Glossary extracted starting with manual seeds, with PTM for the domain phi and language EN
x.509 | Public keys can be formed in various data formats |
pki cryptographic module | The software that is embedded in the customer's SWIFTNet Link |
argument | A reason or reasons offered for or against something, the offering of such reasons |
pki | Public Key Infrastructure |
pgp | Pretty Good Privacy |
user | Registered member of a home organisation. |
object class | A named group of attributes |
truth values | The status of any statment as true, or false. |
possible duplicate emission trailer | A trailer that the sender adds to a FIN message |
to ti ên einai | , or even the explanation itself, is to be found in a note (e.g., the difference between necessity de dicto |
reciprocity | The act of entering empathically into the point of view or line of reasoning of others; learning to think as others do and by that means sympathetically assessing that thinking |
external proposition | Objective (outward, sense and data) |
aestheic proposition | Behavior (beauty, enjoy or pleasure) |
directory information tree | A hierarchical tree-like structure consisting of the DNs of the directory entries |
iiop | Internet Inter-ORB Protocol |
o | Obverse- |
referral | See knowledge reference. |
logic | The branch of philosophy concerned with the rules of valid inference and reasoning. |
availability | The percentage or amount of scheduled time that a computing system provides application service. |
data integrity | The guarantee that the contents of the message received were not altered from the contents of the original message sent. |
darwinism | The theory of how evolution might have come about which constitutes the major contribution to science made by Charles Darwin (1809-1882). |
precision | The quality of being accurate, definite, and exact |
fair | Treating both or all sides alike without reference to one's own feelings or interests; just implies adherence to a standard of rightness or lawfulness without reference to one's own inclinations; impartial and unbiased both imply freedom from prejudice for or against any side; dispassionate implies the absence of passion or strong emotion, hence, connotes cool, disinterested judgment; objective implies a viewing of persons or things without reference to oneself, one's interests, etc. |
wan | wide area network |
modules | Modules extend the basic functionality of the Web server and support integration between Oracle HTTP Server and other Oracle Database components. |
key encapsulation | a technique by which a session key is "wrapped" (i.e |
certificate | certificate revocation list (CRL). |
certificate authority | A trusted body that issues and signs certificate requests on behalf of organisations. |
hot standby | A second running computing system that is ready to pick up application processing in the event that the primary computing system fails |
discover service | The technical term/synonym for WAYF. |
fips | Federal Information Processing Standards |
paradox | a statement or sentiment that is seemingly contradictory or opposed to common sense, and yet is perhaps true in fact, or a statement that is actually self-contradictory (and therefore false) even though it appears true. |
proxy | An interface within SWIFTNet Link that gives access to selected TCP/IP protocols, while maintaining the security of SWIFTNet. |
logic | (Greek=logos)that which holds eveything together.The motor of reason |
pin | personal identification number |
token card | A device for providing improved ease-of-use for users through several different mechanisms |
payment in advance | The payment method by which the buyer pays the seller before the shipment of the goods |
heliocentric | Baker, Astronomy writes "The heliocentric view, dating formally from the time of Copernicus, establishes the solar system on an approximately correct basis." That is, the Sun is the center of the solar system, around which the Earth and other planets revolve. |
connect descriptor | A specially formatted description of the destination for a network connection |
law of non-contradiction | the basic law of logic which states that it is not possible for something to be and not be at the same time. |
directory information tree | A hierarchical tree-like structure consisting of the DNs of the entries. |
cryptography | The art of protecting information by transforming it (encrypting) into an unreadable format |
distinguished name | The unique name of a directory entry |
diffie-hellman key negotiation algorithm | This is a method that lets two parties communicating over an insecure channel to agree upon a random number known only to them |
certificate authority | CA Certificate. |
sha | Secure Hash Algorithm |
ldap | Lightweight Directory Access Protocol |
logic | Correct reasoning or the study of correct reasoning and its foundations. |
intellectual sense of justice | Willingness and consciousness of the need to entertain all viewpoints sympathetically and to assess them with the same intellectual standards, without reference to one’s own feelings or vested interests, or the feelings or vested interests of one's friends, community, or nation; implies adherence to intellectual standards without reference to one’s own advantage or the advantage of one's group. |
oracle net | An Oracle product that enables two or more computers that run an Oracle database server or Oracle tools, such as Designer/2000 to exchange data through a third-party network |
assertion | The identity information provided by an Identity Provider to a Service Provider. |
cleartext | See plaintext. |
identity | The combination of the public key and any other public information for an entity |
dib | See directory information base (DIB). |
policy management authority | The body that determines certification parameters and controls the quality of certification practices |
symmetric-key cryptography | Encryption method that uses the same key to encrypt and decrypt data using a mathematical formula. |
implicit | Invisiable, inauditable it is implied or unstated. |
universal | a property of an object, which can exist in more than one place at the same time (e.g |
public-key infrastructure | trust usually refers to the relationship between the user of a certificate and the certificate authority (CA) that issued the certificate |
psychology | The scientific study of human behavior. |
oracle call interface | An application programming interface (API) that allows you to create applications that use the native procedures or function calls of a third-generation language to access an Oracle database server and control all phases of SQL statement execution. |
myth | The term is used in the study of religion and culture |
name standardization | data source |
evaluation | To judge or determine the worth or quality of. Evaluation has a logic and should be carefully distinguished from mere subjective preference |
monological thinking | Thinking that is conducted exclusively within one point of view or frame of reference: figuring out how much this $67.49 pair of shoes with a 25% discount will cost me; learning what signing this contract obliges me to do; finding out when Kennedy was elected President |
culture shock | The trauma and anxiety, the disorientation, caused by movement from one's familiar cultural surroundings to an alien one |
authorization | Permission given to a user, program, or process to access an object or set of objects. |
de dicto | and de re |
inductive reasoning | reasoning that proceeds from particular information to derive general principles (arriving at a reliable generalization from observations). |
dit | See directory information tree (DIT). |
unicode | A type of universal character set, a collection of 64K characters encoded in a 16-bit space |
subschemasubentry | A specific type of subentry containing schema information. |
failover | The ability to reconfigure a computing system to utilize an alternate active component when a similar component fails. |
theorem | a statement which has been proven to be true by a rigorous argument. |
proxy server | A proxy server typically sits on a network firewall and enables clients behind the firewall to access Web resources |
smartcard | A plastic card (like a credit card) with an embedded integrated circuit for storing information, including such information as user names and passwords |
freehought | the general philosophical viewpoint that holds that beliefs should be formed on the basis of science and logic, and should not be influenced by emotion, authority, tradition, or dogma. |
certificate | It is typically used to encrypt data sent to the public key's owner, who then decrypts the data with the corresponding private key. |
theorem | A proposition that can be deduced from the premises of a system. |
public key infrastructure | a structure of hardware, software, people, processes and policies that employs digital signature technology to facilitate a verifiable association between the public component of an asymmetric public key and a specific end entity |
dn | See distinguished name (DN). |
virtual home organisation | The Virtual Home Organisation is an identity provider for users who are not in a participating home organisation. |
wep | Wired Equivalent Privacy |
ciphertext | Data that has been encrypted |
host certificate | private key. |
identity | whatever makes an entity definable and recognizable, in terms of possessing a set of qualities or characteristics that distinguish it from entities of a different type (essentially, whatever makes something the same or different). |
mystical experience argument | One of the arguments for the existence of God based on the subjective experience of Deity. |
intuition | The direct knowing or learning of something without the conscious use of reasoning |
scientific method | the collection of data through observation and experimentation, and the formulation and testing of hypotheses. |
triple des | Triple Data Encryption Standard |
system operational attribute | An attribute holding information that pertains to the operation of the directory itself |
rational self | Our character and nature to the extent that we seek to base our beliefs and actions on good reasoning and evidence |
patience | The greatest virture of logic. |
greek | The primary language used in the Roman Empire during the time of Jesus Christ, it was used by the authors of the New Testament |
context prefix | The DN of the root of a directory naming context. |
partner | See SWIFT partner. |
failover | The process of failure recognition and recovery. |
multilogical thinking | Thinking that sympathetically enters, considers, and reasons within multiple points of view |
subordinate reference | A knowledge reference pointing downward in the DIT to a naming context that starts immediately below an entry. |
drg | See directory replication group (DRG). |
xml | web service, SOAP. |
secure shell | SSH is a well-known protocol and has widely available implementations that provide a secure connection tunneling solution, very similar to what port tunneling offers |
public key cryptography | a form of cryptography that utilizes a cryptographic algorithm which uses two related keys: a public key and a private key |
intellectual empathy | Understanding the need to imaginatively put oneself in the place of others to genuinely understand them |
partial copy service | A mode in which the SWIFTNet copying service only copies certain pre-defined fields of a message. |
gravity | One of the four fundamental forces of nature, it is the force that cause objects to move or tend to move toward the center of the earth, moon, or any planet |
certificate authority | A trusted third party that certifies that other entities--users, databases, administrators, clients, servers--are who they say they are |
evidence | The data on which a judgment or conclusion might be based or by which proof or probability might be established |
ssl | See Secure Sockets Layer. |
service provider | Any organisation or institution that is registered by the Federation and provides end user access to services and resources based on a set of Attributes that satisfy their particular authorisation requirements. |
federation rules | The document updated from time to time which defines the Rules for AAF subscribers. |
analytical proposition | definition (dictionary) A is A. |
sha | See Secure Hash Algorithm (SHA). |
digital signature | a cryptographic transformation of data which, when associated with a data unit (such as an electronic file), provides the services of origin authentication, data integrity, and signer non-repudiation. |
induction | One of two major types of argument traditionally distingushed, the other being deduction |
standard-form categorical propositions | The four categorical propositions, named A(universal affirmative), E(universal negative), I(particular affirmative), O(particular negative) |
impatience | The greatest vice, mistake or hinderence of logic. |
configuration console database | attribute |
rational emotions/passions | R |
executive committee | The governance committee of AAF Inc made up of representatives of relevant stakeholders, in accordance with the AAF Constitution. |
acp | See Access Control Policy Point. |
checksumming | A mechanism that computes a value for a message packet, based on the data it contains, and passes it along with the data to authenticate that the data has not been tampered with |
nationalism | A motivating force which unites people with a common bond to protect against threats to that bond. |
pkcs #12 | A public-key encryption standard (PKCS) |
relative distinguished name | The local, most granular level entry name |
hermeneutics | the study of theories of the interpretation and understanding of texts (often the Bible). |
oid monitor | The Oracle Internet Directory component that initiates, monitors, and terminates the Oracle directory server processes |
premium plus support | SWIFT has designed Premium Plus for high-volume and highly resilient infrastuctures that require high availability and reliability |
premise- proposition | Pure hypothetical syllogism- |
social contract | that idea people give up some rights to a government and/or other authority in forming nations in order to jointly preserve or maintain social order and security. |
enthymemes | An argument that is stated incompletely, the unstated part of it being taken for granted |
relative distinguished name | The leftmost component in a directory entry's distinguished name (DN) |
apache | Apache is a public domain HTTP server derived from the National Center for Supercomputing Applications (NCSA). |
tcp | Transmission Control Protocol |
a priori | where knowledge is possible independently of, or prior to, any experience, and requires only the use of reason (non-empirical). |
secure hash algorithm | An algorithm that assures data integrity by generating a 160-bit cryptographic message digest value from given data |
solar system | The sun and its attendant planets, their moons, asteroids, dust, and comets, bound to the sun by gravitation. |
session key | A key shared by at least two parties (usually a client and a server). |
radical empiricism | A theory which holds that all things and the relations between them are matters of direct experience |
elements of thought | All thought has a universal set of elements, each of which can be monitored for possible problems: Are we clear about our purpose or goal? about the problem or question at issue? about our point of view or frame of reference? about our assumptions? about the claims we are making? about the reasons or evidence upon which we are basing our claims? about our inferences and line of reasoning? about the implications and consequences that follow from our reasoning? Critical thinkers develop skills of identifying and assessing these elements in their thinking and in the thinking of others. |
server | for example with a name and password or with a client SSL certificate and some digitally signed data |
key pair | A public key and its associated private key. |
minor term | The term that occurs as the subject term of the conclusion in a standard-form syllogism. |
concurrent operations | The number of operations that are being executed on the directory from all of the concurrent clients |
throughput | The overall rate at which directory operations are being completed by Oracle Internet Directory |
guest user | One who is not an anonymous user, and, at the same time, does not have a specific user entry. |
authentication | The process of verifying the identity of a user, device, or other entity in a computer system, often as a prerequisite to granting access to resources in a system |
qualia | properties of sensory experiences, or the nebulous concept of "the way things seem to us". |
resolution rule | characteristic |
particular | a concrete individual object which cannot be copied without introducing new distinct particulars. |
formal fallacy | 'Horseshoe'l- Hypothetical syllogism- I- |
opinion | A belief; typically one open to dispute |
binding | The process of authenticating to a directory. |
2 types of logic | Formal argument-structure and symbolic |
ticket | A piece of information that helps identify who the owner is |
identity | The set of information associated with a specific physical person or other entity |
http | The set of rules for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web |
mass storage mode | Mass storage mode enables users to transfer files between a media card and their computer when they connect their BlackBerry device to their computer. |
led | light-emitting diode |
umf segment | UMF input document |
data | Digital objects including Attributes, Metadata and Logging information. |
net service name | A simple name for a service that resolves to a connect descriptor |
idiom | An expression whose meaning cannot be derived from its constituent elements |
knowledge reference | The access information (name and address) for a remote DSA and the name of the DIT subtree that the remote DSA holds |
message digest | Representation of text as a string of single digits |
good practice | Good practice as generally accepted within the IT industry and determined by the Executive Committee from time to time in the context of the AAF’s required standard covering practices for identity management, authentication and authorisation of users of on-line resources and services. |
role | rule |
domains of thought | Thinking can be oriented or structured with different issues or purposes in view |
quantum theory | A major branch of modern physics arguing for the emission of light (radiant energy) in discrete amounts or "quanta" |
one-way hash function | A one-way function that takes a variable sized input and creates a fixed size output. |
core attributes | A set of Attributes selected by the Federation that all Identity Providers are required to support. |
x.509 | A popular format from ISO used to sign public keys. |
augustine | (354-430) One of the Latin Church Fathers, generally recognized as the greatest thinker of Christian antiquity |
external reference | degrees of separation |
server ssl certificate | See also authentication, client authentication, Secure Sockets Layer (SSL). |
critical person | One who has mastered a range of intellectual skills and abilities |
gps | Global Positioning System |
essence | the attributes that make an object or substance what it fundamentally is, and that it has necessarily. |
existence | the state or fact of existing or being (the continuance in being or life). |
entity database | configuration utility |
intention | Motivation or purpose (why). |
hylomorphism | the theory which conceptually identifies substance as matter and form, such that substances are conceived as forms inhering in matter. |
occam's razor | William of Occam was a fourteenth century philosopher who enunciated the principle "pluritas non est ponenda sine necessitate", or "nature likes things as simple as possible." In other words, in developing a theory, the simpler the explanation of a given phenomena that takes into account all the experimental evidence, the more likely it is to be correct |
utc | The standard time common to every place in the world |
dual key pairs | digital signature. |
intellectual integrity | Recognition of the need to be true to one’s own thinking, to be consistent in the intellectual standards one applies, to hold oneself to the same rigorous standards of evidence and proof to which one holds one's antagonists, to practice what one advocates for others, and to honestly admit discrepancies and inconsistencies in one's own thought and action |
administrative area | A subtree on a directory server whose entries are under the control (schema, ACL, and collective attributes) of a single administrative authority. |
valid | A deductive argument whose premises, if they were all true, would provide conclusive grounds for the truth of its conclusion, it is said to be valid. |
subtype | An attribute with one or more options, in contrast to that same attribute without the options |
agency | the capacity for humans to make choices and to impose those choices on the world. |
message authentication code | Also known as data authentication code (DAC) |
server | A provider of a service. |
fault tolerance | The ability of a computing system to withstand faults and errors while continuing to provide the required services. |
session key | A key for symmetric-key cryptosystems that is used for the duration of one message or communication session |
hermeneutics | The art or skill or theory of interpretation: the method of coming to an understanding of a text. |
subclass | An object class derived from another object class |
authorisation service | Any activity where a Service Provider grants access to End Users to services or resources made available by that Service Provider. |
tty | teletype |
causality | the law that states that each cause has a specific effect, and that this effect is dependent on the initial identities of the agents involved. |
identity provider | Any organisation or institution that has been registered by the Federation and has a legal relationship with an End User to provide an authentication service for that End User. |
consciousness | the faculty which perceives and identifies things that exist, and the relationship between oneself and one's environment. |
partner programme | See SWIFT Partner Programme. |
dsa | Digital Signature Algorithm |
formal language | an organized set of symbols which can be precisely defined in terms of just the shapes and locations of those symbols, without any reference to any meanings or interpretations. |
ldap | See Lightweight Directory Access Protocol (LDAP) |
certificate | A digital representation of information which at least (1) identifies the certification authority issuing it, (2) names or identifies its Subscriber, (3) contains the Subscriber’s public key, (4) identifies its operational period and (5) is digitally signed by the certification authority issuing it. |
provisioning | A set of activities that ensure that SWIFT updates the SWIFT target systems according to customer requests. |
public key | A public key is a key that people other than the certificate subject can use |
attribute | Metadata describing either the End User or services provided under the AAF framework |
conditions | of adequate explanation as processes, however, seems to confuse what is described -- real things that can be understood as causes -- with the description: the four causes qua respects under which something is described can hardly be understood as physical processes |
aggregator source | Web Services Resource Framework, resource properties. |
asr | See Advanced Symmetric Replication (ASR). |
aristotle the philosopher | (1981). |
public key | In public-key cryptography this key is made public to all, it is primarily used for encryption but can be used for verifying signatures. |
client | A client relies on a service |
phenomenon | a thing as it appears to be, as constructed by the mind and perceived by the senses (c.f |
critique | An objective judging, analysis, or evaluation of something |
free will | the capacity of rational agents to choose a course of action from among various alternatives. |
cipher suite | In SSL, a set of authentication, encryption, and data integrity algorithms used for exchanging messages between network nodes |
dit | See directory information tree. |
attribute alert | application monitor |
eap-ttls | Extensible Authentication Protocol Tunneled Transport Layer Security |
umf input documents | DQM |
supertype | An attribute without options, in contrast to the same attribute with one or more options |
major term | The term that occurs as the predicate term of the conclusion in a standard-form syllogism. |
aposteriori | A statement that can be known to be true or false only on the basis of evidence obtained from experience and observation, as in an empirical statement, such as "I have a head" or "the moon has craters." |
end user | Any natural person who is a user of resources or services made available under the Australian Access Federation |
premium support | SWIFT's first level of additional, optional support |
decryption | The process of converting the contents of an encrypted message (ciphertext) back into its original readable format (plaintext). |
aesthetics | Ideas about the beautiful and the ugly- what is significantly pleasing and is not pleasing. |
certificate | See also public-key cryptography. |
5 objectives of education | 1) To think clearly |
emergence | the way complex systems and patterns arise (emerge) out of a multiplicity of relatively simple interactions. |
replication agreement | A special directory entry that represents the replication relationship among the directory servers in a directory replication group (DRG). |
certificate authentication | Verification of the identity of a person or process |
attribute | An item of information that describes some aspect of an entry |
private key | master key. |
plaintext | intelligible data. |
authentication service | Any activity where an Identity Provider performs the role of End User Authentication and, where relevant, releases the Attributes for its End Users. |
cipher suite | A set of authentication, encryption, and data integrity algorithms used for exchanging messages between network nodes |
interpretation | The explanation or elucidation of a creative work, a political event, or other activity. |
relationship score | re-resolve |
slapd | Standalone LDAP daemon. |
service ticket | Trusted information used to authenticate the client |
aretê | of our rational soul the expression of which is the human good |
umf document | UMF segment |
sms | Short Message Service |
secure hash algorithm | An algorithm that takes a message of less than 264 bits in length and produces a 160-bit message digest |
portable batch system | LSF. |
key | A string of bits used widely in cryptography, allowing people to encrypt and decrypt data; a key can be used to perform other mathematical operations as well |
marcion | Second century originator of the heretical idea that there were two Gods, a judgmental, harsh, tyrannical God of the Old Testament, and a loving Father as revealed by Jesus in the New Testament. |
community | An entity that contains all the necessary components for submission: a component that receives and routes submissions (the FDA ESG), and its external (e.g., a member of the regulated industry) and internal (e.g., FDA Center) Transaction Partners. |
cryptography | The art of protecting information by transforming it (encrypting) into an unreadable format (ciphertext) |
service principal | See principal. |
dsa | See directory system agent (DSA). |
jndi | ResourceHome, XML. |
ipse dixit | Laws of thought- |
oid control utility | A command-line tool for issuing run-server and stop-server commands |
access management system | The collection of systems and services associated with specific online resources or services that together decide whether to grant a given individual access to those resources or services. |
hash | a mathematical function which maps from a large (possibly very large) domain into a smaller range |
service table | In Kerberos authentication, a service table is a list of service principals that exist on a kinstance |
net8 | An Oracle product that enables two or more computers that run the Oracle server or Oracle tools such as Designer/2000 to exchange data through a third-party network |
herodotus | (484?-425? BC) A Greek historian who was the author of The Histories. |
content | Meaning or language |
subaclsubentry | A specific type of subentry that contains ACL information. |
ca | See certificate authority. |
mission critical | See fault tolerance. |
metaphysics | The study of reality, idealism,materialism and dualism. |
aggregator framework | Index Service, Trigger Service. |
mtp | Media Transfer Protocol |
global unique identifier | In a multi-master replication environment, an entry replicated on multiple nodes has the same DN on each node |
md5 | An improved version of MD4. |
https | The use of Secure Sockets Layer (SSL) as a sublayer under the regular HTTP application layer. |
akrasia | in order to show how the rational and the non-rational facets of our soul may come into conflict |
pem | Privacy-Enhanced Electronic Mail |
md4 | A one-way hash function that produces a 128-bit hash, or message digest |
certificate authority | subordinate CA, root CA. |
blackberry enabled device | A BlackBerry enabled device is a device with BlackBerry® Connect™ software, a device with BlackBerry® Built-In™ software, or a device that is running the BlackBerry® Application Suite |
vpn | virtual private network |
initial ticket | In Kerberos authentication, an initial ticket or ticket granting ticket (TGT) identifies the user as having the right to ask for additional service tickets |
predicate | that which is affirmed or denied concerning the subject of a proposition (i.e |
fallacy | A mistake in reasoning, a type of argument that may seem to be correct, but proves upon ezamination not to be so |
blackberry mds | BlackBerry® Mobile Data System |
service name | For Kerberos-based authentication, the kservice portion of a service principal. |
diffie-hellman key negotiation algorithm | Diffie-Hellman key negotiation algorithm is a method that lets two parties communicating over an insecure channel to agree upon a random number known only to them |
teleological argument | argument by design. |
public/private key pair | A mathematically related set of two numbers where one is called the private key and the other is called the public key |
cmime | Compressed Multipurpose Internet Mail Extensions |
localhost | Localhost is a special TCP/IP interface provided by the operating system which can only be used to communicate with processes that reside on the same machine |
australian access federation incorporated | The legal entity that governs the Federation, enters into agreements with AAF subscribers, determines subscription fees and compliance to the Federation Rules. |
certificate integrity | Assurance that the information has not been altered in any way and is precisely true to the source. |
software security device | that is always available while the browser is running |
process theology | A modern theological movement based on the view of reality in which process, change and evolution are as fundamental as substance, permanence, and stability |
deflationary | Ascribing truth to a proposition amounts to no more than asserting the proposition |
aramaic | A northwest Semitic language spoken throughout the Ancient Near East and used for parts of Daniel and Ezra. |
didactic instruction | Teaching by telling |
philosophy | The study of the truths and principles of being, knowledge, or conduct. |
encryption | The process of disguising a message in order to hide its substance. |
pl/sql | PL/SQL is Oracle's proprietary extension to the SQL language |
default knowledge reference | A knowledge reference that is returned when the base object is not in the directory, and the operation is performed in a naming context not held locally by the server |
as2 | Applicability Statement 2 |
resource | web service. |
axiology | The study of values |
dse | DSA specific entries |
critical society | A society which rewards adherence to the values of critical thinking and hence does not use indoctrination and inculcation as basic modes of learning (rewards reflective questioning, intellectual independence, and reasoned dissent) |
ecc | Elliptic Curve Cryptography |
partner identifier code | A code that identifies a SWIFT registered vendor |
mds | See master definition site (MDS). |
normative | indicative of how things should or ought to be (as opposed to positive or descriptive). |
mms | Multimedia Messaging Service |
encryption | to change plaintext into ciphertext |
san | subject alternative name |
dad | See database access descriptor. |
system global area | A group of shared memory structures that contain data and control information for one Oracle database instance |
des | The U.S |
rsa | A public-key encryption technology developed by RSA Data Security |
encryption | The process of disguising a message thereby rendering it unreadable to any but the intended recipient |
oid database password utility | The utility used to change the password with which Oracle Internet Directory connects to an Oracle database. |
proof | Evidence or reasoning so strong or certain as to demonstrate the truth or acceptability of a conclusion beyond a reasonable doubt |
supplier | In replication, the server that holds the master copy of the naming context |
ssl | Secure Sockets Layer |
explicit | Visable and audible it is stated. |
session key | an encryption key which may be used for only a single session and then destroyed; some-times called a "transaction key." For connection-oriented protocols (such as those in real-time communications), a session key is generally used only for the length that the connection is open (unless the connection time is long enough to warrant more than one session key) |
http | Hypertext Transfer Protocol |
message digest | See checksumming. |
ca certificate | CA Signing Policy, Certificate Authority, Grid Security Infrastructure. |
antepraedicamenta | . This clear overview of possible ways to react to Kant's famous accusation that there is no justification for the specific set of Aristotle's categories is one of many lucid sketches of important interpretative debates that Shields gives, often without himself taking sides, a task which he leaves, rightly, to the reader. |
infer/inference | An inference is a step of the mind, an intellectual act by which one concludes that something is so in light of something else's being so, or seeming to be so |
big bang hypothesis | A theory of the origin of the universe, widely accepted, which states that between 10 and 20 billion years ago a very dense primeval aggregate of matter (a singularity) exploded into the expanding universe which evolved over the years into the galaxies, which are still receding from each other. |
eap-sim | Extensible Authentication Protocol Subscriber Identity Module |
possible duplicate message trailer | A trailer that the FIN system adds to a FIN message |
a posteriori | where knowledge is possible only subsequent, or posterior, to certain sense experiences, in addition to the use of reason (empirical). |
resolution score | resolution rule |
access control policy point | An entry that contains security directives that apply downward to all entries at lower positions in the directory information tree (DIT). |
dn | See distinguished name. |
certificate chain | An ordered list of certificates containing an end-user or subscriber certificate and its certificate authority certificates. |
dsml | Directory Service Markup Language |
public-key cryptography | Cryptography based on methods involving a public key and a private key. |
oracle directory manager | A Java-based tool with a graphical user interface for administering Oracle Internet Directory. |
attribute alert generator | pipeline |
data quality management | DQM rule |
secure sockets layer | Secure Sockets Layer (SSL) is a standard for the secure transmission of documents over the Internet using HTTPS (secure HTTP) |
4 kinds of sentences-grammatical | 1)Declarative(emotively neutral)2)Imperative |
alexander the great | (356 - 323 BC) The king of Macedonia from 336 - 323 who went on to conquer all of Greece, the Persian Empire and Egypt |
attribute release | The release of Attributes for transfer from an Identity Provider to a Service Provider |
server instance | A discrete invocation of a directory server |
hypothesis | an unproved or unverified assumption that can be either used or accepted as probable in the light of established facts |
sha | See Secure Hash Algorithm. |
latency | The time a client has to wait for a given directory operation to complete. |
slave | See consumer. |
entity | relationship resolution |
configuration console | Configuration Console |
rdn | See relative distinguished name (RDN). |
rhetorical question | Is a statement made in the form of a question that does not need a answer due to the fact that it is indeed a statement and not a question. |
public-key encryption | The process in which the sender of a message encrypts the message with the public key of the recipient |
undistributed middle | Universal affirmative- |
subschema dn | The list of DIT areas having independent schema definitions. |
ip | Internet Protocol |
ldif | See LDAP Data Interchange Format (LDIF) |
client | which is usually running on a different computer |
soul | a human being |
metadata | Structured facts that describe information, or information services as defined by the Federation from time to time. |
certificate authority | An organization that issues digital certificates containing the applicant's public key and other identification information. |
politics | -- the fourth chapter focuses on the last mentioned framework, on the Categories |
private key | The key of an asymmetric key pair that the owner keeps secret |
member | A research or education organisation or institution that is registered by the Federation as a Member. |
client authentication | Secure Sockets Layer (SSL). |
replica | Each copy of a naming context that is contained within a single server. |
trusted certificate | A third party identity that is qualified with a level of trust |
logical terms | Logical equivalence- |
proxy certificate | Grid Security Infrastructure. |
guid | See global unique identifier (GUID). |
sga | See System Global Area (SGA). |
dns | Domain Name System |
net8 | The foundation of the Oracle family of networking products, allowing services and their client applications to reside on different computers and communicate |
web services description language | SOAP. |
access control list | The group of access directives that you define |
inherit | When an object class has been derived from another class, it also derives, or inherits, many of the characteristics of that other class |
simple authentication | The process by which the client identifies itself to the server by means of a DN and a password which are not encrypted when sent over the network |
authentication | client authentication, Secure Sockets Layer (SSL). |
ciphertext | data in its enciphered form. |
oracle wallet manager | A Java-based application that security administrators use to manage public-key security credentials on clients and servers. |
key | A password or a table needed to decipher encoded data. |
certificate | user certificate, host certificate, service certificate. |
decryption | the inverse function of encryption; to change ciphertext into plaintext. |
service | A network resource used by clients; for example, an Oracle database server. |
identity | data source reference |
partition | A unique, non-overlapping directory naming context that is stored on one directory server. |
wml | Wireless Markup Language |
filter | A method of qualifying data, usually data that you are seeking |
concurrent clients | The total number of clients that have established a session with Oracle Internet Directory. |
application monitor | CME Admin node |
paraphrasing | Re-writing the argument in clear language, suppling any missing or assumed information that is not explicitly stated, being careful to preserve the meaning of the original.Put into simple language. |
aaa | Authentication, Authorisation and Accounting, a term used for describing a technical and legal environment for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. |
ssid | service set identifier |
query aggregator source | subscription aggregator source, execution aggregator source. |
anonymous authentication | The process by which the directory authenticates a user without requiring a user name and password combination |
key recovery | a broad range of techniques permitting the recovery of plaintext from encrypted data when the decryption key is not in the posession of the decrypting party (e.g |
x.509 | The public keys can be signed in various data formats |
imsi | International Mobile Subscriber Identity |
smsc | Short Message Service Center |
sibling | An entry that has the same parent as one or more other entries. |
universe | The entire cosmos, made of everything that is |
4 emotions that hinder | Fear, anger, guilt and shame. |
opmn | See Oracle Process Manager and Notification Server. |
m | Major term- |
apache axis | Web Services Deployment Descriptor. |
revelation | Refers to the process by which God tells people about himself, whether through nature or by specifically speaking to them. |
one-way hash function | An algorithm that turns a message into a single string of digits |
bacon | (1561-1626) Francis Bacon was an English philosopher and essayist |
necessitarian | someone who does not believe the doctrine of free will |
anthropomorphism | ascribing human form or attributes to a being or thing that is not human. |
tls | Transport Layer Security |
ethics | Ideas about right and wrong behaviors. |
context | The *interior or syntax, the way the words are put together |
local replica catalog | logical name. |
port | A port is a number that TCP uses to route transmitted data to and from a particular program. |
physics | . While most of the footnotes provide simple cross-references between chapters allowing the reader to jump easily within the book, they have to be read quite carefully. For sometimes a crucial part of an explanation, as, e.g., of Aristotle's to ti ên einai |
mts | See multi-threaded server (MTS). |
proxy user | A kind of user typically employed in an environment with a middle tier such as a firewall |
3 major categories | Axiology,Metaphysics and Epistemology. |
subscriber | An identity provider or service provider that subscribes to the Federation. |
de-militarized zone | A DMZ is a set of machines that are isolated from the internet by a firewall on one side, and from a company's intranet by a firewall on the other side |
wtls | Wireless Transport Layer Security |
middle term | In a standard-form syllogism(which must contain exactly three terms) the term that appears in both premises, but does not appear in the conclusion. |
user certificate | private key. |
matching rule | In a search or compare operation, determines equality between the attribute value sought and the attribute value stored |
des | Data Encryption Standard |
time dilation | The resulting fluidity of time because of speed and/or gravitational conditions |
integrity | The guarantee that the contents of the message received were not altered from the contents of the original message sent. |
e | Enthymeme- Equivalence- Equivocation- |
ssl | See Secure Socket Layer (SSL). |
digital signature | A digital signature is created when a public key algorithm is used to sign the sender's message with the sender's private key |
registry entries | Entries containing run-time information associated with invocations of Oracle Internet Directory servers, called server instances |
p | Parameters- |
configuration set entry | A directory entry holding the configuration parameters for a specific instance of the directory server |
specific administrative area | Administrative areas control: |
public key | In public-key cryptography, this key is made public to all |
handshake | A protocol two computers use to initiate a communication session. |
oracle internet directory | A general purpose directory service that enables retrieval of information about dispersed users and network resources |
aai | Authentication and Authorisation Infrastructure. |
materialism | The doctrine that material well-being and self-interest should govern a person's actions. |
copernicus | (1473-1543) Author of On the Revolutions of the Celestial Spheres, he is famous for proposing the truth that the Earth rotates on its axis and moves about the Sun. |
eap-tls | Extensible Authentication Protocol Transport Layer Security |
md5 | An algorithm that assures data integrity by generating a unique, 128-bit cryptographic message digest value from the contents of a file |
certificate chain | root CA. |
4 kinds of sentences-logical | 1)Assertion(emotively neutral) 2)Command 3)Question 4)Exclaims-shows emotion. |
single sign-on | Enables the user to gain access to multiple resources by authenticating only once. |
end entity certificate | Grid Security Infrastructure. |
database access descriptor | A database access descriptor (DAD) is a set of values that specify how an application connects to an Oracle database to fulfill an HTTP request |
entry | The building block of a directory, it contains information about an object of interest to directory users. |
local replica catalog | Replica Location Service (RLS). |
intellectual integrity | Recognition of the need to be true to one's own thinking, to be consistent in the intellectual standards one applies, to hold oneself to the same rigorous standards of evidence and proof to which one holds one's antagonists, to practice what one advocates for others, and to honestly admit discrepancies and inconsistencies in one's own thought and action |
directory information base | The complete set of all information held in the directory |
ldap | See Lightweight Directory Access Protocol (LDAP). |
one-way function | A function that is easy to compute in one direction but quite difficult to reverse compute, that is, to compute in the opposite direction. |
ontology | the study of conceptions of reality, existence and the nature of being. |
cryptography | The act of writing and deciphering secret code resulting in secure messages. |
entity resolution | pipeline node |
root dse | See Root Directory Specific Entry. |
nonrepudiation | tamper detection. |
deduction | One of two major types of argument traditionally distinguished, the other being induction |
instantiation | the representation of an idea in the form of an instance or example of it. |
presupposition | The logically necessary condition of some state of affairs which must be satisfied if the state of affairs is to obtain |
superior reference | A knowledge reference pointing upward to a DSA that holds a naming context higher in the DIT than all the naming contexts held by the referencing DSA. |
premise | one of the propositions in a deductive argument |
smart knowledge reference | A knowledge reference that is returned when the knowledge reference entry is in the scope of the search |
cdma | Code Division Multiple Access |
dialogical thinking | Thinking that involves a dialogue or extended exchange between different points of view or frames of reference |
payments clearing | The provision of SWIFT messaging solutions for both high-value and low-value clearing and settlement systems worldwide |
generic threshold | generic threshold |
web services resource framework | resource properties, Index Service. |
index service | Trigger Service. |
social darwinism | The application of the concept of evolution to the historical development of human societies, placing special emphasis on the idea of "struggle for survival." Hitler picked up these ideas and incorporated them into Nazism. |
apriori | A statement whose truth or falsity may be known prior to any appeal to experience |
wpa | Wi-Fi Protected Access |
kservice | An arbitrary name of a Kerberos service object. |
security device | smart card. |
pseudo logical terminal | A logical entity within the FIN system that receives system messages from users and makes the appropriate responses |
acl | See Access Control List (ACL). |
superuser | A special directory administrator who typically has full access to directory information. |
public-key cryptography | Encryption method that uses two different random numbers (keys) |
power-with-and-for | Invitation ( encourage, inspire, lead or follow). |
decryption | Sometimes called a cipher. |
moral argument | One of the arguments for the existence of God, which points out that ethics are without absolutes apart from God. |
hypertext transfer protocol | Hypertext Transfer Protocol (HTTP) is the underlying format used by the Web to format and transmit messages and determine what actions Web servers and browsers should take in response to various commands |
unix crypt | The UNIX encryption algorithm. |
identity | attribute alert |
superclass | The object class from which another object class is derived |
sim | Subscriber Identity Module |
private key | In public-key cryptography, this key is the secret key |
secret key cryptography | a form of cryptography which uses the same key to encrypt and decrypt |
https protocol | Secure Hypertext Transfer Protocol |
proposition | the content or meaning of an assertion or declarative sentence, which is capable of being either true or false. |
liberalism | Developed in the eighteenth and nineteenth centuries as a doctrine which emphasized the development of the individual free from the restraints of government |
think | The general word meaning to exercise the mental faculties so as to form ideas, arrive at conclusions, etc. "Reason" implies a logical sequence of thought, starting with what is known or assumed and advancing to a definite conclusion through the inferences drawn |
redundant | Duplicate or extra computing components that protect a computing system. |
kerberos | A network authentication service developed under Massachusetts Institute of Technology's Project Athena that strengthens security in distributed environments |
property | an attribute or abstraction characterizing an object, but distinct from the object which possesses it. |
the logic of questions | The range of rational considerations that bear upon the settlement of a given question or group of questions |
public-key encryption | The process where the sender of a message encrypts the message with the public key of the recipient |
knowledge | The act of having a clear and justifiable grasp of what is so or of how to do something |
aaf | Australian Access Federation Inc. |
privacy policy | A statement to users of what information is collected and what will be done with the information after it has been collected. |
categories | . Given the systematicity claim in the background, some effort is put into a discussion of a possible grounding for Aristotle's categories -- presenting basic strands in the secondary literature that treat the categories either as underived but founded, e.g., in common sense, or else as derived, e.g. from the Antepraedicamenta |
cgi | Common Gateway Interface (CGI) is the industry-standard technique for transferring information between a Web server and any program designed to accept and return data that conforms to the CGI specifications. |
ucs2 | Fixed-width 16-bit Unicode |
wap | Wireless Application Protocol |
api | See Application Program Interface. |
des | Data Encryption Standard, a block cipher developed by IBM and the U.S |
reasoned judgment | Any belief or conclusion reached on the basis of careful thought and reflection, distinguished from mere or unreasoned opinion on the one hand, and from sheer fact on the other |
wallet resource locator | A wallet resource locator (WRL) provides all necessary information to locate a wallet |
s/mime | Secure Multipurpose Internet Mail Extensions |
historical-grammatical interpretation | Sometimes mistakenly called the "literal" approach |
dual key pairs | signing certificate. |
reliability | The ability of a computing system to operate without failing |
epistemology | the study of knowledge or truth. |
akrasia | , get discussed as possible replies to potential objections: friendship to point out that Aristotle's eudaimonic |
secure socket layer | An industry standard protocol designed by Netscape Communications Corporation for securing network connections |
weighing 67.5 kilos | is "in itself indeterminate" and why it is "not shareable" as a quality like white is |
identity | entity database |
mnc | mobile network code |
schema | The collection of attributes, object classes, and their corresponding matching rules. |
apn | access point name |
sematics | The meaning of a word. |
trustpoint | See trusted certificate. |
advanced symmetric replication | A feature in Oracle8i that allows database tables to be kept synchronized across two Oracle databases. |
eudaimonic | ethic |
principal | A Kerberos object, consisting of kservice/kinstance@REALM |
jndi-config.xml | ResourceHome. |
the same time | ) |
electromagnetism | One of the four fundamental forces in nature |
geocentric | Sometimes called the Ptolemaic theory, it was commonly believed before Copernicus that the Earth was the center of the universe, and that the sun, moon, planets, and stars all revolved around the Earth. |
tabula rasa | the idea that individual human beings are born with no innate mental content, but their knowledge is built up gradually from their experiences and sensory perceptions of the outside world (literally, "blank slate"). |
network authentication service | A means for authenticating clients to servers, servers to servers, and users to both clients and servers in distributed environments |
scalability | A measure of how well the software or hardware product is able to adapt to future business needs. |
amphiboly | A kind of ambiguity arising from the , akward, or mistaken way in which words are combined, leading to alternitive possible meanings of a statement |
prime regional processor | The Regional Processor with which a FIN user is normally associated, and to which all normal logins are made |
certificate authority | A certificate's validity can be verified by checking the CA's digital signature |
umf document | UMF formatting utility |
special revelation | God has told people about himself in the Bible, a specific and detailed revelation of himself, which gives us details regarding his person and what he expects of people |
parallelism | In Hebrew (and other Ancient Near Eastern) poetry, the primary element which distinguishes poetry from prose is a rhyming of ideas rather than a rhyming of sounds or rhythm. |
object | a thing, an entity or a being, that can have properties and bear relations to other objects |
natural language | a language that is spoken, written, or signed by humans for general-purpose communication (ordinary language as opposed to formal or constructed languages). |
universal message format | UMF message |
theology | the study of the nature of God and religious truth, which seeks to justify or support religious claims. |
http | See Hypertext Transfer Protocol. |
lightweight directory access protocol | A standard, extensible directory access protocol |
directory replication group | The directory servers participating in a replication agreement. |
directory naming context | See naming context. |
subentry | A type of entry containing information applicable to a group of entries in a subtree |
certificate | Also called a digital certificate |
mixed hypothetical syllogism | Modus ponens- Modus tollens- Mood of a syllogism- Non sequitur- |
social contradiction | An inconsistency between what a society preaches and what it practices |
gsm | Global System for Mobile Communications® |
service certificate | private key. |
mcc | mobile country code |
conclusion | Consequent- |
argue | There are two meanings of this word that need to be distinguished: 1) to argue in the sense of to fight or to emotionally disagree; and 2) to give reasons for or against a proposal or proposition |
mathematical | abstraction but is simply the application, to any given motion, of the temporal units provided by the motions of the heavens |
pragmatism | The focusing of issues and ideas on real-world applications |
web services | unresolve |
multi-threaded server | A server that is configured to allow many user processes to share very few server processes, so the number of users that can be supported is increased |
master site | In replication, a master site is any site other than the Master Definition Site that participates in LDAP replication. |
external id | data source code |
constitution | The document which describes the aims and objectives of the Federation, the requirements for governance of the Federation and the articles of association. |
pipeline | primary matching |
the logic of language | For a language to exist and be learnable by persons from a variety of cultures, it is necessary that words have definite uses and defined concepts that transcend particular cultures |
naming context | A subtree that resides entirely on one server |
processing rules | The rules or conventions that describe, in an unambiguous way, how to process data. |
application program interface | Programs to access the services of a specified application |
client/server transfer | third party transfers. |
role alert | conflict rules |
moral proposition | Behavior (evaluation of judgement, right, wrong,good or bad) |
end entity certificate | certificate, Grid Security Infrastructure. |
root directory specific entry | An entry storing operational information about the directory |
resource | web service, Web Services Description Language. |
apache axis | client-config.wsdd, server-config.wsdd, XML. |
ssh | See Secure Shell. |
certificate authority | public key, CA Certificate, private key. |
lexical priori | An ordering sequence in which the first item in the ordering is the most important item in the sequence. |
sponsor node | In replication, the node that is used to provide initial data to a new node. |
federation | The Australian Access Federation, or AAF. |
premium custom support | The highest level of support that SWIFT provides |
sdn | A service dialing number (SDN) is a number that is preloaded on your SIM card by your wireless service provider that you can use to access information about your BlackBerry device service, such as the current call forwarding status. |
adn | An abbreviated dialing number (ADN) is a short telephone number, such as 911 or 112, that is used to reach public services. |
cc | carbon copy |
kdc/tgs | Key Distribution Center/Ticket Granting Service |
fdn | Fixed Dialing Number |
internal proposition | Subjective (inward, feelings) |
realm | A Kerberos object |
epiphenomenalism | A theory which holds that mental activity is the result of bodily changes, but do not change the body. |
propositions | A statement; what is typically asserted using a declarative sentence, and hence always either true or false-although its truth or falsity may be unknown. |
parallelism | striping. |
hash function | a function which maps a bit string of arbitrary length to a fixed-length bit string and satisifies the following properties: (1) It is computationally infeasible to find any input that maps to any pre-specified output |
power-over-and-against | Intimitade (threaten, maniuplate, control, shaming or condemnation). |
confidentiality | A function of cryptography |
contingency | the status of facts that are not logically necessarily true or false (the possibility of something happening or not happening). |
society | a collection or grouping of individuals with some shared interactions and common interests. |
relational database | A database is a structured collection of data |
ocsp | Online Certificate Status Protocol |
bcc | blind carbon copy |
idealism | Reality is not mind-independent |
attributes | candidate list |
authorization | Permission given to a user, program, or process to access an object or set of objects |
wrl | See Wallet Resource Locator. |
apologetics | The intellectual defense of the Christian faith. |
production | The environment on which SWIFT makes available, to customers, the messaging functionality on the network |
utilitarianism | The philosophy that actions which provide for the greatest number are morally correct. |
corba | Common Object Request Broker Architecture |
encryption | The process of disguising the contents of a message and rendering it unreadable (ciphertext) to anyone but the intended recipient. |
server | which is usually running on a different computer |
secure hash algorithm | Secure Hash Algorithm assures data integrity by generating a 160-bit cryptographic message digest value from given data |
wallet resource locator | A directory path that provides all the necessary information to locate a particular wallet. |
certificate confidentiality | Assurance that a message has been disclosed only to the parties authorized to share the information. |
sociocentricity | The assumption that one's own social group is inherently and self-evidently superior to all others |
insight | The ability to see and clearly and deeply understand the inner nature of things |
peap | Protected Extensible Authentication Protocol |
strong force | The attraction acting over extremely short distances between nucleons and thus enabling the atomic nucleus to resist the electrostatic mutual repulsion of its protons. |
plaintext | Also called cleartext |
secure shell | Secure Shell (SSH) is a well known protocol and has widely available implementation that provide a secure connection tunneling solution |
cold backup | The procedure to add a new DSA to an existing replicating system by using the database copy procedure. |
directory system agent | The X.500 term for a directory server. |
misrepresentation | See also phishing. |
aggregator services | resource properties. |
certificate chain | See also subordinate CA. |
rtsp | Real Time Streaming Protocol |
infinite regress | a causal relationship transmitted through an indefinite number of terms in a series, with no term that begins the causal chain (going back through a chain forever). |
translating statements | Truth- Truth value- |
spacetime | The mathematical construct representing the arena of events |
payload | The part of an InterAct request or response that contains the business content of the request or response. |
hebrew | A northwest Semitic language used by the people of Israel, used by most of the writers of the Old Testament (except for part of Daniel and Ezra). |
md5 | A hashing algorithm intended for use on 32-bit machines to create digital signatures |
philo of alexandria | (born circa 10 BC) He was a Greek-speaking Jewish philosopher and theologian whose attempt to synthesize revealed faith and philosophical reason foreshadowed later developments in Christian theology. |
relationship | detach |
secure sockets layer | A protocol developed by Netscape Corporation |
aci | See Access Control Information Item (ACI). |