- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Thu, 29 Mar 2007 09:00:45 -0400
- To: "Chuck Wade <Chuck" <Chuck@Interisle.net>
- Cc: public-wsc-wg@w3.org
- Message-ID: <OF3C29F6E5.7E904A3B-ON852572AD.00473800-852572AD.00477B3F@LocalDomain>
Thanks Chuck.
Would you be able to post a very short summary of highlights there as
well? Much like we have for items in our SharedBookmarks area:
http://www.w3.org/2006/WSC/wiki/SharedBookmarks
The idea is to give a very brief description of what parts matter most and
why to WSC. If I'm remembering rightly, it might be
"The taxonomy provides a comprehensive and categorized list of
authentication techniques available for use today in web user agents."
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Chuck Wade <Chuck@Interisle.net>
Sent by: public-wsc-wg-request@w3.org
03/27/2007 09:38 PM
To
public-wsc-wg@w3.org
cc
Subject
ACTION-149: FSTC's list of authentication techniques (BMA taxonomy)
Folks,
I just wanted to confirm to everyone on this list that I did post the
file from FSTC that provides a pretty comprehensive listing of
authentication techniques that are in use today--the "BMA Taxonomy." In
doing so, I also set up a "Document Repository" page on the WSC Wiki
that others may find useful as a place to share documents (when public
links are not available).
Under this Document Repository is a section for FSTC Contributed
Documents at this link:
<http://www.w3.org/2006/WSC/wiki/DocsRepository/FSTC_Contributed_Documents
>
You'll find a sub-page with a brief description of the BMA Taxonomy, and
an Excel workbook attached. The first section of the Taxonomy sheet in
this workbook is a hierarchical listing of authentication techniques.
...Chuck
--
_____________________________
Chuck Wade, Principal
Interisle Consulting Group
+1 508 435-3050 Office
+1 508 277-6439 Mobile
www.interisle.net
Received on Thursday, 29 March 2007 13:01:06 UTC