-
Advanced Common Application Platform
(ACAP)
ACAP is applicable for specifications and standards based on the ACAP
APIs, content formats, and semantic guarantees. This standard is firstly
intended to be used by entities writing terminal specifications and/or standards based on ACAP. Secondly, it is intended for developers of applications that
use the ACAP functionality and
APIs. ACAP aims to ensure interoperability between ACAP applications and different implementations of
platforms supporting ACAP applications.
-
Advanced Television Systems Committee
(ATSC)
The Advanced Television Systems Committee, Inc. is an international, non-profit organization developing voluntary standards for digital
television. The ATSC member organizations represent the broadcast, broadcast equipment, motion picture, consumer electronics, computer, cable, satellite,
and semiconductor industries. We are defining the future of television with the ATSC 3.0 next-generation broadcast standard.
-
Web Site
, Source: Advanced Television Systems Committee
-
Amazon Web Services
(AWS)
Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies,
and governments, on a metered, pay-as-you-go basis.
-
Apache Ant
Apache Ant is a Java™ Library and command-line tool whose mission is to drive processes described in build files as targets and
extension points dependent upon each other.
-
Web Site
, 2020
, Source: Apache Software Foundation
-
Apache APISIX®
Apache APISIX is an open source, dynamic, scalable, and high-performance cloud native
API gateway for all
your APIs and microservices.
-
Web Site
, Source: Apache Software Foundation
-
Apache Avro™
Apache Avro™ is the leading serialization format for record data, and first choice for streaming data pipelines. It offers excellent
schema evolution, and has implementations for the JVM (Java, Kotlin, Scala,…), Python, C/C++/C#, PHP, Ruby, Rust, JavaScript, and even
Perl.
-
Web Site
, Source: Apache Software Foundation
-
Apache Batik
Batik is a Java™-based tookit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format
for various purposes, such as display, generation or manipulation.
-
Web Site
, Source: Apache Software Foundation
-
Apache Beam
Apache Beam is an open-source, unified programming model for batch and streaming data processing pipelines that simplifies large-scale data
processing dynamics.
-
Web Site
, Source: Apache Software Foundation
-
Apache Camel
Camel is an open source integration framework that empowers you to quickly and easily integrate various systems consuming or
producing data.
-
Web Site
, Source: Apache Software Foundation
-
Apache Cassandra
Apache Cassandra is an open source NoSQL distributed database trusted by thousands of companies for scalability and high availability without
compromising performance. Linear scalability and proven fault-tolerance on commodity hardware or cloud infrastructure make it the perfect platform for
mission-critical data.
-
Web Site
, Source: Apache Software Foundation
-
Apache Commons Lang
The standard Java™ libraries fail to provide enough methods for manipulation of its core classes. Apache Commons Lang provides
these extra methods.
-
Apache CXF
Apache CXF is an open source services framework. CXF helps you build and develop services using frontend programming
APIs, like
JAX-WS and
JAX-RS. These services can speak a variety of protocols such
as
SOAP,
XML/
HTTP,
RESTful HTTP, or
CORBA and work over a variety of transports such as
HTTP,
JMS
or
JBI.
-
Web Site
, Source: Apache Software Foundation
-
Apache Log4j 2
Apache Log4j is a Java-based logging utility originally written by Ceki Gülcü. It is part of the Apache Logging Services, a project
of the Apache Software Foundation. Log4j is one of several Java logging frameworks.
-
Apache Parquet
Apache Parquet is an open source, column-oriented data file format designed for efficient data storage and retrieval. It provides high
performance compression and encoding schemes to handle complex data in bulk and is supported in many programming language and analytics tools.
-
Web Site
, Source: Apache Software Foundation
-
Apache Shiro
Apache Shiro™ is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and
session management.
-
Web Site
, Source: Apache Software Foundation
-
Apache Spark™
Apache Spark™ is a multi-language engine for executing data engineering, data science, and machine learning on single-node machines
or clusters.
-
Web Site
, Source: Apache Software Foundation
-
API Gateway
A server that acts as an API front-end, receives API requests, enforces throttling and security policies, passes requests to the
back-end service and then passes the response back to the requester.
-
Applicant Tracking System
(ATS)
An applicant tracking system (ATS) is a software application that enables the electronic handling of the entire recruitment and hiring
processes.
-
Application Programming Interface
(API)
An application programming interface (API) is a way for two or more computer programs or components to communicate with each other.
It is a type of software interface, offering a service to other pieces of software. In 2000, Roy Fielding's outlined
Representational
state transfer (REST) and described the idea of a "network-based Application Programming Interface" that Fielding contrasted with
traditional "library-based" APIs.
XML and
JSON web APIs saw widespread commercial adoption
beginning in 2000 and continuing as of 2022. The web API is now the most common meaning of the term API.
-
Artificial Intelligence
(AI)
Artificial intelligence (AI), in its broadest sense, is intelligence exhibited by machines, particularly computer
systems.
-
Authorization to Operate
(ATO)
ATO stands for authorization to operate, also known as "authority to operate." Because there is no perfect, risk-free software
system, the ATO process is aimed at minimizing and managing risk responsibility. This process mostly comes from the Federal Information Security Management
Act (
FISMA).
-
Azure PowerShell
Azure PowerShell is a set of cmdlets for managing Azure resources directly from PowerShell. Azure PowerShell is designed to make
it easy to learn and get started with, but provides powerful features for automation.
-
BeanShell
BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java. It runs in the Java
Runtime Environment (JRE), dynamically executes standard Java syntax and extends it with common scripting conveniences such as loose types, commands, and
method closures, like those in Perl and JavaScript.
-
Binary Large Object
(BLOB)
Binary large object (BLOB) is a generic term used to describe the handling and storage of long strings of data by database management systems.
A BLOB is a category of data, characterized by large size (including media formats such as audio and video), which can place extreme demands on storage
systems and network bandwidth.
-
Central Policy Manager
(CPM)
Domain: CyberArk
The Central Policy Manager (CPM) is a Privileged Access Manager - Self-Hosted component and does not require a dedicated machine. However,
it must be installed on a machine that is accessible to the network.
-
Central Processing Unit
(CPU)
A central processing unit (CPU), also called a central processor, main processor, or just processor, is the most important processor in a
given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O)
operations. This role contrasts with that of external components, such as main memory and I/O circuitry, and specialized coprocessors such as graphics
processing units (
GPUs).
-
Character Large Object
(CLOB)
A Character Large OBject (or CLOB) is part of the SQL:1999 standard data types. It is a collection of character data in a database management
system, usually stored in a separate location that is referenced in the table itself.
-
Chief Executive Officer
(CEO)
A chief executive officer (CEO), also known as a chief executive or managing director, is the top-ranking corporate executive charged with the
management of an organization, usually a company or a nonprofit organization.
-
Chief Information Officer
(CIO)
Chief information officer (CIO) is a job title commonly given to the most senior executive in an enterprise who works with information
technology and computer systems, in order to support enterprise goals.
-
Chief Information Security Officer
(CISO)
A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the
enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying,
developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks.
-
Chief Technology Officer
(CTO)
A chief technology officer (CTO) (also known as a chief technical officer or chief technologist) is an officer tasked with managing technical
operations of an organization. They oversee and supervise research and development and serve as a technical advisor to a higher executive such as a chief
executive officer.
-
Classless Inter-Domain Routing
(CIDR)
Classless Inter-Domain Routing is a method for allocating IP addresses for IP routing. The Internet Engineering Task Force introduced CIDR in
1993 to replace the previous classful network addressing architecture on the Internet. Its goal was to slow the growth of routing tables on routers across
the Internet, and to help slow the rapid exhaustion of IPv4 addresses.
-
Combinatory Categorial Grammar
(CCG)
Combinatory categorial grammar (CCG) is an efficiently parsable, yet linguistically expressive grammar formalism. It has a transparent
interface between surface syntax and underlying semantic representation, including predicate?argument structure, quantification and information
structure.
-
Command-Line Interface
(CLI)
A command-line interface (CLI) is a means of interacting with a computer program by inputting lines of text called
command-lines.
-
Common Object Request Broker Architecture
(CORBA)
The Common Object Request Broker Architecture (CORBA) is a standard defined by the
Object Management Group
(OMG) designed to facilitate the communication of systems that are deployed on diverse platforms. CORBA enables collaboration between systems on
different operating systems, programming languages, and computing hardware.
-
Concept Description Language
(CDL)
Concept Description Language (CDL) is a computer language to describe concept structure of content.
-
Confidential Computing
Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing
can be used in conjunction with storage and network encryption, which protect data at rest and data in transit respectively.
-
Confidential Federated Learning
(CLF)
The principles of security, privacy, accountability, transparency, and fairness are the cornerstones of modern AI regulations. Classic
FL was designed with a strong emphasis on security and privacy, at the cost of transparency and accountability. C
FL addresses
this gap with a careful combination of
FL with
TEEs and commitments. In addition, C
FL brings other desirable security properties,
such as code-based access control, model confidentiality, and protection of models during inference. Recent advances in confidential computing such as
confidential containers and confidential
GPUs mean that existing
FL frameworks can be extended seamlessly to support C
FL
with low overheads. For these reasons, C
FL is likely to become the default mode for deploying
FL workloads.
-
Constraint Satisfaction Problem
(CSP)
Constraint satisfaction problems (CSPs) are mathematical questions defined as a set of objects whose state must satisfy a number of
constraints or limitations. CSPs represent the entities in a problem as a homogeneous collection of finite constraints over variables, which is
solved by constraint satisfaction methods.
-
Container Database
(CDB)
A container database (CDB) contains one or more user-created, pluggable databases and application containers. The CDB includes all the data files
for the
PDBs contained within it and a set of system data files that store metadata for the CDB itself.
-
Control Objectives for Information and Related Technology
(COBIT)
COBIT (Control Objectives for Information and Related Technologies) is a framework created by
ISACA for information technology (IT) management
and IT governance. The framework is business focused and defines a set of generic processes for the management of IT, with each process defined together with
process inputs and outputs, key process-activities, process objectives, performance measures and an elementary maturity model.
-
Controlled Natural Language
(CNL)
Controlled natural languages (CNLs) are subsets of natural languages that are obtained by restricting the grammar and vocabulary in
order to reduce or eliminate ambiguity and complexity.
-
Convolutional Neural Networks
(CNN)
A convolutional neural network (CNN) is a regularized type of
feed-forward neural network that learns
features by itself via filter (or kernel) optimization.
-
Dandified YUM
(DNF)
DNF is the next upcoming major version of
YUM, a package manager for
RPM-based
Linux distributions. It roughly maintains
CLI compatibility with
YUM and defines a strict API for extensions and
plugins.
-
Data Definition Language
(DDL)
In the context of
SQL, data definition or data description language (DDL) is a syntax for creating and
modifying database objects such as tables, indices, and users.
-
Denial of Service
(DoS)
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource
unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically
accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate
requests from being fulfilled.
-
Digital Object Identifier
(DOI)
A DOI name is a digital identifier of an object, any object ? physical, digital, or abstract. DOIs solve a common problem: keeping track of
things. Things can be matter, material, content, or activities.
-
Digital Rights Management
(DRM)
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures
(TPM), such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use,
modification and distribution of copyrighted works (e.g. software, multimedia content) and of systems that enforce these policies within devices. DRM
technologies include licensing agreements and encryption.
-
Directory Services Markup Language
(DSML)
Directory Services Markup Language (DSML) is a representation of directory service information in an
XML
syntax.
-
Distributed Denial of Service
(DDoS)
A DDoS attack targets websites and servers by disrupting network services in an attempt to exhaust an application?s resources. The perpetrators
behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether.
-
Domain Name System
(DNS)
The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and
other resources on the Internet or other Internet Protocol (IP) networks.
-
Domain Name System
, Source: Wikipedia
-
DNS Resolver Information
(RFC9606)
, T. Reddy.K
, M. Boucadair
, 2024
, Source: Request For Comments
-
Negative Caching of DNS Resolution Failures
(RFC9520)
, D. Wessels
, W. Carroll
, M. Thomas
, 2023
, Source: Request For Comments
-
DNS Terminology
(RFC9499)
, P. Hoffman
, K. Fujiwara
, 2024
, Source: Request For Comments
-
DNS Glue Requirements in Referral Responses
(RFC9471)
, M. Andrews
, S. Huque
, P. Wouters
, D. Wessels
, 2023
, Source: Request For Comments
-
Guidance for NSEC3 Parameter Settings
(RFC9276)
, W. Hardaker
, V. Dukhovni
, 2022
, Source: Request For Comments
-
DNS Transport over TCP - Operational Requirements
(RFC9210)
, J. Kristoff
, D. Wessels
, 2022
, Source: Request For Comments
-
Revised IANA Considerations for DNSSEC
(RFC9157)
, P. Hoffman
, 2021
, Source: Request For Comments
-
DNS Query Name Minimisation to Improve Privacy
(RFC9156)
, S. Bortzmeyer
, R. Dolmans
, P. Hoffman
, 2021
, Source: Request For Comments
-
Deprecating Infrastructure 'int' Domains
(RFC9121)
, K. Davies
, A. Baber
, 2023
, Source: Request For Comments
-
DNS Zone Transfer over TLS
(RFC9103)
, W. Toorop
, S. Dickinson
, S. Sahib
, P. Aras
, A. Mankin
, 2021
, Source: Request For Comments
-
NSEC and NSEC3: TTLs and Aggressive Use
(RFC9077)
, P. van Dijk
, 2021
, Source: Request For Comments
-
DNS Privacy Considerations
(RFC9076)
, T. Wicinski
, 2021
, Source: Request For Comments
-
Secret Key Transaction Authentication for DNS (TSIG)
(RFC8945)
, F. Dupont
, S. Morris
, P. Vixie
, D. Eastlake 3rd
, O. Gudmundsson
, B. Wellington
, 2020
, Source: Request For Comments
-
Running a Root Server Local to a Resolver
(RFC8806)
, W. Kumari
, P. Hoffman
, 2020
, Source: Request For Comments
-
Serving Stale Data to Improve DNS Resiliency
(RFC8767)
, D. Lawrence
, W. Kumari
, P. Sood
, 2020
, Source: Request For Comments
-
Moving DNSSEC Lookaside Validation (DLV) to Historic Status
(RFC8749)
, W. Mekking
, D. Mahoney
, 2020
, Source: Request For Comments
-
Algorithm Implementation Requirements and Usage Guidance for DNSSEC
(RFC8624)
, P. Wouters
, O. Sury
, 2019
, Source: Request For Comments
-
DNS AttrLeaf Changes: Fixing Specifications That Use Underscored Node Names
(RFC8553)
, D. Crocker
, 2019
, Source: Request For Comments
-
DNS Stateful Operations
(RFC8490)
, R. Bellis
, S. Cheshire
, J. Dickinson
, S. Dickinson
, T. Lemon
, T. Pusateri
, 2019
, Source: Request For Comments
-
DNS Queries over HTTPS (DoH)
(RFC8484)
, P. Hoffman
, P. McManus
, 2018
, Source: Request For Comments
-
Providing Minimal-Sized Responses to DNS Queries That Have QTYPE=ANY
(RFC8482)
, J. Abley
, O. Gudmundsson
, M. Majkowski
, E. Hunt
, 2019
, Source: Request For Comments
-
Update to IANA Registration Procedures for Pool 3 Values in the Differentiated Services Field Codepoints (DSCP) Registry
(RFC8436)
, G. Fairhurst
, 2018
, Source: Request For Comments
-
Usage Profiles for DNS over TLS and DNS over DTLS
(RFC8310)
, S. Dickinson
, D. Gillmor
, T. Reddy
, 2018
, Source: Request For Comments
-
Aggressive Use of DNSSEC-Validated Cache
(RFC8198)
, K. Fujiwara
, A. Kato
, W. Kumari
, 2017
, Source: Request For Comments
-
NXDOMAIN: There Really Is Nothing Underneath
(RFC8020)
, S. Bortzmeyer
, S. Huque
, 2016
, Source: Request For Comments
-
Specification for DNS over Transport Layer Security (TLS)
(RFC7858)
, Z. Hu
, L. Zhu
, J. Heidemann
, A. Mankin
, D. Wessels
, P. Hoffman
, 2016
, Source: Request For Comments
-
The EDNS(0) Padding Option
(RFC7830)
, A. Mayrhofer
, 2016
, Source: Request For Comments
-
DNS Transport over TCP - Implementation Requirements
(RFC7766)
, J. Dickinson
, S. Dickinson
, R. Bellis
, A. Mankin
, D. Wessels
, 2016
, Source: Request For Comments
-
DNS Root Name Service Protocol and Deployment Requirements
(RFC7720)
, M. Blanchet
, L-J. Liman
, 2015
, Source: Request For Comments
-
Domain Name System (DNS) IANA Considerations
(RFC6895)
, D. Eastlake 3rd
, 2013
, Source: Request For Comments
-
Extension Mechanisms for DNS (EDNS(0))
(RFC6891)
, J. Damas
, M. Graff
, P. Vixie
, 2013
, Source: Request For Comments
-
Clarifications and Implementation Notes for DNS Security (DNSSEC)
(RFC6840)
, S. Weiler
, D. Blacka
, 2013
, Source: Request For Comments
-
DNAME Redirection in the DNS
(RFC6672)
, S. Rose
, W. Wijngaards
, 2012
, Source: Request For Comments
-
xNAME RCODE and Status Bits Clarification
(RFC6604)
, D. Eastlake 3rd
, 2012
, Source: Request For Comments
-
Cryptographic Algorithm Identifier Allocation for DNSSEC
(RFC6014)
, P. Hoffman
, 2010
, Source: Request For Comments
-
DNS Zone Transfer Protocol (AXFR)
(RFC5936)
, E. Lewis
, A. Hoenes
, 2010
, Source: Request For Comments
-
Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC
(RFC5933)
, V. Dolmatov
, A. Chuprina
, I. Ustinov
, 2010
, Source: Request For Comments
-
Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)
(RFC5910)
, J. Gould
, S. Hollenbeck
, 2010
, Source: Request For Comments
-
Mapping Characters for Internationalized Domain Names in Applications (IDNA) 2008
(RFC5895)
, P. Resnick
, P. Hoffman
, 2010
, Source: Request For Comments
-
Internationalized Domain Names for Applications (IDNA): Background, Explanation, and Rationale
(RFC5894)
, J. Klensin
, 2010
, Source: Request For Comments
-
Right-to-Left Scripts for Internationalized Domain Names for Applications (IDNA)
(RFC5893)
, H. Alvestrand
, C. Karp
, 2010
, Source: Request For Comments
-
The Unicode Code Points and Internationalized Domain Names for Applications (IDNA)
(RFC5892)
, P. Faltstrom
, 2010
, Source: Request For Comments
-
Internationalized Domain Names in Applications (IDNA): Protocol
(RFC5891)
, J. Klensin
, 2010
, Source: Request For Comments
-
Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework
(RFC5890)
, J. Klensin
, 2010
, Source: Request For Comments
-
DNS SRV Resource Records for AFS
(RFC5864)
, R. Allbery
, 2010
, Source: Request For Comments
-
Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC
(RFC5702)
, J. Jansen
, 2009
, Source: Request For Comments
-
DNS Proxy Implementation Guidelines
(RFC5625)
, R. Bellis
, 2009
, Source: Request For Comments
-
Measures for Making DNS More Resilient against Forged Answers
(RFC5452)
, A. Hubert
, R. van Mook
, 2009
, Source: Request For Comments
-
DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
(RFC5155)
, B. Laurie
, G. Sisson
, R. Arends
, D. Blacka
, 2008
, Source: Request For Comments
-
Automated Updates of DNS Security (DNSSEC) Trust Anchors
(RFC5011)
, M. StJohns
, 2007
, Source: Request For Comments
-
DNS Name Server Identifier (NSID) Option
(RFC5001)
, R. Austein
, 2007
, Source: Request For Comments
-
Requirements for a Mechanism Identifying a Name Server Instance
(RFC4892)
, S. Woolf
, D. Conrad
, 2007
, Source: Request For Comments
-
The Role of Wildcards in the Domain Name System
(RFC4592)
, E. Lewis
, 2006
, Source: Request For Comments
-
Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)
(RFC4509)
, W. Hardaker
, 2006
, Source: Request For Comments
-
Minimally Covering NSEC Records and DNSSEC On-line Signing
(RFC4470)
, S. Weiler
, J. Ihren
, 2006
, Source: Request For Comments
-
Domain Name System (DNS) Case Insensitivity Clarification
(RFC4343)
, D. Eastlake 3rd
, 2006
, Source: Request For Comments
-
Protocol Modifications for the DNS Security Extensions
(RFC4035)
, R. Arends
, R. Austein
, M. Larson
, D. Massey
, S. Rose
, 2005
, Source: Request For Comments
-
Resource Records for the DNS Security Extensions
(RFC4034)
, R. Arends
, R. Austein
, M. Larson
, D. Massey
, S. Rose
, 2005
, Source: Request For Comments
-
DNS Security Introduction and Requirements
(RFC4033)
, R. Arends
, R. Austein
, M. Larson
, D. Massey
, S. Rose
, 2005
, Source: Request For Comments
-
Threat Analysis of the Domain Name System (DNS)
(RFC3833)
, D. Atkins
, R. Austein
, 2004
, Source: Request For Comments
-
Application Techniques for Checking and Transformation of Names
(RFC3696)
, J. Klensin
, 2004
, Source: Request For Comments
-
Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG)
(RFC3645)
, S. Kwan
, P. Garg
, J. Gilroy
, L. Esibov
, J. Westhead
, R. Hall
, 2003
, Source: Request For Comments
-
Handling of Unknown DNS Resource Record (RR) Types
(RFC3597)
, A. Gustafsson
, 2003
, Source: Request For Comments
-
DNS Extensions to Support IP Version 6
(RFC3596)
, S. Thomson
, C. Huitema
, V. Ksinant
, M. Souissi
, 2003
, Source: Request For Comments
-
Obsoleting IQUERY
(RFC3425)
, D. Lawrence
, 2002
, Source: Request For Comments
-
Tradeoffs in Domain Name System (DNS) Support for Internet Protocol version 6 (IPv6)
(RFC3364)
, R. Austein
, 2002
, Source: Request For Comments
-
Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)
(RFC3363)
, R. Bush
, A. Durand
, B. Fink
, O. Gudmundsson
, T. Hain
, 2002
, Source: Request For Comments
-
DNSSEC and IPv6 A6 aware server/resolver message size requirements
(RFC3226)
, O. Gudmundsson
, 2001
, Source: Request For Comments
-
Indicating Resolver Support of DNSSEC
(RFC3225)
, D. Conrad
, 2001
, Source: Request For Comments
-
Secure Domain Name System (DNS) Dynamic Update
(RFC3007)
, B. Wellington
, 2000
, Source: Request For Comments
-
Classless IN-ADDR.ARPA delegation
(RFC2317)
, H. Eidnes
, G. de Groot
, P. Vixie
, 1998
, Source: Request For Comments
-
Negative Caching of DNS Queries (DNS NCACHE)
(RFC2308)
, M. Andrews
, 1998
, Source: Request For Comments
-
Selection and Operation of Secondary DNS Servers
(RFC2182)
, R. Elz
, R. Bush
, S. Bradner
, M. Patton
, 1997
, Source: Request For Comments
-
Clarifications to the DNS Specification
(RFC2181)
, R. Elz
, R. Bush
, 1997
, Source: Request For Comments
-
Dynamic Updates in the Domain Name System (DNS UPDATE)
(RFC2136)
, P. Vixie
, S. Thomson
, Y. Rekhter
, J. Bound
, 1997
, Source: Request For Comments
-
The Naming of Hosts
(RFC2100)
, J. Ashworth
, 1997
, Source: Request For Comments
-
A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)
(RFC1996)
, P. Vixie
, 1996
, Source: Request For Comments
-
Incremental Zone Transfer in DNS
(RFC1995)
, M. Ohta
, 1996
, Source: Request For Comments
-
Serial Number Arithmetic
(RFC1982)
, R. Elz
, R. Bush
, 1996
, Source: Request For Comments
-
Common DNS Operational and Configuration Errors
(RFC1912)
, D. Barr
, 1996
, Source: Request For Comments
-
A Means for Expressing Location Information in the Domain Name System
(RFC1876)
, C. Davis
, P. Vixie
, T. Goodwin
, I. Dickinson
, 1994
, Source: Request For Comments
-
DNS NSAP Resource Records
(RFC1706)
, B. Manning
, R. Colella
, 1994
, Source: Request For Comments
-
DNS NSAP RRs
(RFC1591)
, B. Manning
, 1992
, Source: Request For Comments
-
New DNS RR Definitions
(RFC1183)
, C. Everhart
, L. Mamakos
, R. Ullmann
, P. Mockapetris
, 1990
, Source: Request For Comments
-
Choosing a Name for Your Computer
(RFC1178)
, D. Libes
, 1990
, Source: Request For Comments
-
Requirements for Internet Hosts -- Application and Support
(RFC1123)
, R. Braden
, 1989
, Source: Request For Comments
-
DNS Encoding of Network Names and Other Types
(RFC1101)
, P. Mockapetris
, 1989
, Source: Request For Comments
-
Domain Names - Implementation and Specification
(RFC1035)
, P. Mockapetris
, 1987
, Source: Request For Comments
-
Domain Names - Concepts and Facilities
(RFC1034)
, P. Mockapetris
, 1987
, Source: Request For Comments
-
Elliptic Curve Cryptography
(ECC)
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite
fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modular exponentiation in Galois fields, such as the RSA
cryptosystem and ElGamal cryptosystem.
-
Enterprise User Security
(EUS)
Enterprise User Security is an important component of the Oracle Database. It enables you to address administrative and security
challenges for a large number of enterprise database users.
-
Explainable artificial intelligence
(XAI)
Explainable
AI (X
AI), often overlapping with interpretable
AI, or explainable machine learning (XML), either refers to
an artificial intelligence (
AI) system over which it is possible for humans to retain intellectual oversight, or refers to the methods to achieve this. The
main focus is usually on the reasoning behind the decisions or predictions made by the
AI which are made more understandable and transparent.
-
Explicit Semantic Analysis
(ESA)
In natural language processing and information retrieval, explicit semantic analysis (ESA) is a vectoral representation of text
(individual words or entire documents) that uses a document corpus as a knowledge base.
-
Extended Detection and Response
(XDR)
Domain: Cyber Security
Extended detection and response (XDR) is a cybersecurity technology that monitors and mitigates cyber security threats.
-
Extensible Access Control Markup Language
(XACML)
The eXtensible Access Control Markup Language (XACML) is an XML-based standard markup language for specifying access control policies. The
standard, published by OASIS, defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model
describing how to evaluate access requests according to the rules defined in policies.
-
Extensible Authentication Protocol
(EAP)
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. EAP is an
authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs,
and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface
and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.
-
Extensible Authentication Protocol
, Source: Wikipedia
-
Extensible Authentication Protocol (EAP) Session-Id Derivation for EAP Subscriber Identity Module (EAP-SIM), EAP Authentication and Key Agreement (EAP-AKA), and Protected EAP (PEAP)
(RFC8940)
, A. DeKok
, 2020
, Source: Request For Comments
-
Update to the Extensible Authentication Protocol (EAP) Applicability Statement for Application Bridging for Federated Access Beyond Web (ABFAB)
(RFC7057)
, S. Winter
, J. Salowey
, 2013
, Source: Request For Comments
-
Extensible Authentication Protocol (EAP) Key Management Framework
(RFC5247)
, B. Aboba
, D. Simon
, P. Eronen
, 2008
, Source: Request For Comments
-
Extensible Authentication Protocol (EAP)
(RFC3748)
, B. Aboba
, L. Blunk
, J. Vollbrecht
, J. Carlson
, H. Levkowetz
, 2004
, Source: Request For Comments
-
Extensible Markup Language
(XML)
Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data.
It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
-
Extensible Stylesheet Language
(XSL)
In computing, the term Extensible Stylesheet Language (XSL) is used to refer to a family of languages used to transform and render
XML
documents.
-
Extensible Stylesheet Language Transformation
(XSLT)
XSLT (Extensible Stylesheet Language Transformations) is a language originally designed for transforming
XML documents
into other
XML documents, or other formats such as
HTML for web pages, plain text or
XSL
Formatting Objects, which may subsequently be converted to other formats, such as PDF, PostScript and PNG. Support for
JSON
and plain-text transformation was added in later updates to the
XSLT 1.0 specification.
-
Extension Mechanisms for DNS
(EDNS)
Extension Mechanisms for
DNS (E
DNS) is a specification for expanding the size of several parameters of the Domain Name System
(
DNS) protocol which had size restrictions that the Internet engineering community deemed too limited for increasing
functionality of the protocol.
-
Federal Information Security Management Act
(FISMA)
The Federal Information Security Modernization Act of 2014 (FISMA) was signed into federal law by President Barack Obama on December 18, 2014.
Passed as a response to the increasing amount of cyber attacks on the federal government, it amended existing laws to enable the federal government to
better respond to cyber attacks on departments and agencies.
-
Federated Learning
(FL)
Federated learning is a machine learning technique focusing on settings in which multiple entities (often referred to as clients)
collaboratively train a model while ensuring that their data remains decentralized. This stands in contrast to machine learning settings in which data
is centrally stored.
-
Feedforward Neural Network
(FNN)
A feedforward neural network (FNN) is one of the two broad types of artificial neural network, characterized by direction of the flow
of information between its layers.
-
First-Order Logic
(FOL)
First-order logic?also called predicate logic, predicate calculus, quantificational logic?is a collection of formal systems used
in mathematics, philosophy, linguistics, and computer science.
-
Foreigh Exchange
(FX)
Foreign exchange, "FOREX" or "FX," refers to global currencies as well as to exchanges, markets and products used for trading various world
currencies.
-
Galois Counter Mode
(GCM)
In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its
performance. GCM throughput rates for state-of-the-art, high-speed communication channels can be achieved with inexpensive hardware resources.
-
Garbage Collector
(GC)
Garbage collection (GC) is a form of automatic memory management. The garbage collector attempts to reclaim memory that was allocated by the
program, but is no longer referenced; such memory is called garbage.
-
General Data Protection Regulation
(GDPR)
The General Data Protection Regulation (Regulation (EU) 2016/679) is a European Union regulation on information privacy in the European Union (EU) and the European
Economic Area (EEA). The GDPR is an important component of EU privacy law and human rights law, in particular Article 8(1) of the Charter of Fundamental
Rights of the European Union. It also governs the transfer of personal data outside the EU and EEA.
-
Generative Adversarial Network
(GAN)
A generative adversarial network (GAN) is a class of machine learning frameworks and a prominent framework for approaching
generative AI.
-
Generative adversarial network
, Source: Wikipedia
-
Generative Adversarial Nets
, Ian J. Goodfellow
, Jean Pouget-Abadie
, Mehdi Mirza
, Bing Xu
, David Warde-Farley
, Sherjil Ozair
, Aaron Courville
, Yoshua Bengio
, Source: Université de Montréal
-
Generative Adversarial Networks (GANs)
, Ian Goodfellow
, 2016
, Source: OpenAI
-
Generative Artificial Intelligence
(GenAI)
Generative artificial intelligence is artificial intelligence capable of generating text, images, videos, or other data using
generative models, often in response to prompts. Generative AI models learn the patterns and structure of their input training data and then
generate new data that has similar characteristics.
-
Generic Security Services Application Program Interface
(GSSAPI)
The Generic Security Service Application Program Interface (GSSAPI) is an application programming interface for programs to access
security services. The GSSAPI is an
IETF standard that addresses the problem of many similar but incompatible security
services in use as of 2005.
-
Generic Security Services Application Program Interface
, Source: Wikipedia
-
Anonymity Support for Kerberos
(RFC8062)
, L. Zhu
, P. Leach
, S. Hartman
, S. Emery
, 2017
, Source: Request For Comments
-
Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos
(RFC6649)
, L. Hornquist
, T. Yu
, 2012
, Source: Request For Comments
-
Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Channel Binding Hash Agility
(RFC6542)
, S. Emery
, 2012
, Source: Request For Comments
-
Anonymity Support for Kerberos
(RFC6112)
, L. Zhu
, P. Leach
, S. Hartman
, 2011
, Source: Request For Comments
-
eneric Security Service Application Program Interface (GSS-API): Delegate if Approved by Policy
(RFC5896)
, L. Hornquist
, S. Hartman
, 2010
, Source: Request For Comments
-
Clarifications and Extensions to the Generic Security Service Application Program Interface (GSS-API) for the Use of Channel Bindings
(RFC5554)
, N. Williams
, 2009
, Source: Request For Comments
-
The Simple and Protected Generic Security Service Application Program Interface (GSS-API) Negotiation Mechanism
(RFC4178)
, L. Zhu
, P. Leach
, K. Jaganathan
, W. Ingersoll
, 2005
, Source: Request For Comments
-
The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2
(RFC4121)
, L. Zhu
, K. Jaganathan
, S. Hartman
, 2005
, Source: Request For Comments
-
LIPKEY - A Low Infrastructure Public Key Mechanism Using SPKM
(RFC2847)
, M. Eisler
, 2000
, Source: Request For Comments
-
Generic Security Service API Version 2 : C-bindings
(RFC2744)
, J. Wray
, 2000
, Source: Request For Comments
-
Generic Security Service Application Program Interface Version 2, Update 1
(RFC2743)
, J. Linn
, 2000
, Source: Request For Comments
-
The Simple Public-Key GSS-API Mechanism (SPKM)
(RFC2025)
, C. Adams
, 1996
, Source: Request For Comments
-
The Kerberos Version 5 GSS-API Mechanism
(RFC1964)
, J. Linn
, 1996
, Source: Request For Comments
-
Good Documentation Practice
(GDP)
Good documentation practice is a term in the pharmaceutical and medical device industries to describe standards by which documents are created
and maintained.
-
Graph Neural Network
(GNN)
A graph neural network (GNN) belongs to a class of artificial neural networks for processing data that can be represented as
graphs.
-
Graph Query Language
(GQL)
Graph Query Language (GQL) is a standard graph query language published by ISO in April 2024.
-
Graph Theory
In mathematics, graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between
objects. A graph in this context is made up of vertices (also called nodes or points) which are connected by edges (also called arcs, links or
lines).
-
Graphics Processing Unit
(GPU)
A graphics processing unit (GPU) is a specialized electronic circuit initially designed for digital image processing and to accelerate
computer graphics, being present either as a discrete video card or embedded on motherboards, mobile phones, personal computers, workstations, and game
consoles. After their initial design, GPUs were found to be useful for non-graphic calculations involving embarrassingly parallel problems due to
their parallel structure. Other non-graphical uses include the training of neural networks and cryptocurrency mining.
-
Health Insurance Portability and Accountability Act
(HIPAA)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy?Kassebaum Act) is a United States Act of Congress enacted
by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996. It aimed to alter the transfer of healthcare information,
stipulated the guidelines by which personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected
from fraud and theft, and addressed some limitations on healthcare insurance coverage.
-
Homebrew
Homebrew installs the stuff you need that Apple (or your Linux system) didn?t.
-
Hypertext Markup Language
(HTML)
HTML is the World Wide Web's core markup language. Originally, HTML was primarily designed as a language for semantically describing
scientific documents. Its general design, however, has enabled it to be adapted, over the subsequent years, to describe a number of other types of
documents and even applications.
-
HTML
, 2024
, Source: World Wide Web Consortium
-
Hypertext Transfer Protocol
(HTTP)
The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext
information systems.
-
Use of the Content-Disposition Header Field in the Hypertext Transfer Protocol (HTTP)
(RFC6266)
, J. Reschke
, 2011
, Source: Request For Comments
-
Additional HTTP Status Codes
(RFC6585)
, R. Fielding
, M. Nottingham
, 2012
, Source: Request For Comments
-
Well-Known Uniform Resource Identifiers (URIs)
(RFC8615)
, M. Nottingham
, 2019
, Source: Request For Comments
-
HTTP Semantics
(RFC9110)
, R. Fielding
, M. Nottingham
, J. Reschke
, 2022
, Source: Request For Comments
-
HTTP Caching
(RFC9111)
, R. Fielding
, M. Nottingham
, J. Reschke
, 2022
, Source: Request For Comments
-
HTTP/1.1
(RFC9112)
, R. Fielding
, M. Nottingham
, J. Reschke
, 2022
, Source: Request For Comments
-
Identity as a Service
(IdaaS)
Identity as a Service, or IDaaS is cloud-based authentication built and operated by a third-party provider. IDaaS companies supply cloud-based
authentication or identity management to enterprises who subscribe.
-
Information Systems Audit and Control Association
(ISACA)
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the
Information Systems Audit and Control Association, although ISACA now goes by its acronym only. ISACA currently offers 8 certification programs, as well as
other micro-certificates.
-
Web Site
, Source: Information Systems Audit and Control Association
-
ISACA
, Source: Wikipedia
-
Information Technology Infrastructure Library
(ITIL)
The Information Technology Infrastructure Library (ITIL) is a set of practices and a framework for IT activities such as IT service management
(ITSM) and IT asset management (ITAM) that focus on aligning IT services with the needs of the business.
-
Infrastructure as a Service
(IaaS)
Infrastructure as a service (IaaS) is a cloud computing service model by means of which computing resources are supplied by a cloud services
provider. The IaaS vendor provides the storage, network, servers, and virtualization (which mostly refers, in this case, to emulating computer
hardware).
-
Integrated Development Environment
(IDE)
An integrated development environment (IDE) is a software application that provides comprehensive facilities for software development. An IDE
normally consists of at least a source-code editor, build automation tools, and a debugger.
-
International Organization for Standardization
(ISO)
The International Organization for Standardization (ISO) is an independent, non-governmental, international standard development
organization composed of representatives from the national standards organizations of member countries.
-
Web Site
, Source: International Organization for Standardization
-
Internet Assigned Numbers Authority
(IANA)
The global coordination of the
DNS Root, IP addressing, and other Internet protocol resources is performed
as the Internet Assigned Numbers Authority (IANA) functions.
-
Web Site
, Source: Internet Assigned Numbers Authority
-
Internet Control Message Protocol
(ICMP)
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices,
including routers, to send error messages and operational information indicating success or failure when communicating with another
IP address.
-
Internet Control Message Protocol
, Source: Wikipedia
-
PROBE: A Utility for Probing Interfaces
(RFC8335)
, R. Bonica
, R. Thomas
, J. Linkova
, C. Lenart
, M. Boucadair
, 2018
, Source: Request For Comments
-
Formally Deprecating Some ICMPv4 Message Types
(RFC6918)
, R. Bonica
, D. Gan
, D. Tappan
, C. Pignataro
, 2013
, Source: Request For Comments
-
Deprecation of ICMP Source Quench Messages
(RFC6633)
, F. Gont
, 2012
, Source: Request For Comments
-
Extended ICMP to Support Multi-Part Messages
(RFC4884)
, J. Mogul
, Jon Postel
, 2007
, Source: Request For Comments
-
Internet Standard Subnetting Procedure
(RFC0950)
, J. Mogul
, Jon Postel
, 1985
, Source: Request For Comments
-
Internet Control Message Protocol
(RFC0792)
, Jon Postel
, 1981
, Source: Request For Comments
-
Internet Corporation for Assigned Names and Numbers
(ICANN)
The Internet Corporation for Assigned Names and Numbers (ICANN) is a global multistakeholder group and nonprofit organization
headquartered in the United States responsible for coordinating the maintenance and procedures of several databases related to the namespaces
and numerical spaces of the Internet, ensuring the Internet's stable and secure operation.
-
ICANN
, Source: Wikipedia
-
Web Site
, Source: Internet Corporation for Assigned Names and Numbers
-
Internet Engineering Task Force
(IETF)
The Internet Engineering Task Force (IETF), founded in 1986, is the premier standards development organization (SDO) for the
Internet. The IETF makes voluntary standards that are often adopted by Internet users, network operators, and equipment vendors, and it thus
helps shape the trajectory of the development of the Internet. But in no way does the IETF control, or even patrol, the Internet.
-
Internet Message Access Protocol
(IMAP)
The Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server
over a TCP/IP connection.
-
Internet of Things
(IoT)
The Internet of Things (IoT) describes the network of physical objects ? "things" ? that are embedded with sensors,
software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
-
Internet Protocol
(IP)
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams
across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
-
Internet Protocol
, Source: Wikipedia
-
Internet Protocol, Version 6 (IPv6) Specification
(RFC8200)
, S. Deering
, R. Hinden
, 2017
, Source: Request For Comments
-
Implications of Oversized IPv6 Header Chains
(RFC7112)
, F. Gont
, V. Manral
, R. Bonica
, 2014
, Source: Request For Comments
-
Transmission and Processing of IPv6 Extension Headers
(RFC7045)
, B. Carpenter
, S. Jiang
, 2013
, Source: Request For Comments
-
Processing of IPv6 'Atomic' Fragments
(RFC6946)
, F. Gont
, 2013
, Source: Request For Comments
-
IPv6 and UDP Checksums for Tunneled Packets
(RFC6935)
, M. Eubanks
, P. Chimento
, M. Westerlund
, 2013
, Source: Request For Comments
-
Updated Specification of the IPv4 ID Field
(RFC6864)
, J. Touch
, 2013
, Source: Request For Comments
-
A Uniform Format for IPv6 Extension Headers
(RFC6564)
, S. Krishnan
, J. Woodyatt
, E. Kline
, J. Hoagland
, M. Bhatia
, 2012
, Source: Request For Comments
-
IPv6 Flow Label Specification
(RFC6437)
, S. Amante
, B. Carpenter
, S. Jiang
, J. Rajahalme
, 2011
, Source: Request For Comments
-
IANA Allocation Guidelines for the IPv6 Routing Header
(RFC5871)
, J. Arkko
, S. Bradner
, 2010
, Source: Request For Comments
-
Handling of Overlapping IPv6 Fragments
(RFC5722)
, S. Krishnan
, 2009
, Source: Request For Comments
-
Deprecation of Type 0 Routing Headers in IPv6
(RFC5095)
, J. Abley
, P. Savola
, G. Neville-Neil
, 2007
, Source: Request For Comments
-
Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers
(RFC2474)
, K. Nichols
, S. Blake
, F. Baker
, D. Black
, 1998
, Source: Request For Comments
-
IP Encapsulation within IP
(RFC2003)
, C. Perkins
, 1996
, Source: Request For Comments
-
Internet Protocol
(RFC0791)
, Jon Postel
, 1981
, Source: Request For Comments
-
Java Authentication and Authorization Service
(JAAS)
Java Authentication and Authorization Service, or JAAS is the Java implementation of the standard Pluggable Authentication Module (PAM)
information security framework. JAAS has as its main goal the separation of concerns of user authentication so that they may be managed independently.
While the former authentication mechanism contained information about where the code originated from and who signed that code, JAAS adds a marker about
who runs the code. By extending the verification vectors JAAS extends the security architecture for Java applications that require authentication and
authorization modules.
-
Java Database Connectivity
(JDBC)
Java Database Connectivity (JDBC) is an application programming interface (
API) for the Java programming language
which defines how a client may access a database. It is a Java-based data access technology used for Java database connectivity. It is part of the Java
Standard Edition platform, from Oracle Corporation.
-
Java Development Kit
(JDK)
The Java Development Kit (JDK) is a distribution of Java technology by Oracle Corporation. It implements the Java Language Specification (JLS)
and the Java Virtual Machine Specification (JVMS) and provides the Standard Edition (SE) of the Java Application Programming Interface
(
API).
-
Java Runtime Environment
(JRE)
The Java Runtime Environment (JRE) released by Oracle is a freely available software distribution containing a stand-alone
JVM (HotSpot), the Java standard library (Java Class Library), a configuration tool, and - until its discontinuation in JDK 9 - a
browser plug-in.
-
Java Virtual Machine
(JVM)
A Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages
that are also compiled to Java bytecode.
-
Java virtual machine
, Source: Wikipedia
-
The Java Virtual Machine Specification, Java SE 22 Edition
, 2024
, Source: Oracle
-
The Java Virtual Machine Specification, Java SE 17 Edition
, 2021
, Source: Oracle
-
The Java Virtual Machine Specification, Java SE 11 Edition
, 2018
, Source: Oracle
-
The Java Virtual Machine Specification, Java SE 8 Edition
, 2015
, Source: Oracle
-
Java™ API for RESTful Web Services
(JAX-RS)
This JSR is to develop JAX-RS 2.1, the next release of Java™ API for
RESTful Web Services.
-
Java™ API for XML-Based Web Services
(JAX-WS)
The Java™ API for
XML-Based Web Services (JAX-WS) 2.0 specification is the next generation web
services API replacing JAX-RPC 1.0.
-
Java™ Business Integration
(JBI)
Java™ Business Integration (JBI) is a standard developed under the Java™ Community Process (
JCP) as an
approach to implementing a service-oriented architecture (SOA). It defines an environment for plug-in components that interact using a services
model based directly on Web Services Description Language (
WSDL) 2.0.
-
Java™ Community Process
(JCP)
The JCP is the mechanism for developing standard technical specifications for Java™ technology.
-
Web Site
, Source: Java Community Process
-
Java™ Messaging Service
(JMS)
The Java™ Message Service (JMS) API is a messaging standard that allows application components based on the Java™ Platform Enterprise
Edition (Java™ EE) to create, send, receive, and read messages. It enables distributed communication that is loosely coupled, reliable, and
asynchronous.
-
Java™ Specification Request
(JSR)
Java™ Specification Requests (JSRs) are the actual descriptions of proposed and final specifications for the Java™
platform.
-
Web Site
, Source: Java Community Process
-
JavaScript Object Notation
(JSON)
JavaScript Object Notation (JSON) is an open standard file format and data interchange format that uses human-readable text to store
and transmit data objects consisting of attribute?value pairs and arrays (or other serializable values). It is a commonly used data format with
diverse uses in electronic data interchange, including that of web applications with servers.
-
JSON Web Token
(JWT)
JSON Web Token (JWT) is a proposed Internet standard for creating data with optional signature and/or optional encryption whose payload holds
JSON that asserts some number of claims. The tokens are signed either using a private secret or a public/private key.
-
JSON Web Token
, Source: Wikipedia
-
Web Site
, Source: Okta
-
JSON Web Token Best Current Practices
(RFC8725)
, Y. Sheffer
, D. Hardt
, M. Jones
, 2020
, Source: Request For Comments
-
JSON Web Signature (JWS) Unencoded Payload Option
(RFC7797)
, M. Jones
, 2016
, Source: Request For Comments
-
JSON Web Token (JWT)
(RFC7519)
, N. Sakimura
, J. Bradley
, N. Agarwal
, 2015
, Source: Request For Comments
-
Key Performance Indicator
(KPI)
KPIs evaluate the success of an organization or of a particular activity (such as projects, programs, products and other initiatives) in which
it engages. KPIs provide a focus for strategic and operational improvement, create an analytical basis for decision making and help focus attention on what
matters most.
-
Knowledge Representation and Reasoning
(KRR)
Knowledge representation and reasoning is the field of
artificial intelligence (AI) dedicated to
representing information about the world in a form that a computer system can use to solve complex tasks such as diagnosing a medical condition or
having a dialog in a natural language.
-
Large Language Model
(LLM)
A large language model (LLM) is a computational model notable for its ability to achieve general-purpose language generation and other
natural language processing tasks such as classification.
-
Latent Semantic Analysis
(LSA)
Latent semantic analysis (LSA) is a technique in natural language processing, in particular distributional semantics, of analyzing
relationships between a set of documents and the terms they contain by producing a set of concepts related to the documents and
terms.
-
LEAN
Lean is a way of thinking about creating needed value with fewer resources and less waste. And lean is a practice consisting of continuous
experimentation to achieve perfect value with zero waste. Lean thinking and practice occur together.
-
Lempel-Ziv-Welch
(LZW)
Lempel?Ziv?Welch (LZW) is a universal lossless data compression algorithm created by Abraham Lempel, Jacob Ziv, and Terry Welch. The algorithm is
simple to implement and has the potential for very high throughput in hardware implementations. It is the algorithm of the Unix file compression utility
compress and is used in the GIF image format.
-
Lightweight Directory Access Protocol
(LDAP)
The Lightweight Directory Access Protocol (LDAP) provides access to distributed directory services that act in accordance with
X.500 data and service models.
-
Local Area Network
(LAN)
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory,
university campus or office building.
-
Long Short-Term Memory
(LSTM)
Long short-term memory (LSTM) is a type of
recurrent neural network (RNN) aimed at dealing with the
vanishing gradient problem present in traditional RNNs.
-
Mathematical Markup Language
(MathML)
MathML is a markup language for describing mathematical notation and capturing both its structure and content. The goal of MathML
is to enable mathematics to be served, received, and processed on the World Wide Web, just as
HTML has enabled this
functionality for text.
-
Memory Management Unit
(MMU)
A memory management unit (MMU), sometimes called paged memory management unit (PMMU), is a computer hardware unit that examines all memory
references on the memory bus, translating these requests, known as virtual memory addresses, into physical addresses in main memory.
-
Meta-Object Facility
(MOF)
The Meta-Object Facility (MOF) is an Object Management Group (
OMG) standard for model-driven engineering.
Its purpose is to provide a type system for entities in the
CORBA architecture and a set of interfaces through which
those types can be created and manipulated. MOF may be used for domain-driven software design and object-oriented modelling.
-
Multi-Factor Authentication
(MFA)
Multi-factor authentication (MFA) is an electronic authentication method in which a user is granted access to a website or application only
after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
-
National Institute of Standards and Technology
(NIST)
The National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce.
Its mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that
enhance economic security and improve our quality of life.
-
Web Site
, Source: National Institute of Standards and Technology
-
Digital Identity Guidelines
, 2024
, Source: National Institute of Standards and Technology
, DOI:10.6028/NIST.SP.800-63-4.2pd
-
Digital Identity Guidelines: Identity Proofing and Enrollment
, 2024
, Source: National Institute of Standards and Technology
, DOI:10.6028/NIST.SP.800-63A-4.2pd
-
Digital Identity Guidelines Authentication and Authenticator Management
, 2024
, Source: National Institute of Standards and Technology
, DOI:10.6028/NIST.SP.800-63B-4.2pd
-
Digital Identity Guidelines: Federation and Assertions
, 2024
, Source: National Institute of Standards and Technology
, DOI:10.6028/NIST.SP.800-63C-4.2pd
-
Natural Language Processing
(NLP)
Natural language processing (NLP) is an interdisciplinary subfield of computer science and artificial intelligence. It is primarily
concerned with providing computers the ability to process data encoded in natural language and is thus closely related to information retrieval,
knowledge representation and computational linguistics, a subfield of linguistics.
-
Network Address Translation
(NAT)
Network Address Translation (NAT) is a service that operates on a router or edge platform to connect private networks to public
networks like the internet.
-
Network Time Protocol
(NTP)
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency
data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use.
-
Network Time Protocol
, Source: Wikipedia
-
Network Time Protocol Version 4: Port Randomization
(RFC9109)
, F. Gont
, G. Gont
, M. Lichvar
, 2021
, Source: Request For Comments
-
Message Authentication Code for the Network Time Protocol
(RFC8573)
, A. Malhotra
, S. Goldberg
, 2019
, Source: Request For Comments
-
Network Time Protocol Version 4 (NTPv4) Extension Fields
(RFC7822)
, T. Mizrahi
, D. Mayer
, 2016
, Source: Request For Comments
-
Network Time Protocol Version 4: Protocol and Algorithms Specification
(RFC5905)
, D.L. Mills
, J. Martin
, J. Burbank
, W. Kasch
, 2010
, Source: Request For Comments
-
New Technology LAN Manager
(NTLM)
New Technology LAN Manager (NTLM) is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to
users.
-
Non-Interactive Zero Knowledge
(NIZK)
Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the
prover, without revealing any of the specific information beyond the validity of the statement itself. This makes direct communication between the prover and
verifier unnecessary, effectively removing any intermediaries.
-
OAuth 2.0
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an
HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource
owner and the
HTTP service, or by allowing the third-party application to obtain access on its own
behalf.
-
The OAuth 2.0 Authorization Framework
(RFC6749)
, D. Hardt
, 2012
, Source: Request For Comments
-
OAuth 2.0 for Native Apps
(RFC8252)
, W. Denniss
, J. Bradley
, 2017
, Source: Request For Comments
-
Deprecating TLS 1.0 and TLS 1.1
(RFC8996)
, K. Moriarty
, S. Farrell
, 2021
, Source: Request For Comments
-
Object Constraint Language
(OCL)
The Object Constraint Language (OCL) is a declarative language describing rules applying to Unified Modeling Language (
UML) models developed at IBM and is now part of the
UML standard. Initially, OCL was merely a formal
specification language extension for
UML. OCL may now be used with any Meta-Object Facility (
MOF)
Object Management Group (OMG) meta-model, including
UML.
-
Object Management Group®
(OMG)
The Object Management Group® Standards Development Organization (OMG® SDO) is an international (27 countries),
membership-driven (230+ organizations) and not-for-profit consortium
-
Object/Relational Model
(ORM)
Object?relational mapping (ORM, O/RM, and O/R mapping tool) in computer science is a programming technique for converting data between a
relational database and the heap of an object-oriented programming language. This creates, in effect, a virtual object database that can be used from
within the programming language.
-
Oracle Call Interface
(OCI)
Domain: Databases
In computing, the Oracle Call Interface (OCI) consists of a set of C-language software
APIs which provide an
interface to the Oracle database. OCI offers a procedural
API for not only performing certain database administration tasks
(such as system startup and shutdown), but also for using PL/
SQL or
SQL to query, access, and manipulate data.
-
Oracle Unified Directory
(OUD)
Oracle Unified Directory is part of Oracle's comprehensive directory solution offering for robust identity management deployments.
Enable enterprise directory scalability with an all-in-one solution that provides the services required for high performance and massive
scale.
-
Password Vault Web Access
(PVWA)
Domain: CyberArk
The Password Vault Web Access (PVWA) is a CyberArk component that enables you to access and configure the PVWA solution over the web.
-
Pathway Language Model 2
(PaLM2)
PaLM 2 is a next generation language model with improved multilingual, reasoning and coding capabilities that builds on Google?s legacy of
breakthrough research in machine learning and responsible AI.
-
Platform as a Service
(PaaS)
Platform as a service (PaaS) or application platform as a service (aPaaS) or platform-based service is a category of cloud computing services
that allows customers to provision, instantiate, run, and manage a modular bundle comprising a computing platform and one or more applications, without the
complexity of building and maintaining the infrastructure typically associated with developing and launching the application(s), and to allow developers to
create, develop, and package such software bundles.
-
Pluggable Authentication Module
(PAM)
Domain: Authentication
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application
programming interface (API). PAM allows programs that rely on authentication to be written independently of the underlying authentication scheme.
-
Pluggable Database
(PDB)
A pluggable database (PDB) is a portable collection of schemas, schema objects, and nonschema objects that appears to an application as a
separate database. At the physical level, each PDB has its own set of data files that store the data for the PDB.
-
Post Office Protocol
(POP)
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a
mail server. Today, POP version 3 (POP3) is the most commonly used version. Together with
IMAP, it is one of the most common
protocols for email retrieval.
-
Post Office Protocol
, Source: Wikipedia
-
Deprecation of TLS 1.1 for Email Submission and Access
(RFC8997)
, L. Velvindron
, S. Farrell
, 2021
, Source: Request For Comments
-
DNS AttrLeaf Changes: Fixing Specifications That Use Underscored Node Names
(RFC8553)
, D. Crocker
, 2019
, Source: Request For Comments
-
Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access
(RFC8314)
, K. Moore
, C. Newman
, 2018
, Source: Request For Comments
-
Use of SRV Records for Locating Email Submission/Access Services
(RFC6186)
, C. Daboo
, 2011
, Source: Request For Comments
-
The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism
(RFC5034)
, R. Siemborski
, A. Menon-Sen
, 2007
, Source: Request For Comments
-
POP3 Extension Mechanism
(RFC2449)
, R. Gellens
, C. Newman
, L. Lundblade
, 1998
, Source: Request For Comments
-
Some Observations on Implementations of the Post Office Protocol (POP3)
(RFC1957)
, R. Nelson
, 1996
, Source: Request For Comments
-
Post Office Protocol - Version 3
(RFC1939)
, J. Myers
, M. Rose
, 1996
, Source: Request For Comments
-
PowerShell
PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the
associated scripting language
-
Privacy Pass Architecture
Privacy Pass is an architecture for authorization based on privacy-preserving authentication mechanisms. In other words, relying parties
authenticate Clients in a privacy-preserving way, i.e., without learning any unique, per-Client information through the authentication protocol, and then make
authorization decisions on the basis of that authentication succeeding or failing. Possible authorization decisions might be to provide Clients with read
access to a particular resource or write access to a particular resource.
-
Privacy Pass
, Source: GitHub
-
Privacy Pass Issuance Protocols
(RFC9578)
, S. Celi
, A. Davidson
, S. Valdez
, C. A. Wood
, 2024
, Source: Request For Comments
-
The Privacy Pass HTTP Authentication Scheme
(RFC9577)
, T. Pauly
, S. Valdez
, C. A. Wood
, 2024
, Source: Request For Comments
-
The Privacy Pass Architecture
(RFC9576)
, A. Davidson
, J. Iyengar
, C. A. Wood
, 2024
, Source: Request For Comments
-
Privileged Access Management
(PAM)
Domain: Access Management
Privileged Access Management (PAM) is a type of identity management and branch of cybersecurity that focuses on the control, monitoring, and
protection of privileged accounts within an organization.
-
Pronunciation Lexicon Specification
(PLS)
The Pronunciation Lexicon Specification (PLS) is a W3C Recommendation, which is designed to enable interoperable specification of pronunciation
information for both speech recognition and speech synthesis engines within voice browsing applications. The language is intended to be easy to use by
developers while supporting the accurate specification of pronunciation information for international use.
-
Proof Key for Code Exchange
(PKCE)
PKCE, which stands for "Proof of Key Code Exchange", is an extension of the OAuth 2.0 protocol that helps prevent code
interception attacks
-
Quantum Processing Unit
(QPU)
The Quantum Processing Unit (QPU) is specialized hardware designed to run quantum algorithms, with the potential to revolutionize technology.
Unlike the Central Processing Unit (
CPU) or Graphics Processing Unit (
GPU), which uses classical bits,
the QPU uses qubits that can exist in a superposition of states. The power of quantum computing lies in the quantum phenomena of superposition, entanglement,
and interference.
-
Recovery Point Objective
(RPO)
Recovery Point Objective or RPO is the point in time to which systems and data must be recovered after a disaster has occurred.
-
Recovery Time Objective
(RTO)
Recovery Time Objective (RTO) refers to the maximum acceptable length of time that can elapse before the lack of a business function severely
impacts the organization. This is the maximum agreed time for the resumption of the critical business functions.
-
Recurrent Neural Network
(RNN)
A recurrent neural network (RNN) is one of the two broad types of artificial neural network, characterized by direction of the flow of
information between its layers. In contrast to the uni-directional
feedforward neural network, it is a bi-directional
artificial neural network, meaning that it allows the output from some nodes to affect subsequent input to the same nodes.
-
Relational Database Management System
(RDBMS)
A relational database management system (RDBMS) is a program that allows you to create, update, and administer a relational database.
Most relational database management systems use the
SQL language to access the database.
-
Remote Authentication Dial-In User Service
(RADIUS)
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and
accounting (AAA) management for users who connect and use a network service.
-
RADIUS
, Source: Wikipedia
-
RADIUS Extensions for DHCP-Configured Services
(RFC9445)
, M. Boucadair
, T. Reddy.K
, A. DeKok
, 2023
, Source: Request For Comments
-
Dynamic Authorization Proxying in the Remote Authentication Dial-In User Service (RADIUS) Protocol
(RFC8559)
, A. DeKok
, J. Korhonen
, 2008
, Source: Request For Comments
-
Data Types in RADIUS
(RFC8044)
, A. DeKok
, 2017
, Source: Request For Comments
-
Larger Packets for RADIUS over TCP
(RFC7930)
, S. Hartman
, 2016
, Source: Request For Comments
-
Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)
(RFC7585)
, S. Winter
, M. McCauley
, 2015
, Source: Request For Comments
-
Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS
(RFC7360)
, A. DeKok
, 2014
, Source: Request For Comments
-
RADIUS Attributes for IEEE 802 Networks
(RFC7268)
, B. Aboba
, J. Malinen
, P. Congdon
, J. Salowey
, M. Jones
, 2014
, Source: Request For Comments
-
Remote Authentication Dial-In User Service (RADIUS) Protocol Extensions
(RFC6929)
, A. DeKok
, A. Lior
, 2013
, Source: Request For Comments
-
RADIUS Attributes for IPv6 Access Networks
(RFC6911)
, W. Dec
, B. Sarikaya
, G. Zorn
, D. Miles
, B. Lourdelet
, 2013
, Source: Request For Comments
-
Transport Layer Security (TLS) Encryption for RADIUS
(RFC6614)
, S. Winter
, M. McCauley
, S. Venaas
, K. Wierenga
, 2012
, Source: Request For Comments
-
RADIUS over TCP
(RFC6613)
, A. DeKok
, 2012
, Source: Request For Comments
-
Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)
(RFC6421)
, D. Nelson
, 2011
, Source: Request For Comments
-
Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
(RFC6218)
, G. Zorn
, T. Zhang
, J. Walker
, J. Salowey
, 2011
, Source: Request For Comments
-
RADIUS Design Guidelines
(RFC6158)
, A. DeKok
, G. Weber
, 2011
, Source: Request For Comments
-
Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol
(RFC5997)
, A. DeKok
, 2010
, Source: Request For Comments
-
Remote Authentication Dial-In User Service (RADIUS) Authorization for Network Access Server (NAS) Management
(RFC5607)
, D. Nelson
, G. Weber
, 2009
, Source: Request For Comments
-
Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)
(RFC5176)
, M. Chiba
, M. Eklund
, D. Mitton
, B. Aboba
, 2008
, Source: Request For Comments
-
RADIUS Extension for Digest Authentication
(RFC5090)
, B. Sterman
, D. Sadolevsky
, D. Schwartz
, D. Williams
, W. Beck
, 2008
, Source: Request For Comments
-
Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes
(RFC5080)
, D. Nelson
, A. DeKok
, 2007
, Source: Request For Comments
-
RADIUS Filter Rule Attribute
(RFC4849)
, P. Congdon
, M. Sanchez
, B. Aboba
, 2007
, Source: Request For Comments
-
RADIUS Delegated-IPv6-Prefix Attribute
(RFC4818)
, J. Salowey
, R. Droms
, 2007
, Source: Request For Comments
-
DSL Forum Vendor-Specific RADIUS Attributes
(RFC4679)
, V. Mammoliti
, G. Zorn
, P. Arberg
, R. Rennison
, 2006
, Source: Request For Comments
-
RADIUS Attributes for Virtual LAN and Priority Support
(RFC4675)
, P. Congdon
, M. Sanchez
, B. Aboba
, 2006
, Source: Request For Comments
-
RADIUS Accounting Server MIB for IPv6
(RFC4671)
, D. Nelson
, 2006
, Source: Request For Comments
-
RADIUS Accounting Client MIB for IPv6
(RFC4670)
, D. Nelson
, 2006
, Source: Request For Comments
-
RADIUS Authentication Server MIB for IPv6
(RFC4669)
, D. Nelson
, 2006
, Source: Request For Comments
-
RADIUS Authentication Client MIB for IPv6
(RFC4668)
, D. Nelson
, 2006
, Source: Request For Comments
-
Chargeable User Identity
(RFC4372)
, F. Adrangi
, A. Lior
, J. Korhonen
, J. Loughney
, 2006
, Source: Request For Comments
-
Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option
(RFC4014)
, R. Droms
, J. Schnizlein
, 2005
, Source: Request For Comments
-
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
(RFC3580)
, P. Congdon
, B. Aboba
, A. Smith
, G. Zorn
, J. Roese
, 2003
, Source: Request For Comments
-
RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)
(RFC3579)
, B. Aboba
, P. Calhoun
, 2003
, Source: Request For Comments
-
IANA Considerations for RADIUS (Remote Authentication Dial In User Service)
(RFC3575)
, B. Aboba
, 2003
, Source: Request For Comments
-
RADIUS and IPv6
(RFC3162)
, B. Aboba
, G. Zorn
, D. Mitton
, 2001
, Source: Request For Comments
-
Network Access Servers Requirements: Extended RADIUS Practices
(RFC2882)
, D. Mitton
, 2000
, Source: Request For Comments
-
RADIUS Extensions
(RFC2869)
, C. Rigney
, W. Willats
, P. Calhoun
, 2000
, Source: Request For Comments
-
RADIUS Attributes for Tunnel Protocol Support
(RFC2868)
, G. Zorn
, D. Leifer
, A. Rubens
, J. Shriver
, M. Holdrege
, I. Goyret
, 2000
, Source: Request For Comments
-
RADIUS Accounting Modifications for Tunnel Protocol Support
(RFC2867)
, G. Zorn
, B. Aboba
, D. Mitton
, 2000
, Source: Request For Comments
-
RADIUS Accounting
(RFC2866)
, C. Rigney
, 2000
, Source: Request For Comments
-
Remote Authentication Dial In User Service (RADIUS)
(RFC2865)
, C. Rigney
, S. Willens
, A. Rubens
, W. Simpson
, 2000
, Source: Request For Comments
-
Representational State Transfer
(REST)
REST (REpresentational State Transfer) is a software architectural style that was created to guide the design and development of the
architecture for the World Wide Web. REST defines a set of constraints for how the architecture of a distributed, Internet-scale hypermedia system,
such as the Web, should behave. The REST architectural style emphasises uniform interfaces, independent deployment of components, the scalability of
interactions between them, and creating a layered architecture to promote caching to reduce user-perceived latency, enforce security, and
encapsulate legacy systems.
-
Request For Comments
(RFC)
The
IETF publishes its technical documentation as RFCs. They define the Internet's technical foundations, such as addressing,
routing and transport technologies. They recommend operational best practice and specify application protocols that are used to deliver
services used by billions of people every day.
-
About RFCs
, Source: Internet Engineering Task Force
-
Resource Description Framework
(RDF)
The Resource Description Framework (RDF) is a World Wide Web Consortium (W3C) standard originally designed as a data model for
metadata. It has come to be used as a general method for description and exchange of graph data.
-
Robotic Process Automation
(RPA)
Robotic process automation (RPA) is a form of business process automation that is based on software robots (bots) or artificial intelligence
(
AI) agents. RPA should not be confused with artificial intelligence as it is based on automotive technology following a
predefined workflow.
-
RPM Package Manager
(RPM)
RPM Package Manager (RPM) (originally Red Hat Package Manager, now a recursive acronym) is a free and open-source package management
system.
-
Sarbanes-Oxley Act
(SoX)
The Sarbanes?Oxley Act of 2002 is a United States federal law that mandates certain practices in financial record keeping and reporting for
corporations.
-
Schnorr Protocol
This document describes the Schnorr non-interactive zero-knowledge (
NIZK) proof, a non-interactive variant of the three-pass Schnorr
identification scheme. The Schnorr
NIZK proof allows one to prove the knowledge of a discrete logarithm without leaking any information about its
value. It can serve as a useful building block for many cryptographic protocols to ensure that participants follow the protocol specification
honestly.
-
Security Assertion Markup Language
(SAML)
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties,
in particular, between an identity provider and a service provider. SAML is an
XML-based markup language for security
assertions (statements that service providers use to make access-control decisions).
-
Security Information and Event Management
(SIEM)
Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and
security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware.
-
Security Orchestration, Automation and Response
(SOAR)
Security orchestration, automation and response (SOAR) is a group of cybersecurity technologies that allow organizations to respond to some
incidents automatically. It collects inputs monitored by the security operations team such as alerts from the
SIEM system, TIP,
and other security technologies and helps define, prioritize, and drive standardized incident response activities.
-
Segregation of Duties
(SoD)
Separation of duties (SoD), also known as segregation of duties, is the concept of having more than one person required to complete a task. It is
an administrative control used by organisations to prevent fraud, sabotage, theft, misuse of information, and other security compromises.
-
Semantic Interpretation for Speech Recognition
(SISR)
Semantic Interpretation for Speech Recognition (SISR) defines the syntax and semantics of annotations to grammar rules in the Speech
Recognition Grammar Specification (
SRGS).
-
Simple and Protected GSSAPI Negotiation Mechanism
(SPNEGO)
Simple and Protected
GSSAPI Negotiation Mechanism (SPNEGO) is a
GSSAPI "pseudo
mechanism" used by client-server software to negotiate the choice of security technology. SPNEGO is used when a client application wants to
authenticate to a remote server, but neither end is sure what authentication protocols the other supports. The pseudo-mechanism uses a protocol to determine
what common
GSSAPI mechanisms are available, selects one and then dispatches all further security operations to it.
-
SPNEGO
, Source: Wikipedia
-
The Simple and Protected Generic Security Service Application Program Interface (GSS-API) Negotiation Mechanism
(RFC4178)
, L. Zhu
, P. Leach
, K. Jaganathan
, W. Ingersoll
, 2005
, Source: Request For Comments
-
SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows
(RFC4559)
, K. Jaganathan
, L. Zhu
, J. Brezak
, 2006
, Source: Request For Comments
-
Simple Authentication and Security Layer
(SASL)
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It
decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in
any application protocol that uses SASL.
-
Simple Authentication and Security Layer
, Source: Wikipedia
-
Deprecating TLS 1.0 and TLS 1.1
(RFC8996)
, K. Moriarty
, S. Farrell
, 2021
, Source: Request For Comments
-
A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth
(RFC7628)
, W. Mills
, T. Showalter
, H. Tschofenig
, 2015
, Source: Request For Comments
-
The PLAIN Simple Authentication and Security Layer (SASL) Mechanism
(RFC4616)
, K. Zeilenga
, 2006
, Source: Request For Comments
-
Anonymous Simple Authentication and Security Layer (SASL) Mechanism
(RFC4505)
, K. Zeilenga
, 2006
, Source: Request For Comments
-
Simple Authentication and Security Layer (SASL)
(RFC4422)
, A. Melnikov
, K. Zeilenga
, 2006
, Source: Request For Comments
-
Simple Mail Transfer Protocol
(SMTP)
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail
transmission.
-
Simple Mail Transfer Protocol
, Source: Wikipedia
-
Deprecation of TLS 1.1 for Email Submission and Access
(RFC8997)
, L. Velvindron
, S. Farrell
, 2021
, Source: Request For Comments
-
Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access
(RFC8314)
, K. Moore
, C. Newman
, 2018
, Source: Request For Comments
-
Relaxing Restrictions on Explicit Congestion Notification (ECN) Experimentation
(RFC8311)
, D. Black
, 2018
, Source: Request For Comments
-
Message Disposition Notification
(RFC8098)
, T. Hansen
, A. Melnikov
, 2017
, Source: Request For Comments
-
Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols
(RFC7817)
, A. Melnikov
, 2016
, Source: Request For Comments
-
The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2)
(RFC7619)
, V. Smyslov
, P. Wouters
, 2015
, Source: Request For Comments
-
SMTP 521 and 556 Reply Codes
(RFC7504)
, J. Klensin
, 2015
, Source: Request For Comments
-
Update to Internet Message Format to Allow Group Syntax in the 'From:' and 'Sender:' Header Fields
(RFC6854)
, B. Leiba
, 2013
, Source: Request For Comments
-
Internationalized Delivery Status and Disposition Notifications
(RFC6533)
, T. Hansen
, C. Newman
, A. Melnikov
, 2012
, Source: Request For Comments
-
SMTP Extension for Internationalized Email
(RFC6531)
, J. Yao
, W. Mao
, 2012
, Source: Request For Comments
-
Overview and Framework for Internationalized Email
(RFC6530)
, J. Klensin
, Y. Ko
, 2012
, Source: Request For Comments
-
The Multipart/Report Media Type for the Reporting of Mail System Administrative Messages
(RFC6522)
, M. Kucherawy
, 2012
, Source: Request For Comments
-
Message Submission for Mail
(RFC6409)
, R. Gellens
, J. Klensin
, 2011
, Source: Request For Comments
-
Tunnelling of Explicit Congestion Notification
(RFC6040)
, B. Briscoe
, 2010
, Source: Request For Comments
-
Sieve Notification Mechanism: mailto
(RFC5436)
, B. Leiba
, M. Haardt
, 2009
, Source: Request For Comments
-
Internet Message Format
(RFC5322)
, P. Resnick
, 2008
, Source: Request For Comments
-
Simple Mail Transfer Protocol
(RFC5321)
, J. Klensin
, 2008
, Source: Request For Comments
-
A Registry for SMTP Enhanced Mail System Status Codes
(RFC5248)
, T. Hansen
, J. Klensin
, 2008
, Source: Request For Comments
-
SMTP Service Extension for Authentication
(RFC4954)
, R. Siemborski
, A. Melnikov
, 2007
, Source: Request For Comments
-
SMTP Submission Service Extension for Future Message Release
(RFC4865)
, G. White
, G. Vaudreuil
, 2007
, Source: Request For Comments
-
Message Submission BURL Extension
(RFC4468)
, C. Newman
, 2006
, Source: Request For Comments
-
Security Architecture for the Internet Protocol
(RFC4301)
, S. Kent
, K. Seo
, 2005
, Source: Request For Comments
-
SMTP Operational Experience in Mixed IPv4/v6 Environments
(RFC3974)
, M. Nakamura
, J. Hagino
, 2005
, Source: Request For Comments
-
An Extensible Message Format for Message Tracking Responses
(RFC3886)
, E. Allman
, 2004
, Source: Request For Comments
-
SMTP Service Extension for Message Tracking
(RFC3885)
, E. Allman
, T. Hansen
, 2004
, Source: Request For Comments
-
Recommendations for Automatic Responses to Electronic Mail
(RFC3834)
, K. Moore
, 2004
, Source: Request For Comments
-
An Extensible Message Format for Delivery Status Notifications
(RFC3464)
, K. Moore
, G. Vaudreuil
, 2003
, Source: Request For Comments
-
Enhanced Mail System Status Codes
(RFC3463)
, G. Vaudreuil
, 2003
, Source: Request For Comments
-
Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)
(RFC3461)
, K. Moore
, 2003
, Source: Request For Comments
-
New Terminology and Clarifications for Diffserv
(RFC3260)
, D. Grossman
, 2002
, Source: Request For Comments
-
SMTP Service Extension for Secure SMTP over Transport Layer Security
(RFC3207)
, P. Hoffman
, 2002
, Source: Request For Comments
-
The Addition of Explicit Congestion Notification (ECN) to IP
(RFC3168)
, K. Ramakrishnan
, S. Floyd
, D. Black
, 2001
, Source: Request For Comments
-
SMTP Service Extensions for Transmission of Large and Binary MIME Messages
(RFC3030)
, G. Vaudreuil
, 2000
, Source: Request For Comments
-
SMTP Service Extension for Command Pipelining
(RFC2920)
, N. Freed
, 2000
, Source: Request For Comments
-
Anti-Spam Recommendations for SMTP MTAs
(RFC2505)
, G. Lindberg
, 1999
, Source: Request For Comments
-
SMTP Service Extension for Message Size Declaration
(RFC1870)
, J. Klensin
, N. Freed
, K. Moore
, 1995
, Source: Request For Comments
-
Simple Network Time Protocol
(SNTP)
The Simple Network Time Protocol (S
NTP) is a simplified access strategy for servers and clients using
NTP as now
specified and deployed in the Internet.
-
Simple Object Access Protocol
(SOAP)
SOAP is a lightweight protocol intended for exchanging structured information in a decentralized, distributed
environment.
-
Single Sign-On
(SSO)
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet
independent, software systems.
-
Snappy
Snappy is a compression/decompression library. It does not aim for maximum compression, or compatibility with any other compression library;
instead, it aims for very high speeds and reasonable compression.
-
Software Development Lifecycle
(SDLC)
The software development lifecycle (SDLC) is the cost-effective and time-efficient process that development teams use to design and build
high-quality software. The goal of SDLC is to minimize project risks through forward planning so that software meets customer expectations during production
and beyond. This methodology outlines a series of steps that divide the software development process into tasks you can assign, complete, and
measure.
-
Software Guard Extension
(SGX)
Intel Software Guard Extensions (SGX) is a set of instruction codes implementing
trusted execution environment that
are built into some Intel central processing units (
CPUs). They allow user-level and operating system code to define protected
private regions of memory, called enclaves. SGX is designed to be useful for implementing secure remote computation, secure web browsing, and digital
rights management (
DRM). Other applications include concealment of proprietary algorithms and of encryption keys.
-
SPARQL Protocol and RDF Query Language
(SPARQL)
SPARQL Protocol and
RDF Query Language is an
RDF query language?that is, a semantic query language for databases?able to retrieve and
manipulate data stored in Resource Description Framework (
RDF) format.
-
Speech Recognition Grammar Specification
(SRGS)
Speech Recognition Grammar Specification (SRGS) is a W3C standard for how speech recognition grammars are specified. A speech recognition
grammar is a set of word patterns, and tells a speech recognition system what to expect a human to say.
-
Speech Synthesis Markup Language
(SSML)
Speech Synthesis Markup Language (SSML) is an
XML-based markup language for speech synthesis applications. It is a
recommendation of the
W3C's Voice Browser Working Group. SSML is often embedded in Voice
XML scripts to drive interactive telephony
systems.
-
Standard Generalized Markup Language
(SGML)
The Standard Generalized Markup Language (ISO 8879:1986) is a standard for defining generalized markup languages for
documents.
-
StartTLS
Opportunistic
TLS (Transport Layer Security) refers to extensions in plain text communication protocols, which offer a
way to upgrade a plain text connection to an encrypted (
TLS or SSL) connection instead of using a separate port for encrypted communication. Several protocols
use a command named "START
TLS" for this purpose. It is a form of opportunistic encryption and is primarily intended as a countermeasure to passive
monitoring.
-
Opportunistic TLS
, Source: Wikipedia
-
5.2 - StartTLS
, Source: Apache Directory
-
Extensible Messaging and Presence Protocol (XMPP): Core
(RFC6120)
, P. Saint-Andre
, 2011
, Source: Request For Comments
-
Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)
(RFC4642)
, K. Murchison
, J. Vinocur
, C. Newman
, 2006
, Source: Request For Comments
-
Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms
(RFC4513)
, R. Harrison
, 2006
, Source: Request For Comments
-
Lightweight Directory Access Protocol (LDAP): The Protocol
(RFC4511)
, J. Sermersheim
, 2006
, Source: Request For Comments
-
Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map
(RFC4510)
, K. Zeilenga
, 2006
, Source: Request For Comments
-
Securing FTP with TLS
(RFC4217)
, P. Ford-Hutchinson
, 2005
, Source: Request For Comments
-
SMTP Service Extension for Secure SMTP over Transport Layer Security
(RFC3207)
, P. Hoffman
, 2002
, Source: Request For Comments
-
Using TLS with IMAP, POP3 and ACAP
(RFC2595)
, C. Newman
, 1999
, Source: Request For Comments
-
STRIDE Threat Model
(STRIDE)
STRIDE is a model for identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic
for security threats in six categories (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege).
-
Structure Query Language
(SQL)
Structured Query Language (SQL) is a domain-specific language used to manage data, especially in a relational database management
system (
RDBMS).
-
System for Cross-domain Identity Management
(SCIM)
The System for Cross-domain Identity Management (SCIM) specification is designed to make managing user identities in cloud-based applications
and services easier. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity
of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity
of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this
schema using standard protocols. In essence: make it fast, cheap, and easy to move users in to, out of, and around the cloud.
-
System for Cross-domain Identity Management
-
System for Cross-domain Identity Management: Protocol
(RFC7644)
, P. Hunt
, K. Grizzle
, M. Ansari
, E. Wahlstroem
, C. Mortimore
, 2015
, Source: Request For Comments
-
System for Cross-domain Identity Management: Core Schema
(RFC7643)
, P. Hunt
, K. Grizzle
, E. Wahlstroem
, C. Mortimore
, 2015
, Source: Request For Comments
-
System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements
(RFC7642)
, K. Li
, P. Hunt
, B. Khasnabish
, A. Nadalin
, Z. Zeltsan
, 2015
, Source: Request For Comments
-
Text Encoding Initiative
(TEI)
The Text Encoding Initiative (TEI) is a consortium which collectively develops and maintains a standard for the representation of
texts in digital form. Its chief deliverable is a set of Guidelines which specify encoding methods for machine-readable texts, chiefly in the
humanities, social sciences and linguistics.
-
Transmission Control Protol
(TCP)
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial
network implementation in which it complemented the
Internet Protocol (IP).
-
Transport Layer Security
(TLS)
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer
network.
-
Transport Layer Security
, Source: Wikipedia
-
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3
(RFC9367)
, S. Smyshlyaev
, E. Alekseev
, E. Griboedova
, A. Babueva
, L. Nikiforova
, 2023
, Source: Request For Comments
-
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
(RFC9325)
, Y. Sheffer
, P. Saint-Andre
, T. Fossati
, 2022
, Source: Request For Comments
-
EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3
(RFC9190)
, J. Preuß Mattsson
, M. Sethi
, 2022
, Source: Request For Comments
-
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.2
(RFC9189)
, S. Smyshlyaev
, D. Belyavskiy
, E. Alekseev
, 2022
, Source: Request For Comments
-
Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2
(RFC9155)
, L. Velvindron
, K. Moriarty
, A. Ghedini
, 2021
, Source: Request For Comments
-
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
(RFC9147)
, E. Rescorla
, H. Tschofenig
, N. Modadugu
, 2022
, Source: Request For Comments
-
Connection Identifier for DTLS 1.2
(RFC9146)
, E. Rescorla
, H. Tschofenig
, T. Fossati
, A. Kraus
, 2022
, Source: Request For Comments
-
Record Size Limit Extension for TLS
(RFC8449)
, M. Thomson
, 2018
, Source: Request For Comments
-
IANA Registry Updates for TLS and DTLS
(RFC8447)
, J. Salowey
, S. Turner
, 2018
, Source: Request For Comments
-
The Transport Layer Security (TLS) Protocol Version 1.3
(RFC8446)
, E. Rescorla
, 2018
, Source: Request For Comments
-
egotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)
(RFC7919)
, D. Gillmor
, 2016
, Source: Request For Comments
-
ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)
(RFC7905)
, A. Langley
, W. Chang
, N. Mavrogiannopoulos
, J. Strombergson
, S. Josefsson
, 2016
, Source: Request For Comments
-
A Transport Layer Security (TLS) ClientHello Padding Extension
(RFC7685)
, A. Langley
, 2015
, Source: Request For Comments
-
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension
(RFC7627)
, K. Bhargavan
, A. Delignat-Lavaud
, A. Pironti
, A. Langley
, M. Ray
, 2015
, Source: Request For Comments
-
Deprecating Secure Sockets Layer Version 3.0
(RFC7568)
, R. Barnes
, M. Thomson
, A. Pironti
, A. Langley
, 2015
, Source: Request For Comments
-
TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks
(RFC7507)
, B. Moeller
, A. Langley
, 2015
, Source: Request For Comments
-
Prohibiting RC4 Cipher Suites
(RFC7465)
, A. Popov
, 2015
, Source: Request For Comments
-
Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
(RFC7457)
, Y. Sheffer
, R. Holz
, P. Saint-Andre
, 2015
, Source: Request For Comments
-
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
(RFC7366)
, P. Gutmann
, 2014
, Source: Request For Comments
-
Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension
(RFC7301)
, S. Friedl
, A. Popov
, A. Langley
, E. Stephan
, 2014
, Source: Request For Comments
-
AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS
(RFC7251)
, D. McGrew
, D. Bailey
, M. Campagna
, R. Dugal
, 2014
, Source: Request For Comments
-
Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS)
(RFC7027)
, J. Merkle
, M. Lochter
, 2013
, Source: Request For Comments
-
AES-CCM Cipher Suites for Transport Layer Security (TLS)
(RFC6655)
, D. McGrew
, D. Bailey
, 2012
, Source: Request For Comments
-
Suite B Profile for Transport Layer Security (TLS)
(RFC6460)
, M. Salter
, R. Housley
, 2012
, Source: Request For Comments
-
Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)
(RFC6367)
, S. Kanno
, M. Kanda
, 2011
, Source: Request For Comments
-
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)
(RFC6209)
, W. Kim
, J. Lee
, J. Park
, D. Kwon
, 2011
, Source: Request For Comments
-
Prohibiting Secure Sockets Layer (SSL) Version 2.0
(RFC6176)
, S. Turner
, T. Polk
, 2011
, Source: Request For Comments
-
Using OpenPGP Keys for Transport Layer Security (TLS) Authentication
(RFC6091)
, N. Mavrogiannopoulos
, D. Gillmor
, 2011
, Source: Request For Comments
-
Transport Layer Security (TLS) Extensions: Extension Definitions
(RFC6066)
, D. Eastlake 3rd
, 2011
, Source: Request For Comments
-
Camellia Cipher Suites for TLS
(RFC5932)
, A. Kato
, M. Kanda
, S. Kanno
, 2010
, Source: Request For Comments
-
Transport Layer Security (TLS) Authorization Extensions
(RFC5878)
, M. Brown
, R. Housley
, 2010
, Source: Request For Comments
-
Transport Layer Security (TLS) Renegotiation Indication Extension
(RFC5746)
, T. Dierks
, E. Rescorla
, 2010
, Source: Request For Comments
-
TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)
(RFC5289)
, E. Rescorla
, 2008
, Source: Request For Comments
-
AES Galois Counter Mode (GCM) Cipher Suites for TLS
(RFC5288)
, J. Salowey
, A. Choudhury
, D. McGrew
, 2008
, Source: Request For Comments
-
The EAP-TLS Authentication Protocol
(RFC5216)
, D. Simon
, B. Aboba
, R. Hurst
, 2008
, Source: Request For Comments
-
Using the Secure Remote Password (SRP) Protocol for TLS Authentication
(RFC5054)
, D. Taylor
, T. Wu
, N. Mavrogiannopoulos
, T. Perrin
, 2007
, Source: Request For Comments
-
Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)
(RFC4785)
, U. Blumenthal
, P. Goel
, 2007
, Source: Request For Comments
-
TLS User Mapping Extension
(RFC4681)
, S. Santesson
, A. Medvinsky
, J. Ball
, 2006
, Source: Request For Comments
-
TLS Handshake Message for Supplemental Data
(RFC4680)
, S. Santesson
, 2006
, Source: Request For Comments
-
Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
(RFC4279)
, P. Eronen
, H. Tschofenig
, 2005
, Source: Request For Comments
-
Securing FTP with TLS
(RFC4217)
, P. Ford-Hutchinson
, 2005
, Source: Request For Comments
-
Addition of SEED Cipher Suites to Transport Layer Security (TLS)
(RFC4162)
, H.J. Lee
, J.H. Yoon
, J.I. Lee
, 2005
, Source: Request For Comments
-
Transport Layer Security (TLS) Protocol Compression Using Lempel-Ziv-Stac (LZS)
(RFC3943)
, R. Friend
, 2004
, Source: Request For Comments
-
Transport Layer Security Protocol Compression Methods
(RFC3749)
, S. Hollenbeck
, 2004
, Source: Request For Comments
-
SMTP Service Extension for Secure SMTP over Transport Layer Security
(RFC3207)
, P. Hoffman
, 2002
, Source: Request For Comments
-
HTTP Over TLS
(RFC2818)
, E. Rescorla
, 2000
, Source: Request For Comments
-
Upgrading to TLS Within HTTP/1.1
(RFC2817)
, R. Khare
, S. Lawrence
, 2000
, Source: Request For Comments
-
Addition of Kerberos Cipher Suites to Transport Layer Security (TLS)
(RFC2712)
, A. Medvinsky
, M. Hur
, 1999
, Source: Request For Comments
-
Using TLS with IMAP, POP3 and ACAP
(RFC2595)
, C. Newman
, 1999
, Source: Request For Comments
-
Trusted Computing Base
(TCB)
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its
security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
-
Trusted Container Extension
(TCX)
Trusted Container Extensions (TCX) combines the manageability and agility of standard containers with the strong protection guarantees of
hardware-enforced Trusted Execution Environments (
TEEs) to enable confidential computing for container workloads. TCX provides
significant performance advantages compared to existing approaches while protecting container workloads and the data processed by them.
-
Trusted Execution Environment
(TEE)
Trusted Execution Environment (TEE) is a secure area of a main processor. It helps the code and data loaded inside it be protected with
respect to confidentiality and integrity. Data confidentiality prevents unauthorized entities from outside the TEE from reading data, while code integrity
prevents code in the TEE from being replaced or modified by unauthorized entities, which may also be the computer owner itself as in certain
DRM schemes described in Intel
SGX.
-
Trusted Platform Module
(TPM)
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure
hardware through integrated cryptographic keys.
-
Unified Modeling Language
(UML)
The unified modeling language (UML) is a general-purpose visual modeling language that is intended to provide a standard way to
visualize the design of a system.
-
Uniform Resource Identifier
(URI)
A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an
abstract or physical resource, such as resources on a webpage, mail address, phone number, books, real-world objects such as people and places,
concepts.
-
Uniform Resource Identifier
, Source: Wikipedia
-
Uniform Resource Identifier (URI): Generic Syntax
(RFC3986)
, T. Berners-Lee
, R. Fielding
, L. Masinter
, 2005
, Source: Request For Comments
-
Representing IPv6 Zone Identifiers in Address Literals and Uniform Resource Identifiers
(RFC6874)
, B. Carpenter
, S. Cheshire
, R. Hinden
, 2013
, Source: Request For Comments
-
URI Design and Ownership
(RFC8820)
, M. Nottingham
, 2014
, Source: Request For Comments
-
Uniform Resource Locator
(URL)
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its
location on a computer network and a mechanism for retrieving it. A URL is a specific type of
Uniform Resource Identifier
(URI), although many people use the two terms interchangeably.
-
URL
, Source: Wikipedia
-
URI Design and Ownership
(RFC8820)
, M. Nottingham
, 2020
, Source: Request For Comments
-
The 'file' URI Scheme
(RFC8089)
, M. Kerwin
, 2017
, Source: Request For Comments
-
URI Design and Ownership
(RFC7320)
, M. Nottingham
, 2014
, Source: Request For Comments
-
Representing IPv6 Zone Identifiers in Address Literals and Uniform Resource Identifiers
(RFC6874)
, B. Carpenter
, S. Cheshire
, R. Hinden
, 2013
, Source: Request For Comments
-
The 'tn3270' URI Scheme
(RFC6270)
, M. Yevstifeyev
, 2011
, Source: Request For Comments
-
Moving mailserver: URI Scheme to Historic
(RFC6196)
, A. Melnikov
, 2011
, Source: Request For Comments
-
The 'mailto' URI Scheme
(RFC6068)
, M. Duerst
, L. Masinter
, J. Zawinski
, 2010
, Source: Request For Comments
-
The gopher URI Scheme
(RFC4266)
, P. Hoffman
, 2005
, Source: Request For Comments
-
The telnet URI Scheme
(RFC4248)
, P. Hoffman
, 2005
, Source: Request For Comments
-
Uniform Resource Identifier (URI): Generic Syntax
(RFC3986)
, T. Berners-Lee
, R. Fielding
, L. Masinter
, 2005
, Source: Request For Comments
-
Format for Literal IPv6 Addresses in URL's
(RFC2732)
, R. Hinden
, B. Carpenter
, L. Masinter
, 1999
, Source: Request For Comments
-
Uniform Resource Identifiers (URI): Generic Syntax
(RFC2396)
, T. Berners-Lee
, R. Fielding
, L. Masinter
, 1998
, Source: Request For Comments
-
The mailto URL scheme
(RFC2368)
, P. Hoffman
, L. Masinter
, J. Zawinski
, 1998
, Source: Request For Comments
-
Relative Uniform Resource Locators
(RFC1808)
, R. Fielding
, 1995
, Source: Request For Comments
-
Uniform Resource Locators (URL)
(RFC1738)
, T. Berners-Lee
, L. Masinter
, M. McCahill
, 1994
, Source: Request For Comments
-
Universal Description, Discovery, and Integration
(UDDI)
Universal Description, Discovery, and Integration (UDDI) is an
XML-based registry for business internet services. A provider can explicitly
register a service with a Web Services Registry such as UDDI or publish additional documents intended to facilitate discovery such as Web Services
Inspection Language (WSIL) documents.
-
User Datagram Protocol
(UDP)
In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite
used to send messages (transported as datagrams in packets) to other hosts on an
Internet Protocol (IP) network. Within
an IP network, UDP does not require prior communication to set up communication channels or data paths.
-
User Datagram Protocol
, Source: Wikipedia
-
Packetization Layer Path MTU Discovery for Datagram Transports
(RFC8899)
, G. Fairhurst
, T. Jones
, M. Tüxen
, I. Rüngeler
, T. Völker
, 2020
, Source: Request For Comments
-
Internet Protocol, Version 6 (IPv6) Specification
(RFC8200)
, S. Deering
, R. Hinden
, 2017
, Source: Request For Comments
-
UDP Usage Guidelines
(RFC8085)
, L. Eggert
, G. Fairhurst
, G. Shepherd
, 2017
, Source: Request For Comments
-
Management Information Base for the User Datagram Protocol (UDP)
(RFC4113)
, B. Fenner
, J. Flick
, 2005
, Source: Request For Comments
-
IPv6 Jumbograms
(RFC2675)
, D. Borman
, S. Deering
, R. Hinden
, 1997
, Source: Request For Comments
-
User Datagram Protocol
(RFC0768)
, J. Postel
, 1980
, Source: Request For Comments
-
Virtual Local Area Network
(VLAN)
A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI
layer 2).
-
Virtual Private Cloud
(VPC)
A virtual private cloud (VPC) is an on-demand configurable pool of shared resources allocated within a public cloud environment,
providing a certain level of isolation between the different organizations (denoted as users hereafter) using the resources.
-
Virtual Private Network
(VPN)
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which
is not the public Internet) across one or multiple other networks which are either untrusted (as not controlled by who is aiming to implement
a VPN) or need to be isolated (thus making the lower network invisible or not directly usable).
-
Web Service Inspection Language
(WSIL)
WS-Inspection is a Web service specification for "discovery documents" developed in a joint effort by Microsoft and IBM.
WS-Inspection lists groups of web services and their endpoints in an XML format.
-
Web Services Description Language
(WSDL)
Web Services Description Language Version 2.0 (WSDL 2.0) provides a model and an
XML format for describing
Web services. WSDL 2.0 enables one to separate the description of the abstract functionality offered by a service from concrete details of a service description such
as "how" and "where" that functionality is offered.
-
Web Services Federation
(WS-Fed)
WS-Federation (Web Services Federation) is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software,
CA Inc., IBM, Microsoft, Novell, Hewlett Packard Enterprise, and VeriSign. Part of the larger Web Services Security framework, WS-Federation defines
mechanisms for allowing different security realms to broker information on identities, identity attributes and authentication.
-
WS-Federation
, Source: Wikipedia
-
Web Services Federation Language (WS-Federation) Version 1.2
, 2009
, Source: Oasis
-
Understanding WS-Federation
, Marc Goodner,
, Maryann Hondo
, Anthony Nadalin
, Michael McIntosh
, Don Schmidt
, 2007
-
Wide Area Network
(WAN)
A wide area network (WAN) is a telecommunications network that extends over a large geographic area. Wide area networks are often established
with leased telecommunication circuits.
-
Wide area network
, Source: Wikipedia
-
Special-Use Domain Names
(RFC6761)
, S. Cheshire
, M. Krochmal
, 2013
, Source: Request For Comments
-
Address Allocation for Private Internets
(RFC1918)
, Y. Rekhter
, B. Moskowitz
, D. Karrenberg
, G. J. de Groot
, E. Lear
, 1996
, Source: Request For Comments
-
World Wide Web Consortium
(W3C)
The World Wide Web Consortium (W3C) develops standards and guidelines to help everyone build a web based on the principles of
accessibility, internationalization, privacy and security.
-
Web Site
, Source: World Wide Web Consortium
-
YAML Ain't Markup Language
(YAML)
YAML is a human-readable data serialization language. It is commonly used for configuration files and in applications where data are
being stored or transmitted. YAML targets many of the same communications applications as Extensible Markup Language (
XML)
but has a minimal syntax that intentionally differs from Standard Generalized Markup Language (
SGML)
-
Yellowdog Updater Modified
(YUM)
The Yellowdog Updater Modified (YUM) is a free and open-source command-line package-management utility for computers running the
Linux operating system using the
RPM Package Manager.