Re: ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)

Thanks Chuck. 

Would you be able to post a very short summary of highlights there as 
well? Much like we have for items in our SharedBookmarks area:
http://www.w3.org/2006/WSC/wiki/SharedBookmarks

The idea is to give a very brief description of what parts matter most and 
why to WSC. If I'm remembering rightly, it might be 
"The taxonomy provides a comprehensive and categorized list of 
authentication techniques available for use today in web user agents."

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect




Chuck Wade <Chuck@Interisle.net> 
Sent by: public-wsc-wg-request@w3.org
03/27/2007 09:38 PM

To
public-wsc-wg@w3.org
cc

Subject
ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)






Folks,

I just wanted to confirm to everyone on this list that I did post the 
file from FSTC that provides a pretty comprehensive listing of 
authentication techniques that are in use today--the "BMA Taxonomy." In 
doing so, I also set up a "Document Repository" page on the WSC Wiki 
that others may find useful as a place to share documents (when public 
links are not available).

Under this Document Repository is a section for FSTC Contributed 
Documents at this link:

<http://www.w3.org/2006/WSC/wiki/DocsRepository/FSTC_Contributed_Documents
>

You'll find a sub-page with a brief description of the BMA Taxonomy, and 
an Excel workbook attached. The first section of the Taxonomy sheet in 
this workbook is a hierarchical listing of authentication techniques.

...Chuck
-- 
_____________________________
   Chuck Wade, Principal
   Interisle Consulting Group
   +1  508 435-3050  Office
   +1  508 277-6439  Mobile
   www.interisle.net

Received on Thursday, 29 March 2007 13:01:06 UTC