- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Tue, 3 Apr 2007 17:48:13 -0400
- To: "Chuck Wade <Chuck" <Chuck@Interisle.net>
- Cc: public-wsc-wg@w3.org
- Message-ID: <OF520DA21F.EE8E11B3-ON852572B2.007716F4-852572B2.0077C69C@LocalDomain>
Really nice. What is "flash" as an object on a computer that can authenticate? Some of these I didn't realize were deployed methods of (primary) authentication (tagging, risk analysis). Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect Chuck Wade <Chuck@Interisle.net> Sent by: public-wsc-wg-request@w3.org 03/27/2007 09:38 PM To public-wsc-wg@w3.org cc Subject ACTION-149: FSTC's list of authentication techniques (BMA taxonomy) Folks, I just wanted to confirm to everyone on this list that I did post the file from FSTC that provides a pretty comprehensive listing of authentication techniques that are in use today--the "BMA Taxonomy." In doing so, I also set up a "Document Repository" page on the WSC Wiki that others may find useful as a place to share documents (when public links are not available). Under this Document Repository is a section for FSTC Contributed Documents at this link: <http://www.w3.org/2006/WSC/wiki/DocsRepository/FSTC_Contributed_Documents > You'll find a sub-page with a brief description of the BMA Taxonomy, and an Excel workbook attached. The first section of the Taxonomy sheet in this workbook is a hierarchical listing of authentication techniques. ...Chuck -- _____________________________ Chuck Wade, Principal Interisle Consulting Group +1 508 435-3050 Office +1 508 277-6439 Mobile www.interisle.net
Received on Tuesday, 3 April 2007 21:48:20 UTC