Glossary extracted starting with manual seeds, with PTM for the domain phi and language EN

x.509Public keys can be formed in various data formats
pki cryptographic moduleThe software that is embedded in the customer's SWIFTNet Link
argumentA reason or reasons offered for or against something, the offering of such reasons
pkiPublic Key Infrastructure
pgpPretty Good Privacy
userRegistered member of a home organisation.
object classA named group of attributes
truth valuesThe status of any statment as true, or false.
possible duplicate emission trailerA trailer that the sender adds to a FIN message
to ti ên einai, or even the explanation itself, is to be found in a note (e.g., the difference between necessity de dicto
reciprocityThe act of entering empathically into the point of view or line of reasoning of others; learning to think as others do and by that means sympathetically assessing that thinking
external propositionObjective (outward, sense and data)
aestheic propositionBehavior (beauty, enjoy or pleasure)
directory information treeA hierarchical tree-like structure consisting of the DNs of the directory entries
iiopInternet Inter-ORB Protocol
o  Obverse-
referralSee knowledge reference.
logicThe branch of philosophy concerned with the rules of valid inference and reasoning.
availabilityThe percentage or amount of scheduled time that a computing system provides application service.
data integrityThe guarantee that the contents of the message received were not altered from the contents of the original message sent.
darwinismThe theory of how evolution might have come about which constitutes the major contribution to science made by Charles Darwin (1809-1882).
precisionThe quality of being accurate, definite, and exact
fairTreating both or all sides alike without reference to one's own feelings or interests; just implies adherence to a standard of rightness or lawfulness without reference to one's own inclinations; impartial and unbiased both imply freedom from prejudice for or against any side; dispassionate implies the absence of passion or strong emotion, hence, connotes cool, disinterested judgment; objective implies a viewing of persons or things without reference to oneself, one's interests, etc.
wanwide area network
modulesModules extend the basic functionality of the Web server and support integration between Oracle HTTP Server and other Oracle Database components.
key encapsulationa technique by which a session key is "wrapped" (i.e
certificatecertificate revocation list (CRL).
certificate authorityA trusted body that issues and signs certificate requests on behalf of organisations.
hot standbyA second running computing system that is ready to pick up application processing in the event that the primary computing system fails
discover serviceThe technical term/synonym for WAYF.
fipsFederal Information Processing Standards
paradoxa statement or sentiment that is seemingly contradictory or opposed to common sense, and yet is perhaps true in fact, or a statement that is actually self-contradictory (and therefore false) even though it appears true.
proxyAn interface within SWIFTNet Link that gives access to selected TCP/IP protocols, while maintaining the security of SWIFTNet.
logic(Greek=logos)that which holds eveything together.The motor of reason
pinpersonal identification number
token cardA device for providing improved ease-of-use for users through several different mechanisms
payment in advanceThe payment method by which the buyer pays the seller before the shipment of the goods
heliocentricBaker, Astronomy writes "The heliocentric view, dating formally from the time of Copernicus, establishes the solar system on an approximately correct basis." That is, the Sun is the center of the solar system, around which the Earth and other planets revolve.
connect descriptorA specially formatted description of the destination for a network connection
law of non-contradictionthe basic law of logic which states that it is not possible for something to be and not be at the same time.
directory information treeA hierarchical tree-like structure consisting of the DNs of the entries.
cryptographyThe art of protecting information by transforming it (encrypting) into an unreadable format
distinguished nameThe unique name of a directory entry
diffie-hellman key negotiation algorithmThis is a method that lets two parties communicating over an insecure channel to agree upon a random number known only to them
certificate authorityCA Certificate.
shaSecure Hash Algorithm
ldapLightweight Directory Access Protocol
logicCorrect reasoning or the study of correct reasoning and its foundations.
intellectual sense of justiceWillingness and consciousness of the need to entertain all viewpoints sympathetically and to assess them with the same intellectual standards, without reference to one’s own feelings or vested interests, or the feelings or vested interests of one's friends, community, or nation; implies adherence to intellectual standards without reference to one’s own advantage or the advantage of one's group.
oracle netAn Oracle product that enables two or more computers that run an Oracle database server or Oracle tools, such as Designer/2000 to exchange data through a third-party network
assertionThe identity information provided by an Identity Provider to a Service Provider.
cleartextSee plaintext.
identityThe combination of the public key and any other public information for an entity
dibSee directory information base (DIB).
policy management authorityThe body that determines certification parameters and controls the quality of certification practices
symmetric-key cryptographyEncryption method that uses the same key to encrypt and decrypt data using a mathematical formula.
implicitInvisiable, inauditable it is implied or unstated.
universala property of an object, which can exist in more than one place at the same time (e.g
public-key infrastructuretrust usually refers to the relationship between the user of a certificate and the certificate authority (CA) that issued the certificate
psychologyThe scientific study of human behavior.
oracle call interfaceAn application programming interface (API) that allows you to create applications that use the native procedures or function calls of a third-generation language to access an Oracle database server and control all phases of SQL statement execution.
mythThe term is used in the study of religion and culture
name standardizationdata source
evaluationTo judge or determine the worth or quality of.  Evaluation has a logic and should be carefully distinguished from mere subjective preference
monological thinkingThinking that is conducted exclusively within one point of view or frame of reference: figuring out how much this $67.49 pair of shoes with a 25% discount will cost me; learning what signing this contract obliges me to do; finding out when Kennedy was elected President
culture shockThe trauma and anxiety, the disorientation, caused by movement from one's familiar cultural surroundings to an alien one
authorizationPermission given to a user, program, or process to access an object or set of objects.
de dictoand de re
inductive reasoningreasoning that proceeds from particular information to derive general principles (arriving at a reliable generalization from observations).
ditSee directory information tree (DIT).
unicodeA type of universal character set, a collection of 64K characters encoded in a 16-bit space
subschemasubentryA specific type of subentry containing schema information.
failoverThe ability to reconfigure a computing system to utilize an alternate active component when a similar component fails.
theorema statement which has been proven to be true by a rigorous argument.
proxy serverA proxy server typically sits on a network firewall and enables clients behind the firewall to access Web resources
smartcardA plastic card (like a credit card) with an embedded integrated circuit for storing information, including such information as user names and passwords
freehoughtthe general philosophical viewpoint that holds that beliefs should be formed on the basis of science and logic, and should not be influenced by emotion, authority, tradition, or dogma.
certificateIt is typically used to encrypt data sent to the public key's owner, who then decrypts the data with the corresponding private key.
theoremA proposition that can be deduced from the premises of a system.
public key infrastructurea structure of hardware, software, people, processes and policies that employs digital signature technology to facilitate a verifiable association between the public component of an asymmetric public key and a specific end entity
dnSee distinguished name (DN).
virtual home organisationThe Virtual Home Organisation is an identity provider for users who are not in a participating home organisation.
wepWired Equivalent Privacy
ciphertextData that has been encrypted
host certificateprivate key.
identitywhatever makes an entity definable and recognizable, in terms of possessing a set of qualities or characteristics that distinguish it from entities of a different type (essentially, whatever makes something the same or different).
mystical experience argumentOne of the arguments for the existence of God based on the subjective experience of Deity.
intuitionThe direct knowing or learning of something without the conscious use of reasoning
scientific methodthe collection of data through observation and experimentation, and the formulation and testing of hypotheses.
triple desTriple Data Encryption Standard
system operational attributeAn attribute holding information that pertains to the operation of the directory itself
rational selfOur character and nature to the extent that we seek to base our beliefs and actions on good reasoning and evidence
patienceThe greatest virture of logic.
greekThe primary language used in the Roman Empire during the time of Jesus Christ, it was used by the authors of the New Testament
context prefixThe DN of the root of a directory naming context.
partnerSee SWIFT partner.
failoverThe process of failure recognition and recovery.
multilogical thinkingThinking that sympathetically enters, considers, and reasons within multiple points of view
subordinate referenceA knowledge reference pointing downward in the DIT to a naming context that starts immediately below an entry.
drgSee directory replication group (DRG).
xmlweb service, SOAP.
secure shellSSH is a well-known protocol and has widely available implementations that provide a secure connection tunneling solution, very similar to what port tunneling offers
public key cryptographya form of cryptography that utilizes a cryptographic algorithm which uses two related keys: a public key and a private key
intellectual empathyUnderstanding the need to imaginatively put oneself in the place of others to genuinely understand them
partial copy serviceA mode in which the SWIFTNet copying service only copies certain pre-defined fields of a message.
gravityOne of the four fundamental forces of nature, it is the force that cause objects to move or tend to move toward the center of the earth, moon, or any planet
certificate authorityA trusted third party that certifies that other entities--users, databases, administrators, clients, servers--are who they say they are
evidenceThe data on which a judgment or conclusion might be based or by which proof or probability might be established
sslSee Secure Sockets Layer.
service providerAny organisation or institution that is registered by the Federation and provides end user access to services and resources based on a set of Attributes that satisfy their particular authorisation requirements.
federation rulesThe document updated from time to time which defines the Rules for AAF subscribers.
analytical propositiondefinition (dictionary) A is A.
shaSee Secure Hash Algorithm (SHA).
digital signaturea cryptographic transformation of data which, when associated with a data unit (such as an electronic file), provides the services of origin authentication, data integrity, and signer non-repudiation.
inductionOne of two major types of argument traditionally distingushed, the other being deduction
standard-form categorical propositionsThe four categorical propositions, named A(universal affirmative), E(universal negative), I(particular affirmative), O(particular negative)
impatienceThe greatest vice, mistake or hinderence of logic.
configuration console databaseattribute
rational emotions/passionsR
executive committeeThe governance committee of AAF Inc made up of representatives of relevant stakeholders, in accordance with the AAF Constitution.
acpSee Access Control Policy Point.
checksummingA mechanism that computes a value for a message packet, based on the data it contains, and passes it along with the data to authenticate that the data has not been tampered with
nationalismA motivating force which unites people with a common bond to protect against threats to that bond.
pkcs #12A public-key encryption standard (PKCS)
relative distinguished nameThe local, most granular level entry name
hermeneuticsthe study of theories of the interpretation and understanding of texts (often the Bible).
oid monitorThe Oracle Internet Directory component that initiates, monitors, and terminates the Oracle directory server processes
premium plus supportSWIFT has designed Premium Plus for high-volume and highly resilient infrastuctures that require high availability and reliability
premise-     propositionPure hypothetical syllogism-
social contractthat idea people give up some rights to a government and/or other authority in forming nations in order to jointly preserve or maintain social order and security.
enthymemesAn argument that is stated incompletely, the unstated part of it being taken for granted
relative distinguished nameThe leftmost component in a directory entry's distinguished name (DN)
apacheApache is a public domain HTTP server derived from the National Center for Supercomputing Applications (NCSA).
tcpTransmission Control Protocol
a prioriwhere knowledge is possible independently of, or prior to, any experience, and requires only the use of reason (non-empirical).
secure hash algorithmAn algorithm that assures data integrity by generating a 160-bit cryptographic message digest value from given data
solar systemThe sun and its attendant planets, their moons, asteroids, dust, and comets, bound to the sun by gravitation.
session keyA key shared by at least two parties (usually a client and a server).
radical empiricismA theory which holds that all things and the relations between them are matters of direct experience
elements of thoughtAll thought has a universal set of elements, each of which can be monitored for possible problems: Are we clear about our purpose or goal? about the problem or question at issue? about our point of view or frame of reference? about our assumptions? about the claims we are making? about the reasons or evidence upon which we are basing our claims? about our inferences and line of reasoning? about the implications and consequences that follow from our reasoning? Critical thinkers develop skills of identifying and assessing these elements in their thinking and in the thinking of others.
serverfor example with a name and password or with a client SSL certificate and some digitally signed data
key pairA public key and its associated private key.
minor termThe term that occurs as the subject term of the conclusion in a standard-form syllogism.
concurrent operationsThe number of operations that are being executed on the directory from all of the concurrent clients
throughputThe overall rate at which directory operations are being completed by Oracle Internet Directory
guest userOne who is not an anonymous user, and, at the same time, does not have a specific user entry.
authenticationThe process of verifying the identity of a user, device, or other entity in a computer system, often as a prerequisite to granting access to resources in a system
qualiaproperties of sensory experiences, or the nebulous concept of "the way things seem to us".
resolution rulecharacteristic
particulara concrete individual object which cannot be copied without introducing new distinct particulars.
  formal fallacy  'Horseshoe'l-       Hypothetical syllogism-      I-
opinionA belief; typically one open to dispute
bindingThe process of authenticating to a directory.
2 types of logicFormal argument-structure and symbolic
ticketA piece of information that helps identify who the owner is
identityThe set of information associated with a specific physical person or other entity
httpThe set of rules for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web
mass storage modeMass storage mode enables users to transfer files between a media card and their computer when they connect their BlackBerry device to their computer.
ledlight-emitting diode
umf segmentUMF input document
dataDigital objects including Attributes, Metadata and Logging information.
net service nameA simple name for a service that resolves to a connect descriptor
idiomAn expression whose meaning cannot be derived from its constituent elements
knowledge referenceThe access information (name and address) for a remote DSA and the name of the DIT subtree that the remote DSA holds
message digestRepresentation of text as a string of single digits
good practiceGood practice as generally accepted within the IT industry and determined by the Executive Committee from time to time in the context of the AAF’s required standard covering practices for identity management, authentication and authorisation of users of on-line resources and services.
rolerule
domains of thoughtThinking can be oriented or structured with different issues or purposes in view
quantum theoryA major branch of modern physics arguing for the emission of light (radiant energy) in discrete amounts or "quanta"
one-way hash functionA one-way function that takes a variable sized input and creates a fixed size output.
core attributesA set of Attributes selected by the Federation that all Identity Providers are required to support.
x.509A popular format from ISO used to sign public keys.
augustine(354-430) One of the Latin Church Fathers, generally recognized as the greatest thinker of Christian antiquity
external referencedegrees of separation
server ssl certificateSee also authentication, client authentication, Secure Sockets Layer (SSL).
critical personOne who has mastered a range of intellectual skills and abilities
gpsGlobal Positioning System
essencethe attributes that make an object or substance what it fundamentally is, and that it has necessarily.
existencethe state or fact of existing or being (the continuance in being or life).
entity databaseconfiguration utility
intentionMotivation or purpose (why).
hylomorphismthe theory which conceptually identifies substance as matter and form, such that substances are conceived as forms inhering in matter.
occam's razorWilliam of Occam was a fourteenth century philosopher who enunciated the principle "pluritas non est ponenda sine necessitate", or "nature likes things as simple as possible." In other words, in developing a theory, the simpler the explanation of a given phenomena that takes into account all the experimental evidence, the more likely it is to be correct
utcThe standard time common to every place in the world
dual key pairsdigital signature.
intellectual integrityRecognition of the need to be true to one’s own thinking, to be consistent in the intellectual standards one applies, to hold oneself to the same rigorous standards of evidence and proof to which one holds one's antagonists, to practice what one advocates for others, and to honestly admit discrepancies and inconsistencies in one's own thought and action
administrative areaA subtree on a directory server whose entries are under the control (schema, ACL, and collective attributes) of a single administrative authority.
validA deductive argument whose premises, if they were all true, would provide conclusive grounds for the truth of its conclusion, it is said to be valid.
subtypeAn attribute with one or more options, in contrast to that same attribute without the options
agencythe capacity for humans to make choices and to impose those choices on the world.
message authentication codeAlso known as data authentication code (DAC)
serverA provider of a service.
fault toleranceThe ability of a computing system to withstand faults and errors while continuing to provide the required services.
session keyA key for symmetric-key cryptosystems that is used for the duration of one message or communication session
hermeneuticsThe art or skill or theory of interpretation: the method of coming to an understanding of a text.
subclassAn object class derived from another object class
authorisation serviceAny activity where a Service Provider grants access to End Users to services or resources made available by that Service Provider.
ttyteletype
causalitythe law that states that each cause has a specific effect, and that this effect is dependent on the initial identities of the agents involved.
identity providerAny organisation or institution that has been registered by the Federation and has a legal relationship with an End User to provide an authentication service for that End User.
consciousnessthe faculty which perceives and identifies things that exist, and the relationship between oneself and one's environment.
partner programmeSee SWIFT Partner Programme.
dsaDigital Signature Algorithm
formal languagean organized set of symbols which can be precisely defined in terms of just the shapes and locations of those symbols, without any reference to any meanings or interpretations.
ldapSee Lightweight Directory Access Protocol (LDAP)
certificateA digital representation of information which at least (1) identifies the certification authority issuing it, (2) names or identifies its Subscriber, (3) contains the Subscriber’s public key, (4) identifies its operational period and (5) is digitally signed by the certification authority issuing it.
provisioningA set of activities that ensure that SWIFT updates the SWIFT target systems according to customer requests.
public keyA public key is a key that people other than the certificate subject can use
attributeMetadata describing either the End User or services provided under the AAF framework
conditionsof adequate explanation as processes, however, seems to confuse what is described -- real things that can be understood as causes -- with the description: the four causes qua respects under which something is described can hardly be understood as physical processes
aggregator sourceWeb Services Resource Framework, resource properties.
asrSee Advanced Symmetric Replication (ASR).
aristotle the philosopher(1981).
public keyIn public-key cryptography this key is made public to all, it is primarily used for encryption but can be used for verifying signatures.
clientA client relies on a service
phenomenona thing as it appears to be, as constructed by the mind and perceived by the senses (c.f
critiqueAn objective judging, analysis, or evaluation of something
free willthe capacity of rational agents to choose a course of action from among various alternatives.
cipher suiteIn SSL, a set of authentication, encryption, and data integrity algorithms used for exchanging messages between network nodes
ditSee directory information tree.
attribute alertapplication monitor
eap-ttlsExtensible Authentication Protocol Tunneled Transport Layer Security
umf input documentsDQM
supertypeAn attribute without options, in contrast to the same attribute with one or more options
major termThe term that occurs as the predicate term of the conclusion in a standard-form syllogism.
aposterioriA statement that can be known to be true or false only on the basis of evidence obtained from experience and observation, as in an empirical statement, such as "I have a head" or "the moon has craters."
end userAny natural person who is a user of resources or services made available under the Australian Access Federation
premium supportSWIFT's first level of additional, optional support
decryptionThe process of converting the contents of an encrypted message (ciphertext) back into its original readable format (plaintext).
aestheticsIdeas about the beautiful and the ugly- what is significantly pleasing and is not pleasing.
certificateSee also public-key cryptography.
5 objectives of education1) To think clearly
emergencethe way complex systems and patterns arise (emerge) out of a multiplicity of relatively simple interactions.
replication agreementA special directory entry that represents the replication relationship among the directory servers in a directory replication group (DRG).
certificate authenticationVerification of the identity of a person or process
attributeAn item of information that describes some aspect of an entry
private keymaster key.
plaintextintelligible data.
authentication serviceAny activity where an Identity Provider performs the role of End User Authentication and, where relevant, releases the Attributes for its End Users.
cipher suiteA set of authentication, encryption, and data integrity algorithms used for exchanging messages between network nodes
interpretationThe explanation or elucidation of a creative work, a political event, or other activity.
relationship scorere-resolve
slapdStandalone LDAP daemon.
service ticketTrusted information used to authenticate the client
aretêof our rational soul the expression of which is the human good
umf documentUMF segment
smsShort Message Service
secure hash algorithmAn algorithm that takes a message of less than 264 bits in length and produces a 160-bit message digest
portable batch systemLSF.
keyA string of bits used widely in cryptography, allowing people to encrypt and decrypt data; a key can be used to perform other mathematical operations as well
marcionSecond century originator of the heretical idea that there were two Gods, a judgmental, harsh, tyrannical God of the Old Testament, and a loving Father as revealed by Jesus in the New Testament.
communityAn entity that contains all the necessary components for submission: a component that receives and routes submissions (the FDA ESG), and its external (e.g., a member of the regulated industry) and internal (e.g., FDA Center) Transaction Partners.
cryptographyThe art of protecting information by transforming it (encrypting) into an unreadable format (ciphertext)
service principalSee principal.
dsaSee directory system agent (DSA).
jndiResourceHome, XML.
ipse dixitLaws of thought-
oid control utilityA command-line tool for issuing run-server and stop-server commands
access management systemThe collection of systems and services associated with specific online resources or services that together decide whether to grant a given individual access to those resources or services.
hasha mathematical function which maps from a large (possibly very large) domain into a smaller range
service tableIn Kerberos authentication, a service table is a list of service principals that exist on a kinstance
net8An Oracle product that enables two or more computers that run the Oracle server or Oracle tools such as Designer/2000 to exchange data through a third-party network
herodotus(484?-425? BC) A Greek historian who was the author of The Histories.
contentMeaning or language
subaclsubentryA specific type of subentry that contains ACL information.
caSee certificate authority.
mission criticalSee fault tolerance.
metaphysicsThe study of reality, idealism,materialism and dualism.
aggregator frameworkIndex Service, Trigger Service.
mtpMedia Transfer Protocol
global unique identifierIn a multi-master replication environment, an entry replicated on multiple nodes has the same DN on each node
md5An improved version of MD4.
httpsThe use of Secure Sockets Layer (SSL) as a sublayer under the regular HTTP application layer.
akrasiain order to show how the rational and the non-rational facets of our soul may come into conflict
pemPrivacy-Enhanced Electronic Mail
md4A one-way hash function that produces a 128-bit hash, or message digest
certificate authoritysubordinate CA, root CA.
blackberry enabled deviceA BlackBerry enabled device is a device with BlackBerry® Connect™ software, a device with BlackBerry® Built-In™ software, or a device that is running the BlackBerry® Application Suite
vpnvirtual private network
initial ticketIn Kerberos authentication, an initial ticket or ticket granting ticket (TGT) identifies the user as having the right to ask for additional service tickets
predicatethat which is affirmed or denied concerning the subject of a proposition (i.e
fallacyA mistake in reasoning, a type of argument that may seem to be correct, but proves upon ezamination not to be so
blackberry mdsBlackBerry® Mobile Data System
service nameFor Kerberos-based authentication, the kservice portion of a service principal.
diffie-hellman key negotiation algorithmDiffie-Hellman key negotiation algorithm is a method that lets two parties communicating over an insecure channel to agree upon a random number known only to them
teleological argumentargument by design.
public/private key pairA mathematically related set of two numbers where one is called the private key and the other is called the public key
cmimeCompressed Multipurpose Internet Mail Extensions
localhostLocalhost is a special TCP/IP interface provided by the operating system which can only be used to communicate with processes that reside on the same machine
australian access federation incorporatedThe legal entity that governs the Federation, enters into agreements with AAF subscribers, determines subscription fees and compliance to the Federation Rules.
certificate integrityAssurance that the information has not been altered in any way and is precisely true to the source.
software security devicethat is always available while the browser is running
process theologyA modern theological movement based on the view of reality in which process, change and evolution are as fundamental as substance, permanence, and stability
deflationaryAscribing truth to a proposition amounts to no more than asserting the proposition
aramaicA northwest Semitic language spoken throughout the Ancient Near East and used for parts of Daniel and Ezra.
didactic instructionTeaching by telling
philosophyThe study of the truths and principles of being, knowledge, or conduct.
encryptionThe process of disguising a message in order to hide its substance.
pl/sqlPL/SQL is Oracle's proprietary extension to the SQL language
default knowledge referenceA knowledge reference that is returned when the base object is not in the directory, and the operation is performed in a naming context not held locally by the server
as2Applicability Statement 2
resourceweb service.
axiologyThe study of values
dseDSA specific entries
critical societyA society which rewards adherence to the values of critical thinking and hence does not use indoctrination and inculcation as basic modes of learning (rewards reflective questioning, intellectual independence, and reasoned dissent)
eccElliptic Curve Cryptography
partner identifier codeA code that identifies a SWIFT registered vendor
mdsSee master definition site (MDS).
normativeindicative of how things should or ought to be (as opposed to positive or descriptive).
mmsMultimedia Messaging Service
encryptionto change plaintext into ciphertext
sansubject alternative name
dadSee database access descriptor.
system global areaA group of shared memory structures that contain data and control information for one Oracle database instance
desThe U.S
rsaA public-key encryption technology developed by RSA Data Security
encryptionThe process of disguising a message thereby rendering it unreadable to any but the intended recipient
oid database password utilityThe utility used to change the password with which Oracle Internet Directory connects to an Oracle database.
proofEvidence or reasoning so strong or certain as to demonstrate the truth or acceptability of a conclusion beyond a reasonable doubt
supplierIn replication, the server that holds the master copy of the naming context
sslSecure Sockets Layer
explicitVisable and audible it is stated.
session keyan encryption key which may be used for only a single session and then destroyed; some-times called a "transaction key." For connection-oriented protocols (such as those in real-time communications), a session key is generally used only for the length that the connection is open (unless the connection time is long enough to warrant more than one session key)
httpHypertext Transfer Protocol
message digestSee checksumming.
ca certificateCA Signing Policy, Certificate Authority, Grid Security Infrastructure.
antepraedicamenta. This clear overview of possible ways to react to Kant's famous accusation that there is no justification for the specific set of Aristotle's categories is one of many lucid sketches of important interpretative debates that Shields gives, often without himself taking sides, a task which he leaves, rightly, to the reader.
infer/inferenceAn inference is a step of the mind, an intellectual act by which one concludes that something is so in light of something else's being so, or seeming to be so
big bang hypothesisA theory of the origin of the universe, widely accepted, which states that between 10 and 20 billion years ago a very dense primeval aggregate of matter (a singularity) exploded into the expanding universe which evolved over the years into the galaxies, which are still receding from each other.
eap-simExtensible Authentication Protocol Subscriber Identity Module
possible duplicate message trailerA trailer that the FIN system adds to a FIN message
a posterioriwhere knowledge is possible only subsequent, or posterior, to certain sense experiences, in addition to the use of reason (empirical).
resolution scoreresolution rule
access control policy pointAn entry that contains security directives that apply downward to all entries at lower positions in the directory information tree (DIT).
dnSee distinguished name.
certificate chainAn ordered list of certificates containing an end-user or subscriber certificate and its certificate authority certificates.
dsmlDirectory Service Markup Language
public-key cryptographyCryptography based on methods involving a public key and a private key.
oracle directory managerA Java-based tool with a graphical user interface for administering Oracle Internet Directory.
attribute alert generatorpipeline
data quality managementDQM rule
secure sockets layerSecure Sockets Layer (SSL) is a standard for the secure transmission of documents over the Internet using HTTPS (secure HTTP)
4 kinds of sentences-grammatical1)Declarative(emotively neutral)2)Imperative
alexander the great(356 - 323 BC) The king of Macedonia from 336 - 323 who went on to conquer all of Greece, the Persian Empire and Egypt
attribute releaseThe release of Attributes for transfer from an Identity Provider to a Service Provider
server instanceA discrete invocation of a directory server
hypothesisan unproved or unverified assumption that can be either used or accepted as probable in the light of established facts
shaSee Secure Hash Algorithm.
latencyThe time a client has to wait for a given directory operation to complete.
slaveSee consumer.
entityrelationship resolution
configuration consoleConfiguration Console
rdnSee relative distinguished name (RDN).
rhetorical questionIs a statement made in the form of a question that does not need a answer due to the fact that it is indeed a statement and not a question.
public-key encryptionThe process in which the sender of a message encrypts the message with the public key of the recipient
  undistributed middleUniversal affirmative-
subschema dnThe list of DIT areas having independent schema definitions.
ipInternet Protocol
ldifSee LDAP Data Interchange Format (LDIF)
clientwhich is usually running on a different computer
soula human being
metadataStructured facts that describe information, or information services as defined by the Federation from time to time.
certificate authorityAn organization that issues digital certificates containing the applicant's public key and other identification information.
politics-- the fourth chapter focuses on the last mentioned framework, on the Categories
private keyThe key of an asymmetric key pair that the owner keeps secret
memberA research or education organisation or institution that is registered by the Federation as a Member.
client authenticationSecure Sockets Layer (SSL).
replicaEach copy of a naming context that is contained within a single server.
trusted certificateA third party identity that is qualified with a level of trust
  logical termsLogical equivalence-
proxy certificateGrid Security Infrastructure.
guidSee global unique identifier (GUID).
sgaSee System Global Area (SGA).
dnsDomain Name System
net8The foundation of the Oracle family of networking products, allowing services and their client applications to reside on different computers and communicate
web services description languageSOAP.
access control listThe group of access directives that you define
inheritWhen an object class has been derived from another class, it also derives, or inherits, many of the characteristics of that other class
simple authenticationThe process by which the client identifies itself to the server by means of a DN and a password which are not encrypted when sent over the network
authenticationclient authentication, Secure Sockets Layer (SSL).
ciphertextdata in its enciphered form.
oracle wallet managerA Java-based application that security administrators use to manage public-key security credentials on clients and servers.
keyA password or a table needed to decipher encoded data.
certificateuser certificate, host certificate, service certificate.
decryptionthe inverse function of encryption; to change ciphertext into plaintext.
serviceA network resource used by clients; for example, an Oracle database server.
identitydata source reference
partitionA unique, non-overlapping directory naming context that is stored on one directory server.
wmlWireless Markup Language
filterA method of qualifying data, usually data that you are seeking
concurrent clientsThe total number of clients that have established a session with Oracle Internet Directory.
application monitorCME Admin node
paraphrasingRe-writing the argument in clear language, suppling any missing or assumed information that is not explicitly stated, being careful to preserve the meaning of the original.Put into simple language.
aaaAuthentication, Authorisation and Accounting, a term used for describing a technical and legal environment for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
ssidservice set identifier
query aggregator sourcesubscription aggregator source, execution aggregator source.
anonymous authenticationThe process by which the directory authenticates a user without requiring a user name and password combination
key recoverya broad range of techniques permitting the recovery of plaintext from encrypted data when the decryption key is not in the posession of the decrypting party (e.g
x.509The public keys can be signed in various data formats
imsiInternational Mobile Subscriber Identity
smscShort Message Service Center
siblingAn entry that has the same parent as one or more other entries.
universeThe entire cosmos, made of everything that is
4 emotions that hinderFear, anger, guilt and shame.
opmnSee Oracle Process Manager and Notification Server.
  mMajor term-
apache axisWeb Services Deployment Descriptor.
revelationRefers to the process by which God tells people about himself, whether through nature or by specifically speaking to them.
one-way hash functionAn algorithm that turns a message into a single string of digits
bacon(1561-1626) Francis Bacon was an English philosopher and essayist
necessitariansomeone who does not believe the doctrine of free will
anthropomorphismascribing human form or attributes to a being or thing that is not human.
tlsTransport Layer Security
ethicsIdeas about right and wrong behaviors.
contextThe *interior or syntax, the way the words are put together
local replica cataloglogical name.
portA port is a number that TCP uses to route transmitted data to and from a particular program.
physics. While most of the footnotes provide simple cross-references between chapters allowing the reader to jump easily within the book, they have to be read quite carefully. For sometimes a crucial part of an explanation, as, e.g., of Aristotle's to ti ên einai
mtsSee multi-threaded server (MTS).
proxy userA kind of user typically employed in an environment with a middle tier such as a firewall
3 major categoriesAxiology,Metaphysics and Epistemology.
subscriberAn identity provider or service provider that subscribes to the Federation.
de-militarized zoneA DMZ is a set of machines that are isolated from the internet by a firewall on one side, and from a company's intranet by a firewall on the other side
wtlsWireless Transport Layer Security
middle termIn a standard-form syllogism(which must contain exactly three terms) the term that appears in both premises, but does not appear in the conclusion.
user certificateprivate key.
matching ruleIn a search or compare operation, determines equality between the attribute value sought and the attribute value stored
desData Encryption Standard
time dilationThe resulting fluidity of time because of speed and/or gravitational conditions
integrityThe guarantee that the contents of the message received were not altered from the contents of the original message sent.
  e  Enthymeme-      Equivalence-      Equivocation-
sslSee Secure Socket Layer (SSL).
digital signatureA digital signature is created when a public key algorithm is used to sign the sender's message with the sender's private key
registry entriesEntries containing run-time information associated with invocations of Oracle Internet Directory servers, called server instances
p  Parameters-
configuration set entryA directory entry holding the configuration parameters for a specific instance of the directory server
specific administrative areaAdministrative areas control:
public keyIn public-key cryptography, this key is made public to all
handshakeA protocol two computers use to initiate a communication session.
oracle internet directoryA general purpose directory service that enables retrieval of information about dispersed users and network resources
aaiAuthentication and Authorisation Infrastructure.
materialismThe doctrine that material well-being and self-interest should govern a person's actions.
copernicus(1473-1543) Author of On the Revolutions of the Celestial Spheres, he is famous for proposing the truth that the Earth rotates on its axis and moves about the Sun.
eap-tlsExtensible Authentication Protocol Transport Layer Security
md5An algorithm that assures data integrity by generating a unique, 128-bit cryptographic message digest value from the contents of a file
certificate chainroot CA.
4 kinds of sentences-logical1)Assertion(emotively neutral) 2)Command 3)Question 4)Exclaims-shows emotion.
single sign-onEnables the user to gain access to multiple resources by authenticating only once.
end entity certificateGrid Security Infrastructure.
database access descriptorA database access descriptor (DAD) is a set of values that specify how an application connects to an Oracle database to fulfill an HTTP request
entryThe building block of a directory, it contains information about an object of interest to directory users.
local replica catalogReplica Location Service (RLS).
intellectual integrityRecognition of the need to be true to one's own thinking, to be consistent in the intellectual standards one applies, to hold oneself to the same rigorous standards of evidence and proof to which one holds one's antagonists, to practice what one advocates for others, and to honestly admit discrepancies and inconsistencies in one's own thought and action
directory information baseThe complete set of all information held in the directory
ldapSee Lightweight Directory Access Protocol (LDAP).
one-way functionA function that is easy to compute in one direction but quite difficult to reverse compute, that is, to compute in the opposite direction.
ontologythe study of conceptions of reality, existence and the nature of being.
cryptographyThe act of writing and deciphering secret code resulting in secure messages.
entity resolutionpipeline node
root dseSee Root Directory Specific Entry.
nonrepudiationtamper detection.
deductionOne of two major types of argument traditionally distinguished, the other being induction
instantiationthe representation of an idea in the form of an instance or example of it.
presuppositionThe logically necessary condition of some state of affairs which must be satisfied if the state of affairs is to obtain
superior referenceA knowledge reference pointing upward to a DSA that holds a naming context higher in the DIT than all the naming contexts held by the referencing DSA.
premiseone of the propositions in a deductive argument
smart knowledge referenceA knowledge reference that is returned when the knowledge reference entry is in the scope of the search
cdmaCode Division Multiple Access
dialogical thinkingThinking that involves a dialogue or extended exchange between different points of view or frames of reference
payments clearingThe provision of SWIFT messaging solutions for both high-value and low-value clearing and settlement systems worldwide
generic thresholdgeneric threshold
web services resource frameworkresource properties, Index Service.
index serviceTrigger Service.
social darwinismThe application of the concept of evolution to the historical development of human societies, placing special emphasis on the idea of "struggle for survival." Hitler picked up these ideas and incorporated them into Nazism.
aprioriA statement whose truth or falsity may be known prior to any appeal to experience
wpaWi-Fi Protected Access
kserviceAn arbitrary name of a Kerberos service object.
security devicesmart card.
pseudo logical terminalA logical entity within the FIN system that receives system messages from users and makes the appropriate responses
aclSee Access Control List (ACL).
superuserA special directory administrator who typically has full access to directory information.
public-key cryptographyEncryption method that uses two different random numbers (keys)
power-with-and-forInvitation ( encourage, inspire, lead or follow).
decryptionSometimes called a cipher.
moral argumentOne of the arguments for the existence of God, which points out that ethics are without absolutes apart from God.
hypertext transfer protocolHypertext Transfer Protocol (HTTP) is the underlying format used by the Web to format and transmit messages and determine what actions Web servers and browsers should take in response to various commands
unix cryptThe UNIX encryption algorithm.
identityattribute alert
superclassThe object class from which another object class is derived
simSubscriber Identity Module
private keyIn public-key cryptography, this key is the secret key
secret key cryptographya form of cryptography which uses the same key to encrypt and decrypt
https protocolSecure Hypertext Transfer Protocol
propositionthe content or meaning of an assertion or declarative sentence, which is capable of being either true or false.
liberalismDeveloped in the eighteenth and nineteenth centuries as a doctrine which emphasized the development of the individual free from the restraints of government
thinkThe general word meaning to exercise the mental faculties so as to form ideas, arrive at conclusions, etc.  "Reason" implies a logical sequence of thought, starting with what is known or assumed and advancing to a definite conclusion through the inferences drawn
redundantDuplicate or extra computing components that protect a computing system.
kerberosA network authentication service developed under Massachusetts Institute of Technology's Project Athena that strengthens security in distributed environments
propertyan attribute or abstraction characterizing an object, but distinct from the object which possesses it.
the logic of questionsThe range of rational considerations that bear upon the settlement of a given question or group of questions
public-key encryptionThe process where the sender of a message encrypts the message with the public key of the recipient
knowledgeThe act of having a clear and justifiable grasp of what is so or of how to do something
aafAustralian Access Federation Inc.
privacy policyA statement to users of what information is collected and what will be done with the information after it has been collected.
categories. Given the systematicity claim in the background, some effort is put into a discussion of a possible grounding for Aristotle's categories -- presenting basic strands in the secondary literature that treat the categories either as underived but founded, e.g., in common sense, or else as derived, e.g. from the Antepraedicamenta
cgiCommon Gateway Interface (CGI) is the industry-standard technique for transferring information between a Web server and any program designed to accept and return data that conforms to the CGI specifications.
ucs2Fixed-width 16-bit Unicode
wapWireless Application Protocol
apiSee Application Program Interface.
desData Encryption Standard, a block cipher developed by IBM and the U.S
reasoned judgmentAny belief or conclusion reached on the basis of careful thought and reflection, distinguished from mere or unreasoned opinion on the one hand, and from sheer fact on the other
wallet resource locatorA wallet resource locator (WRL) provides all necessary information to locate a wallet
s/mimeSecure Multipurpose Internet Mail Extensions
historical-grammatical interpretationSometimes mistakenly called the "literal" approach
dual key pairssigning certificate.
reliabilityThe ability of a computing system to operate without failing
epistemologythe study of knowledge or truth.
akrasia, get discussed as possible replies to potential objections: friendship to point out that Aristotle's eudaimonic
secure socket layerAn industry standard protocol designed by Netscape Communications Corporation for securing network connections
weighing 67.5 kilosis "in itself indeterminate" and why it is "not shareable" as a quality like white is
identityentity database
mncmobile network code
schemaThe collection of attributes, object classes, and their corresponding matching rules.
apnaccess point name
sematicsThe meaning of a word.
trustpointSee trusted certificate.
advanced symmetric replicationA feature in Oracle8i that allows database tables to be kept synchronized across two Oracle databases.
eudaimonicethic
principalA Kerberos object, consisting of kservice/kinstance@REALM
jndi-config.xmlResourceHome.
the same time)
electromagnetismOne of the four fundamental forces in nature
geocentricSometimes called the Ptolemaic theory, it was commonly believed before Copernicus that the Earth was the center of the universe, and that the sun, moon, planets, and stars all revolved around the Earth.
tabula rasathe idea that individual human beings are born with no innate mental content, but their knowledge is built up gradually from their experiences and sensory perceptions of the outside world (literally, "blank slate").
network authentication serviceA means for authenticating clients to servers, servers to servers, and users to both clients and servers in distributed environments
scalabilityA measure of how well the software or hardware product is able to adapt to future business needs.
amphibolyA kind of ambiguity arising from the , akward, or mistaken way in which words are combined, leading to alternitive possible meanings of a statement
prime regional processorThe Regional Processor with which a FIN user is normally associated, and to which all normal logins are made
certificate authorityA certificate's validity can be verified by checking the CA's digital signature
umf documentUMF formatting utility
special revelationGod has told people about himself in the Bible, a specific and detailed revelation of himself, which gives us details regarding his person and what he expects of people
parallelismIn Hebrew (and other Ancient Near Eastern) poetry, the primary element which distinguishes poetry from prose is a rhyming of ideas rather than a rhyming of sounds or rhythm.
objecta thing, an entity or a being, that can have properties and bear relations to other objects
natural languagea language that is spoken, written, or signed by humans for general-purpose communication (ordinary language as opposed to formal or constructed languages).
universal message formatUMF message
theologythe study of the nature of God and religious truth, which seeks to justify or support religious claims.
httpSee Hypertext Transfer Protocol.
lightweight directory access protocolA standard, extensible directory access protocol
directory replication groupThe directory servers participating in a replication agreement.
directory naming contextSee naming context.
subentryA type of entry containing information applicable to a group of entries in a subtree
certificateAlso called a digital certificate
  mixed hypothetical syllogism  Modus ponens-      Modus tollens-     Mood of a syllogism-      Non sequitur-
social contradictionAn inconsistency between what a society preaches and what it practices
gsmGlobal System for Mobile Communications®
service certificateprivate key.
mccmobile country code
  conclusion  Consequent-
argueThere are two meanings of this word that need to be distinguished: 1) to argue in the sense of to fight or to emotionally disagree; and 2) to give reasons for or against a proposal or proposition
mathematicalabstraction but is simply the application, to any given motion, of the temporal units provided by the motions of the heavens
pragmatismThe focusing of issues and ideas on real-world applications
web servicesunresolve
multi-threaded serverA server that is configured to allow many user processes to share very few server processes, so the number of users that can be supported is increased
master siteIn replication, a master site is any site other than the Master Definition Site that participates in LDAP replication.
external iddata source code
constitutionThe document which describes the aims and objectives of the Federation, the requirements for governance of the Federation and the articles of association.
pipelineprimary matching
the logic of languageFor a language to exist and be learnable by persons from a variety of cultures, it is necessary that words have definite uses and defined concepts that transcend particular cultures
naming contextA subtree that resides entirely on one server
processing rulesThe rules or conventions that describe, in an unambiguous way, how to process data.
application program interfacePrograms to access the services of a specified application
client/server transferthird party transfers.
role alertconflict rules
moral propositionBehavior (evaluation of judgement, right, wrong,good or bad)
end entity certificatecertificate, Grid Security Infrastructure.
root directory specific entryAn entry storing operational information about the directory
resourceweb service, Web Services Description Language.
apache axisclient-config.wsdd, server-config.wsdd, XML.
sshSee Secure Shell.
certificate authoritypublic key, CA Certificate, private key.
lexical prioriAn ordering sequence in which the first item in the ordering is the most important item in the sequence.
sponsor nodeIn replication, the node that is used to provide initial data to a new node.
federationThe Australian Access Federation, or AAF.
premium custom supportThe highest level of support that SWIFT provides
sdnA service dialing number (SDN) is a number that is preloaded on your SIM card by your wireless service provider that you can use to access information about your BlackBerry device service, such as the current call forwarding status.
adnAn abbreviated dialing number (ADN) is a short telephone number, such as 911 or 112, that is used to reach public services.
cccarbon copy
kdc/tgsKey Distribution Center/Ticket Granting Service
fdnFixed Dialing Number
internal propositionSubjective (inward, feelings)
realmA Kerberos object
epiphenomenalismA theory which holds that mental activity is the result of bodily changes, but do not change the body.
propositionsA statement; what is typically asserted using a declarative sentence, and hence always either true or false-although its truth or falsity may be unknown.
parallelismstriping.
hash functiona function which maps a bit string of arbitrary length to a fixed-length bit string and satisifies the following properties: (1) It is computationally infeasible to find any input that maps to any pre-specified output
power-over-and-againstIntimitade (threaten, maniuplate, control, shaming or condemnation).
confidentialityA function of cryptography
contingencythe status of facts that are not logically necessarily true or false (the possibility of something happening or not happening).
societya collection or grouping of individuals with some shared interactions and common interests.
relational databaseA database is a structured collection of data
ocspOnline Certificate Status Protocol
bccblind carbon copy
idealismReality is not mind-independent
attributescandidate list
authorizationPermission given to a user, program, or process to access an object or set of objects
wrlSee Wallet Resource Locator.
apologeticsThe intellectual defense of the Christian faith.
productionThe environment on which SWIFT makes available, to customers, the messaging functionality on the network
utilitarianismThe philosophy that actions which provide for the greatest number are morally correct.
corbaCommon Object Request Broker Architecture
encryptionThe process of disguising the contents of a message and rendering it unreadable (ciphertext) to anyone but the intended recipient.
serverwhich is usually running on a different computer
secure hash algorithmSecure Hash Algorithm assures data integrity by generating a 160-bit cryptographic message digest value from given data
wallet resource locatorA directory path that provides all the necessary information to locate a particular wallet.
certificate confidentialityAssurance that a message has been disclosed only to the parties authorized to share the information.
sociocentricityThe assumption that one's own social group is inherently and self-evidently superior to all others
insightThe ability to see and clearly and deeply understand the inner nature of things
peapProtected Extensible Authentication Protocol
strong forceThe attraction acting over extremely short distances between nucleons and thus enabling the atomic nucleus to resist the electrostatic mutual repulsion of its protons.
plaintextAlso called cleartext
secure shellSecure Shell (SSH) is a well known protocol and has widely available implementation that provide a secure connection tunneling solution
cold backupThe procedure to add a new DSA to an existing replicating system by using the database copy procedure.
directory system agentThe X.500 term for a directory server.
misrepresentationSee also phishing.
aggregator servicesresource properties.
certificate chainSee also subordinate CA.
rtspReal Time Streaming Protocol
infinite regressa causal relationship transmitted through an indefinite number of terms in a series, with no term that begins the causal chain (going back through a chain forever).
  translating statementsTruth-     Truth value-
spacetimeThe mathematical construct representing the arena of events
payloadThe part of an InterAct request or response that contains the business content of the request or response.
hebrewA northwest Semitic language used by the people of Israel, used by most of the writers of the Old Testament (except for part of Daniel and Ezra).
md5A hashing algorithm intended for use on 32-bit machines to create digital signatures
philo of alexandria(born circa 10 BC) He was a Greek-speaking Jewish philosopher and theologian whose attempt to synthesize revealed faith and philosophical reason foreshadowed later developments in Christian theology.
relationshipdetach
secure sockets layerA protocol developed by Netscape Corporation
aciSee Access Control Information Item (ACI).