Taxonomy Sources
Jump to navigation
Jump to search
Quick Links: Taxonomy | Taxonomy Project Management | Taxonomy AHG Catalog | Taxonomy AHG Glossary | Taxonomy Sources |
Taxonomy Sources
Document descriptions are often taken directly from their source documents.
Source | Description |
---|---|
File:DoD Dictionary of Military and Associated Terms.pdf | Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms: 8 November 2010 (As Amended Through 15 December 2013). Sets forth standard U.S. military and associated terminology to encompass the joint activity of the Armed Forces of the United States. |
File:DoD IC AASC Glossary.pdf | Authorization & Attributes Glossary (Version 18) Snapshot of the Department of Defense & Intelligence Community Authorization and Attribute Services Committee 'living' glossary document as of 29 January 2010. |
File:Global Glossary Grid List of Authorities 20100610.docx | Global Glossary Grid |
File:MITRE IdAM Ecosystem Functional View.pdf | Identity and Access Management (IdAM) Ecosystem Functional View (MITRE). Provides a view of an Identity and Access Management (IdAM) Ecosystem from the perspective of an organization that creates a digital identities; based on the work done by the Identity, Credential, and Access Management Subcommittee (ICAMSC) under the auspices of the Federal CIO Council. |
File:Identity Commons Identipedia.pdf | Identity Commons Identipedia |
File:Incommon Federation Participant Operational Practices.pdf | InCommon Federation Participant Operational Practices |
File:Kantara IAF-1100-Glossary.pdf | Kantara Initiative's Identity Assurance Framework Glossary |
NIST Special Publication 800-63-2: Electronic Authentication Guideline | The U.S. National Institute of Standards and Technology (NIST)'s technical guidelines for Federal agencies implementing electronic authentication |
File:CNSS IA Glossary.pdf | Committee on National Security Systems: CNSS Instruction No. 4009, 26 April 2010. National Information Assurance (IA) Glossary. Among a range of objectives, this document seeks to resolve differences between the definitions of terms used by the DOD (Department of Defense), IC (Intelligence Community), and Civil Agencies." |
File:NSS ICAM Lexicon v1 30MAY13.pdf | NSS ICAM Lexicon Report 2013 |
File:NSTAC IDTF Report 2009.pdf | NSTAC IDTF Report 2009 |
File:Nstc-identitymgmt-2008.pdf | Identity Management Task Force Report 2008. Report by the U.S. National Science and Technology Council
subcommittee on Biometrics and Identity Management. |
National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Authoritative document describing the Obama administration's strategy for establishing an trustworthy identity ecosystem. |
File:OASIS SAML Glossary 2.o.pdf | OASIS SAML Glossary 2.0 |
OASIS Identity in the Cloud Gap Analysis 1.0 | OASIS Identity in the Cloud Gap Analysis |
File:Smedinghoff Federated Identity Management Paper.pdf | Federated Identity Management:Balancing Privacy Rights, Liability Risks, and the Duty to Authenticate, by Smedinghoff |
File:T-REC-X 1252-201004-I!!PDF-E.pdf | ITU-T X.1252, Baseline identity management terms and definitions |
Security Taxonomy and Glossary - Anne & Lynn Wheeler | Wheeler Security Taxonomy and Glossary |
Wikipedia - Digital Identity | Wikipedia - Digital Identity |
The Vocabulary of Identity Systems Liability: What is Liability? When does it arise? | Explains the concept of a liability and to develop a common understanding of what it means for participants in an identity system to incur liability. |
Quick Links: Taxonomy | Taxonomy Project Management | Taxonomy AHG Catalog | Taxonomy AHG Glossary | Taxonomy Sources |