- From: Doyle, Bill <wdoyle@mitre.org>
- Date: Wed, 28 Mar 2007 10:21:18 -0400
- To: "Chuck Wade" <Chuck@Interisle.net>, <public-wsc-wg@w3.org>
Thx Tied to open the zip file and had trouble - can you verify it? Anyone else have trouble? B -----Original Message----- From: public-wsc-wg-request@w3.org [mailto:public-wsc-wg-request@w3.org] On Behalf Of Chuck Wade Sent: Tuesday, March 27, 2007 9:39 PM To: public-wsc-wg@w3.org Subject: ACTION-149: FSTC's list of authentication techniques (BMA taxonomy) Folks, I just wanted to confirm to everyone on this list that I did post the file from FSTC that provides a pretty comprehensive listing of authentication techniques that are in use today--the "BMA Taxonomy." In doing so, I also set up a "Document Repository" page on the WSC Wiki that others may find useful as a place to share documents (when public links are not available). Under this Document Repository is a section for FSTC Contributed Documents at this link: <http://www.w3.org/2006/WSC/wiki/DocsRepository/FSTC_Contributed_Docume nts> You'll find a sub-page with a brief description of the BMA Taxonomy, and an Excel workbook attached. The first section of the Taxonomy sheet in this workbook is a hierarchical listing of authentication techniques. ...Chuck -- _____________________________ Chuck Wade, Principal Interisle Consulting Group +1 508 435-3050 Office +1 508 277-6439 Mobile www.interisle.net
Received on Wednesday, 28 March 2007 14:21:34 UTC