Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 71 Next »

If you need a Repository ID, please emily ti-librarian@internet2.edu.
Do not assume you can use the next Doc ID from this list and do not edit this list yourself. Thank you.

IDDocumentSponsorAuthor
TI.1.1Trust and Identity Document StewardshipInternet2David Walker
TI.2.1The Document Repository ServiceInternet2David Walker
TI.3.1The InCommon Trust ModelInternet2David Walker, Ann West
TI.3.2Trusted Relationships for Access Management: The InCommon ModelInternet2David Walker, Ann West, Jill Gemmill
TI.4.1

CACTI (Community Architecture for Trust and Identity) Charter

Internet2Tom Barton
TI.5.1Final Report of the Per-Entity Metadata Working GroupInCommon TACScott Koranda, David Walker, working group members
TI.6.1
Internet2 TIER Pipeline Design Document
Internet2Jim Van Fleet (jim.van.fleet@levvel.io)
TI.7.1OIDC Survey Working Group ReportInCommon TACAlbert Wu, David Walker, working group members
TI.8.1Edu-Person Working Group CharterMACEUnknown
TI.9.1eduPerson 1.0 SpecificationMACEMACE-Dir
TI.9.2EduPerson Object Class Specification (200210)MACEMACE-Dir
TI.9.3EduPerson Specification (200312)MACEMACE-Dir
TI.9.4EduPerson Object Class Specification (200604a)MACEMACE-Dir
TI.9.5eduPerson Object Class Specification (200712)MACEMACE-Dir
TI.9.6eduPerson Object Class Specification (200806)MACEMACE-Dir
TI.9.7eduPerson Object Class Specification (201203)MACEMACE-Dir
TI.9.8

eduPerson Object Class Specification (201310)

MACEMACE-Dir
TI.9.9

eduPerson Object Class Specification (201602)

MACEMACE-Dir
TI.10.1EduOrg Object Class Specification (200210)MACEMACE-Dir
TI.11.1A Recipe for Configuring and Operating LDAP DirectoriesMACEMichael R Gettes
TI.12.1The Case for Comprehensive DiagnosticsMACEChas DiFatt, Mark Poepping
TI.13.1Middleware End-To-End Diagnostics Advisory Group (MW-E2ED)MACEMW-E2ED
TI.14.1Federation SoupMACEUnknown
TI.15.1Federation Soup: An Assembly of IngredientsMACEUnknown
TI.16.1Final Report: A Workshop on Effective Approaches to Campus Research Computing CyberinfrastructureNSFKen Klingenstein, Kevin Morooney, Steve Olshansky
TI.17.1WebISO: Target-Side Integration ModelsMACENathan Dors, MACE-WebISO
TI.18.1WebISO: Service model and component capabilitiesMACERL "Bob" Morgan, MACE-WebISO
TI.19.1Trusted Delegation of Privileges in an N-Tier EnvironmentMACEChad La Joie, Russell Tokuyama, MACE-WebISO
TI.20.1WEB Initial Sign-On Overview DraftMACERyan Muldoon, Scott Fullerton, MACE-WebISO
TI.21.1Web Initial Sign-On RequirementsMACERyan Muldoon, Scott Fullerton, MACE-WebISO
TI.22.1COManage DemonstrationMACEMichael Gettes
TI.23.1Practices in Directory GroupsMACETom Barton
TI.24.1Identifiers, Authentication, and Directories: Best Practices for Higher Education.MACEMACE-Dir
TI.25.1
TIER Grouper Deployment Guide
TIERBill Thompson
TI.26.1Introduction to Identity FederationsInternet2David Walker, Ann West
TI.26.2Introduction to Identity FederationsInternet2David Walker, Ann West, Jill Gemmill
TI.27.1

Internet2 Disaster Recovery: Recovery Plan for Federation Services


Ann WestPaul Caskey, Mike LaHaye
TI.28.1

InCommon Disaster Recovery: Recovery Plan for Certificate Services


 Ann West,Paul Caskey, Mike LaHaye
TI.29.1Steward Program Proof of Concept Six-Month ReportInternet2David Walker
TI.30.1eduCourse Data ModelMACETom Barton
TI.31.1Globally Unique Identifiers for Course OfferingsMACEGrace Agnew, Keith Hazelton
TI.32.1LDAP Representations of eduCourse Attributes and an Auxiliary Object ClassMACEKeith Hazelton
TI.33.1Metadirectory Practices for Enterprise Directories in Higher EducationMACEBrendan Bellina
TI.34.1Baseline Expectations for Trust in FederationInCommon AACTom Barton
TI.35.1Processes to Implement and Maintain Baseline Expectations of InCommon Participants (still in draft, ID assigned but doc not in repository)InCommon AACTom Barton
TI.36.1Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final ReportInCommon AACKaren Herrington, Multi-Factor Authentication Interoperability Profile Working Group
TI.37.1InCommon MFA ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.38.1InCommon Base Level ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.39.1Usage Guidance For the InCommon “Base Level” and “MFA” Authentication ProfilesInCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.40.1MFA Technologies, Threats, and UsageInCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.41.1InCommon MFA Support Entity AttributeInCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.42.1

Charter for a Strong Identity Proofing Profile Working Group

InCommon AACMulti-Factor Authentication Interoperability Profile Working Group
TI.43.11st Annual PKI Research Workshop ProceedingsNIST, NIH, Internet2Ken Klingenstein, et al
TI.44.12nd Annual PKI Research Workshop Pre-ProceedingsNIH, NIST, Internet2Ken Klingenstein, et al
TI.45.13rd Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al
TI.46.1InCommon Disaster Recovery - Recovery Plan for eduroamPaul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2
TI.47.1InCommon Disaster Recovery - Recovery Plan for Federation Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2
TI.48.1InCommon Disaster Recovery - Recovery Plan for Certificate Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2
TI.49.1IT Operational Level Agreement - InCommon FederationNicholas Roy, Director of Technology and Strategy, InCommonAnn West, AVP of Trust and Identity, Internet2
TI.50.1

TIER Campus Success Program Call for Proposals (CFP)

Ann West, AVP of Trust and Identity, Internet2Ann West, AVP of Trust and Identity, Internet2
TI.51.1

Middleware Integration with Existing Applications: Current Design Issues, with a Focus on Mailing Lists

NMI-EditJill Gemmill, John-Paul Robinson
TI.52.1

Local Domain Person Object Class Study

NMI-EditBrendan Bellina
TI.52.2Local Domain Person Object Class StudyNMI-EditBrendan Bellina
TI.53.1InCommon Federation Participant Domain Use PolicyAnn WestNicholas Roy, The InCommon Registration Authority Team, The InCommon Operations Team
TI.54.14th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al
TI.55.15th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al
TI.56.16th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al
TI.57.1

IDtrust 2008 - 7th Symposium on Identity and Trust on the Internet

NIH, NIST, Internet2Ken Klingenstein, et al
TI.58.1IDtrust 2009 - 8th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al
TI.59.1IDtrust 2010 - 9th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al
TI.60.1IDtrust 2011 - 10th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al
TI.61.1Internet2 End-to-End Diagnostic Initiative: Vision and DirectionCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknown
TI.62.1User Perspectives of Diagnostics - A Multidimensional ViewCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknown
TI.63.1EDDY (End-to-End Diagnostic Discovery) Architecture, Concept and Effort StatusCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeChas DiFatta, Mark Peopping
TI.64.1

Group Tools Architecture

NMI-EditTom Barton
TI.65.1Shibboleth Architecture Technical OverviewMACETom Scavo, Scott Cantor, Nathan Dors
TI.66.1Shibboleth Architecture Protocols and ProfilesMACEScott Cantor, Steven Carmody, Marlena Erdos, Keith Hazelton, Walter Hoehn, RL "Bob" Morgan, Tom Scavo, David Wasley
TI.67.1Shibboleth Architecture Conformance RequirementsMACEScott Cantor, RL "Bob" Morgan
TI.68.1X.509 Certificate Policy - Version 0.011The University of California Office of the President (UCOP), The Corporation for Research and Educational Networking (CREN), EDUCAUSE, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)David Wasley (?)
TI.69.1

X.509 Certification Authority Policy & Practices - Higher Education PKI-Lite - Version 4.7

The University of Virginia, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)James Jokl, Jeffrey Schiller, David Wasley, Eric Norman, Neal McBurnett, Shelley Henderson, members of the HEPKI TAG
TI.70.1Concerns in the use of Endpoint Agent Security ToolsSALSADeke Kassabian
TI.71.1Loss of Network Control IncidentsSALSAJoe St Sauver
TI.72.1

If We Deploy IPv6, Will It Help or Hurt Our Security?

SALSAJoe St Sauver
TI.73.1Security Activities UpdateSALSAJoe St Sauver
TI.74.1Security ArchitecturesSALSAChristopher Misra, Mark Poepping
TI.75.1

Internet2 Security Activities: The Security Fruitcake

SALSAKen Klingenstein, Chris Misra
TI.76.1

Topics in Advanced Network Management: Results from a workshop of R&E network architects

SALSA

Nate Klingenstein, Kevin Miller, Terry Gray, Ken Klingenstein, et al.

TI.77.1Reconnections: Managing Academic Networks With New RequirementsSALSAKen Klingenstein
TI.78.1Architecting SecuritySALSAMark Poepping
TI.79.1

REN-ISAC Activities and REN-ISAC / Internet2 Focus Group Results

SALSADoug Pearson
TI.80.1

REN-ISAC and the Shared Darknet Project

SALSADoug Pearson
TI.81.1AbOSE Public ReportSALSAT. Charles Yun
TI.82.1

Network mgmt tools

SALSAAlan Crosswell
TI.83.1RENOIR: Research and Educational Networking Operational Information RetrievalSALSAPhillip Deneault
TI.84.1

FIND and Architecture

SALSADavid D. Clark
TI.85.1

Converged LAN Routing or Routed Aggregation Domains or A New Architecture for Secure and Reliable Subnets or Some crazy idea we dreamed up while redesigning our campus network

SALSA

Eric Brown, Clark Gaylord

TI.86.1CSI2 WorkshopSALSASteve Olshansky, et al
TI.87.1Reconnections Workshop: Executive OverviewSALSA
TI.88.1Proceedings: Salsa NetGuru Meeting, Feb. 14-15, 2007, Minneapolis, MNSALSA
TI.89.1

The Co-mingled Universe of R&E Networking

SALSAKen Klingenstein
TI.90.1Security Incident Management EssentialsSALSA
TI.91.1CSI2 Working GroupSALSA
TI.92.1

Detecting malicious hosts with Darknets

SALSAChristopher Misra
TI.93.1Reconnections Workshop ReportSALSA
TI.94.1Community Trust and Assurance Board (CTAB) CharterInCommon AACBrett Bieber and Tom Barton, on behalf of the InCommon Assurance Advisory Committee (AAC)
TI.95.1Baseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommonAnn WestTom Barton, Brett Bieber, Ann West, Dean Woodbeck
TI.96.1InCommon Service Provider Onboarding - Primer DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group
TI.97.1InCommon Service Provider Onboarding - Criteria DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group
TI.98.1InCommon Service Provider Onboarding - QuestionnaireInCommon TACInCommon Streamlining SP Onboarding Working Group
TI.99.1

TIER Accomplishments by Thematic Grouping - October 10, 2017

Internet2 Trust and Identity Executive Management (Steve Zoppi, Associate Vice President, Services Integration and Architecture)David Walker
TI.100.1InCommon Security Incident Handling Framework
Nick Roy



See Also:

Trust and Identity Doc Stewardship

 Document Repository

  • No labels