AA |
attribute authority | |
AAI |
authentication and authorization infrastructure | |
ACL |
access control list | |
ACM |
Association for Computing Machinery | |
ACT |
anticlogging token | |
AES |
Advanced Encryption Standard | |
AFS |
Andrew file system | |
AFT |
authenticated firewall traversal | |
AH |
authentication header | |
ANSI |
American National Standards Institute | |
API |
application programming interface | |
ARPA |
Advanced Research Projects Agency | |
AS |
authentication server | |
ASN.1 |
abstract syntax notation 1 | |
ATM |
asynchronous transfer mode automatic teller machine | |
BAN |
Burrows, Abadi, and Needham | |
BBN |
Bolt Beranek and Newman, Inc. | |
BCP |
best current practice | |
BER |
basic encoding rules | |
BIND |
Berkeley Internet name daemon | |
BXA |
Bureau of Export Administration | |
CA |
certification authority | |
CAT |
common authentication technology | |
CBC |
cipher block chaining | |
CC |
common criteria | |
CCI |
common client interface | |
CCITT |
Consultative Committee on International Telegraphy and Telephony (now ITU-T) | |
CCP |
Compression Control Protocol | |
CCTA |
Central Computer and Telecommunications Agency | |
CD |
compact disc committee draft | |
CDP |
Certificate Discovery Protocol | |
CEC |
Commission of the European Communities | |
CERT |
computer emergency response team | |
CERT/CC |
CERT coordination center | |
CFB |
cipher feedback | |
CHAP |
Challenge Handshake Authentication Protocol | |
CLI |
command line interface | |
CLNP |
Connectionless Network Protocol | |
CLUSIF |
club de la securite informatique francais | |
CMIP |
Common Management Information Protocol | |
CMS |
cryptographic message syntax | |
COAST |
computer operations, audit, and security technology | |
CORBA |
common object request broker architecture | |
COTS |
commercial off-the-shelf | |
CRAMM |
CCTA risk analysis and management methodology | |
CRC |
cyclic redundancy checksum | |
CRHF |
collision resistant hash function | |
CRL |
certificate revocation list | |
CRMF |
certificate request message format | |
CRS |
certificate revocation system | |
CRT |
certificate revocation tree | |
CSI |
Computer Security Institute | |
CSRG |
Computer Systems Research Group | |
CV |
control value | |
DAC |
discretionary access control | |
DAP |
Directory Access Protocol | |
DARPA |
Defense Advanced Research Projects Agency | |
DCA |
Defense Communications Agency | |
DCE |
Distributed Computing Environment | |
DCMS |
distributed certificate management system | |
DDoS |
distributed denial of service | |
DEC |
Digital Equipment Corporation | |
DER |
distinguished encoding rules | |
DES |
Data Encryption Standard | |
DFA |
differential fault analysis | |
DIS |
draft international standard | |
DISA |
Defense Information Systems Agency | |
DIT |
directory information tree | |
DMZ |
demilitarized zone | |
DN |
distinguished name | |
DNS |
domain name system | |
DoC |
U.S. Department of Commerce | |
DoD |
U.S. Department of Defense | |
DOI |
domain of interpretation | |
DoS |
U.S. Department of State denial of service | |
DOS |
disk operating system | |
DPA |
differential power analysis | |
DSA |
digital signature algorithm | |
DSS |
Digital Signature Standard | |
DVC |
data validation certificate | |
DVCS |
data validation and certification server | |
E-cash |
electronic cash | |
ECB |
electronic code book | |
E-commerce |
electronic commerce | |
ECP |
Encryption Control Protocol | |
EDI |
electronic data interchange | |
EFS |
encrypting file system | |
EFT |
electronic funds transfer | |
EGP |
Exterior Gateway Protocol | |
EIT |
Enterprise Integration Technologies | |
|
electronic mail | |
ESM |
encrypted session manager | |
ESP |
encapsulating security payload | |
EU |
European Union | |
FAQ |
frequently asked question | |
FDDI |
fiber distributed data interface | |
FIPS |
Federal Information Processing Standard | |
FIRST |
Forum of Incident Response and Security Teams | |
FNC |
Federal Networking Council | |
FQDN |
fully qualified domain name | |
FSUIT |
Swiss Federal Strategy Unit for Information Technology | |
FTP |
File Transfer Protocol | |
FWPD |
Firewall Product Developers Consortium | |
FWTK |
firewall toolkit | |
GII |
global information infrastructure | |
GIK |
group interchange key | |
GPS |
global positioning system | |
GSS-API |
generic security service API | |
GUI |
graphical user interface | |
HP |
Hewlett-Packard | |
HTML |
Hypertext Markup Language | |
HTTP |
Hypertext Transfer Protocol | |
IAB |
Internet Architecture Board | |
IAM |
Institute for Computer Science and Applied Mathematics | |
IANA |
Internet Assigned Numbers Authority | |
IBM |
International Business Machines Corporation | |
ICANN |
Internet Corporation for Assigned Names and Numbers | |
ICMP |
Internet Control Message Protocol | |
ICSA |
International Computer Security Association | |
ICSI |
International Computer Science Institute | |
IDEA |
international data encryption algorithm | |
IDS |
intrusion detection system | |
IDWG |
intrusion detection exchange format | |
IEC |
International Electrotechnical Committee | |
IEEE |
Institute of Electrical and Electronic Engineers | |
IESG |
Internet Engineering Steering Group | |
IETF |
Internet Engineering Task Force | |
IFIP |
International Federation for Information Processing | |
IGP |
Interior Gateway Protocol | |
IIOP |
Internet Inter-ORB Protocol | |
IKE |
Internet Key exchange | |
IKMP |
Internet Key Management Protocol | |
IMAP |
Internet Message Access Protocol | |
IP |
Internet Protocol | |
IPC |
interprocess communications facility | |
IPng |
IP next generation | |
IPPCP |
IP Payload Compression Protocol | |
IPRA |
Internet Policy Registration Authority | |
IPsec |
IP security | |
IPSP |
IP security policy | |
IPSRA |
IP security remote access | |
IPST |
IP Secure Tunnel Protocol | |
IRSG |
Internet Research Steering Group | |
IRTF |
Internet Research Task Force | |
IS |
international standard | |
ISDN |
integrated switched digital network | |
ISO |
International Organization for Standardization | |
ISOC |
Internet Society | |
IT |
information technology | |
ITSEC |
information technology security evaluation criteria | |
ITU-T |
International Telecommunication Union – Telecommunication Standardization Sector | |
IV |
initialization vector | |
JTC1 |
Joint Technical Committee 1 | |
Kbps |
kilobit per second | |
KDC |
key distribution center | |
KDS |
key distribution server | |
KEA |
key exchange algorithm | |
KEK |
key encryption key | |
KTC |
key translation center | |
LAN |
local area network | |
LDAP |
Lightweight Directory Access Protocol | |
LLC |
logical link control | |
MAC |
message authentication code | |
MAN |
metropolitan area network | |
MARION |
methodologie d'analyse des risques informatiques et d'optimation par niveau | |
MBone |
multicast backbone | |
MD |
message digest | |
MDC |
modification detection code | |
MHS |
message handling system | |
MIB |
management information base | |
MIC |
message integrity check | |
MIME |
multipurpose Internet mail extensions | |
MIT |
Massachusetts Institute of Technology | |
MKMP |
Modular Key Management Protocol | |
MLS |
multilevel security | |
MOSS |
MIME object security services | |
MPLS |
multi-protocol label switching | |
MSP |
Message Security Protocol | |
MTA |
message transfer agent | |
MTS |
message transfer system | |
NAS |
network access server | |
NASA |
National Aeronautics and Space Agency | |
NBS |
National Bureau of Standards | |
NCP |
Network Control Protocol | |
NCSA |
National Computer Security Association | |
NetSP |
Network Security Program | |
NII |
national information infrastructure | |
NIST |
National Institute of Standards and Technology | |
NLSP |
Network Layer Security Protocol | |
NMS |
network management station | |
NNTP |
Network News Transfer Protocol | |
NRL |
U.S. Naval Research Laboratory | |
NSA |
National Security Agency | |
NSF |
National Science Foundation | |
NSP |
Network Security Policy | |
NTP |
Network Time Protocol | |
OCSP |
Online Certificate Status Protocol | |
OFB |
output feedback | |
OPIE |
one-time passwords in everything | |
OPSEC |
open platform for security | |
ORB |
Object Request Broker | |
OSF |
Open Software Foundation | |
OSI |
open systems interconnection | |
OSI-RM |
OSI reference model | |
OWHF |
one-way hash function | |
PAC |
proxy auto-configuration | |
PAP |
Password Authentication Protocol | |
PARC |
Palo Alto Research Center | |
PC |
personal computer | |
PCA |
policy certification authority | |
PCT |
private communication technology | |
PDA |
personal digital assistant | |
PEM |
privacy enhanced mail | |
PEP |
Protocol Extension Protocol | |
PET |
privacy enhancing technology | |
PFS |
perfect forward secrecy | |
PGP |
Pretty Good Privacy | |
PIN |
personal identification number | |
PKCS |
public key cryptography standard | |
PKI |
public key infrastructure | |
PKIX |
Public Key Infrastructure X.509 | |
PKP |
Public Key Partners | |
PMI |
privilege management infrastructure | |
POP |
Post Office Protocol | |
PPP |
Point-to-Point Protocol | |
PSRG |
Privacy and Security Research Group | |
PSTN |
public-switched telephone network | |
QoS |
quality of service | |
RA |
registration authority | |
RACF |
resource access control facility | |
RADIUS |
remote authentication dial-in user service | |
RFC |
request for comment | |
RIP |
Routing Information Protocol | |
ROM |
read-only memory | |
RPC |
remote procedure call | |
RR |
resource record | |
RSA |
Rivest, Shamir, and Adleman | |
RSVP |
Resource Reservation Protocol | |
SA |
security association | |
SAID |
secure association identifier | |
SALS |
simple authentication and security layer | |
SDNS |
secure data network system | |
SDSI |
simple distributed security infrastructure | |
SECSH |
Secure Shell | |
SESAME |
secure European system for applications in a multi-vendor environment | |
SET |
secure electronic transaction | |
SHA |
secure hash algorithm | |
SHS |
secure hash standard | |
S-HTTP |
secure HTTP | |
SID |
security identifier | |
SILS |
standards for interoperable LAN/MAN security | |
SKIP |
simple key-management for Internet protocols | |
SLIP |
serial line IP | |
S/MIME |
Secure MIME | |
SMS |
service management system | |
SMTP |
Simple Mail Transfer Protocol | |
SNMP |
Simple Network Management Protocol | |
SP3 |
Security Protocol 3 | |
SP4 |
Security Protocol 4 | |
SPI |
security parameters index | |
SPKI |
simple public key infrastructure | |
SRA |
secure RPC authentication | |
SRI |
Stanford Research Institute | |
SSH |
Secure Shell site security handbook | |
SSL |
secure sockets layer | |
SSR |
secure socket relay | |
STD |
Internet Standard | |
STEL |
secure telnet | |
STS |
station-to-station | |
TACAS |
terminal access controller access system | |
TAMU |
Texas A&M University | |
TAN |
transaction authentication number | |
TCB |
trusted computing base | |
TCP |
Transport Control Protocol | |
TCSEC |
trusted computer system evaluation criteria | |
TEK |
token enryption key | |
TESS |
the exponential security system trusted entry security server | |
TFTP |
trivial FTP | |
TIS |
Trusted Information Systems, Inc. | |
TLI |
transport layer interface | |
TLS |
transport layer security | |
TLSP |
Transport Layer Security Protocol | |
TOS |
type of service | |
TTL |
time to live | |
TTP |
trusted third party | |
UC |
University of California | |
UCB |
University of California at Berkeley | |
UCLA |
University of California at Los Angeles | |
UCSB |
University of California at Santa Barbara | |
UDP |
User Datagram Protocol | |
UID |
user identification | |
U.K. |
United Kingdom | |
UPS |
United Parcel Service | |
URL |
uniform resource locator | |
U.S. |
United States | |
UUCP |
UNIX-UNIX Copy Protocol | |
VPN |
virtual private network | |
VTP |
Virtual Tunneling Protocol | |
WAIS |
wide area information service | |
WAN |
wide area network | |
WAP |
Wireless Application Protocol | |
WEF |
World Economic Forum | |
WG |
working group | |
WTLS |
wireless transport layer security | |
WWW |
World Wide Web | |
W3C |
World Wide Web Consortium | |
XML |
Extensible Markup Language |
Team-Fly |