application Self-Protection
- SASL
- SECURITY_IMPERSONATION_LEVEL
- SFSafariViewController
- SQL Injection
- Same Origin Policy
- Sarbanes-Oxley Act
- Search engine
- Secure Element
- Security Identifier
- Security Information and Event Management
- Security Support Provider Interface
- Semantic WEB
- Server Storage Key
- Serverless
- Service Account
- Session
- Session Affinity
- Session Layer
- Session Management
- Sharding
- Shared Memory
- Sign in with Apple
- Simple Authentication
- Single Responsibility Principle
- Single Sign-On
- Single-Page Application
- Smart-On-FHIR profile
- Software
- Software Development Kit
- Software as a Service
- Software design
- Solid
- Source code
- Sovrin
- State
- Strength of Function for Authenticators
- Sub
- SubjectKeyIdentifier
- Subscriber Identification Module
- SuperSet Software Group
- Technical Positions Statements
- Telegram Open Network
- Terminology for Constrained-Node Networks
- Thread
- Thread pool
- Time To Live
- Token Binding Protocol
- Transport Layer
- Transport Layer Security
- Trusted Service Manager
- TrustedDomain
- UMA 2.0 Grant for OAuth 2.0 Authorization
- UPort
- URI Path
- Uniform Resource Identifier
- Universal Inbox
- Unvalidated redirects and forwards
- User Interface
- User Provisioning
- User and Entity Behavior Analytics
- User mode and Kernel mode
- User-Managed Access
- Vendor Relationship Management
- Virtual Memory
- WebAuthn Relying Party
- Who Owns the Data
- Why OpenID Connect
- Windows registry
- XACML
- YAML
- Z-Wave
- Zero Trust