Back to Results
First PageMeta Content
Computer security / Cryptographic protocols / XKMS / Transport Layer Security / Security Assertion Markup Language / Network security / Network service / Authentication / Security service / Cryptography / Computer network security / Computing


NATIONAL ENVIRONMENTAL INFORMATION EXCHANGE NETWORK
Add to Reading List

Document Date: 2005-03-16 16:00:42


Open Document

File Size: 441,04 KB

Share Result on Facebook

IndustryTerm

internal networks / distributed network / Web methods / node / node server / network / Web service vulnerabilities / Web Service Security Model / Web Service Security Standards / distributed Web services network / Web server implementations / security services / control systems / Internet Control Messages Protocol / node services / physical infrastructure / Web service attacks / Web Service Security Elements / encryption technologies / Web Service Vulnerability / Web services / /

Movie

Man In the Middle / /

OperatingSystem

DoS / /

Organization

Term Definition/Clarification ITU-T International Telecommunications Union / OASIS Organization for the Advancement of Structured Information Standards OSI Open Systems Interconnect PKI Public Key Infrastructure RBAC Role-Based Access Control SAML Security Assertion Markup Language SSO SOAP Single Sign-on Simple Object Access Protocol1 SSL Secure Sockets Layer W3C World Wide Web Consortium WSE Web Service Enhancements XACML Extensible Access Control Markup Language WSTK Web Service Toolkit XKMS XML Key Management Services / Environmental Protection Agency / /

Position

Major / Private / network administrator / CKMS General / /

ProgrammingLanguage

SQL / XML / /

RadioStation

WSTK / /

Technology

Encryption / Service EPA Environmental Protection Agency Exchange Network ICMP Environmental Information Exchange Network Internet Control Messages Protocol / 11 6.1 XML Encryption / XML / Public Key Infrastructure / Digital Certificate / 3.3 Public Key Encryption / DNS / encryption technologies / firewall / PKI / 3.4 XML Encryption / 3.2 Shared Secret Encryption / Private Key / DoM / 3.1 Transport Encryption / Digital Signature / SSL / TCP/IP / Web server / Access Control List / 3.5 XML Encryption / /

SocialTag