Overview
    Alice & Bob
    Sending
    Receiving
    Identity
    Encryption
Technology
    Identity CA
    MTA Identity
    MTA Transport
Changes
Glossary

Glossary

Technology Terms
Glossary
Algorithm Engineering A common methodology for algorithmic research.
BCC Blind Carbon Copy
BouncyCastle BouncyCastle is a group of volunteers that implements cryptographic functions. http://bouncycastle.org/
CA Certificate Authority
CC Carbon Copy
CRL Certificate Revocation List
CSR Certificate Signing Request
DAO Data Access Object. Objects of this type are used for persistence layer implementations, which follow the DAO-pattern.
DT Data Type, in most cases an interface
DTO Data Transfer Object
EJB Enterprise Java Bean
GUI Graphical User Interface.
Heuristics A method of solving problems by finding practical ways of dealing with them.
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol over TLS
IDE Integrated Development Environment - a collection of tools necessary for software development.
JCA Java Cryptography Architecture
JCE Java Cryptography Extension
JDBC Java Database Connectivity
JDBI A thin wrapper around JDBC. See: http://jdbi.org/
JDK Java Development Kit.
JEE Java Enterprise Edition
JSE Java Standard Edition
JSON JavaScript Object Notation
JVM Java Virtual Machine
MTA Mail Transfer Agent
OTP One Time Password
PEE Privacy Enhanced E-Mail
PFS Perfect Forward Secrecy (a TLS feature that negotiates a new cryptographic key for each session)
PGP Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication
pkix Public-Key Infrastructure X.509 http://en.wikipedia.org/wiki/IETF_PKIX_Working_Group
png Portable Network Graphics, an acronym for a specific kind of graphic files.
REST Representational State Transfer is a software architecture style consisting of guidelines and best practices for creating web services.
SAN Subject Alternative Name
SMTP Simple Mail Transfer Protocol
SQL Structured Query Language, a language to query databases
SSL Secure Sockets Layer
TLS Transport Layer Security
TOTP Time based One Time Password
UML Unified Modelling Language.
UTF-8 Universal Character Set + Transformation Format 8-bit
VM Virtual Machine
XML Extensible Markup Language, an acronym for a specific format of text files.