|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T v
Length: 21713 (0x54d1) Types: TextFile Names: »volume5.toc«
└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0 └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« └─⟦de7628f85⟧ └─⟦this⟧ »isode-6.0/doc/manual/volume5.toc«
\contentsline {part}{\uppercase {i}\phspace {1em}Introduction}{1} \contentsline {chapter}{\numberline {1}Overview}{3} \contentsline {section}{\numberline {1.1}Fanatics Need Not Read Further}{4} \contentsline {section}{\numberline {1.2}The Name of the Game}{5} \contentsline {section}{\numberline {1.3}Operating Environments}{5} \contentsline {section}{\numberline {1.4}Organization of the Release}{7} \contentsline {section}{\numberline {1.5}A Note on this Implementation}{9} \contentsline {section}{\numberline {1.6}Changes Since the Last Release}{10} \contentsline {chapter}{\numberline {2}Overview of QUIPU}{12} \contentsline {section}{\numberline {2.1}Summary}{12} \contentsline {section}{\numberline {2.2}Pronouncing QUIPU}{13} \contentsline {section}{\numberline {2.3}Why QUIPU}{13} \contentsline {section}{\numberline {2.4}Objectives}{13} \contentsline {subsection}{\numberline {2.4.1}General Aims}{13} \contentsline {subsection}{\numberline {2.4.2}Technical Goals}{14} \contentsline {section}{\numberline {2.5}Roadmap}{15} \contentsline {section}{\numberline {2.6}QUIPU Support Address}{15} \contentsline {section}{\numberline {2.7}Acknowledgements}{16} \contentsline {part}{\uppercase {ii}\phspace {1em}User's Guide}{17} \contentsline {chapter}{\numberline {3}The OSI Directory}{19} \contentsline {section}{\numberline {3.1}The Model}{19} \contentsline {section}{\numberline {3.2}Information Representation}{21} \contentsline {subsection}{\numberline {3.2.1}Object Identifiers}{21} \contentsline {subsection}{\numberline {3.2.2}Attributes}{21} \contentsline {subsection}{\numberline {3.2.3}Names}{23} \contentsline {section}{\numberline {3.3}Directory User Agent}{24} \contentsline {section}{\numberline {3.4}Directory System Agent}{25} \contentsline {chapter}{\numberline {4}DISH}{26} \contentsline {section}{\numberline {4.1}Commands}{27} \contentsline {subsection}{\numberline {4.1.1}Moveto}{27} \contentsline {subsection}{\numberline {4.1.2}Showentry}{28} \contentsline {subsubsection}{read flags}{28} \contentsline {subsection}{\numberline {4.1.3}List}{29} \contentsline {subsection}{\numberline {4.1.4}Search}{30} \contentsline {subsubsection}{More on Matching}{31} \contentsline {subsection}{\numberline {4.1.5}Add Entry}{32} \contentsline {subsection}{\numberline {4.1.6}Editentry}{32} \contentsline {subsection}{\numberline {4.1.7}Delete Entry}{33} \contentsline {subsection}{\numberline {4.1.8}Modify Entry}{33} \contentsline {subsection}{\numberline {4.1.9}ModifyRDN}{33} \contentsline {subsection}{\numberline {4.1.10}Showname}{33} \contentsline {subsection}{\numberline {4.1.11}Compare}{34} \contentsline {subsection}{\numberline {4.1.12}Squid}{34} \contentsline {subsection}{\numberline {4.1.13}Bind}{34} \contentsline {subsection}{\numberline {4.1.14}Unbind}{35} \contentsline {section}{\numberline {4.2}Sequences}{35} \contentsline {section}{\numberline {4.3}Service Controls}{36} \contentsline {section}{\numberline {4.4}Tailoring}{37} \contentsline {subsection}{\numberline {4.4.1}.quipurc}{38} \contentsline {section}{\numberline {4.5}Remote Management of the DSA}{39} \contentsline {section}{\numberline {4.6}Caching in the DUA}{40} \contentsline {section}{\numberline {4.7}Running DISH from the Shell}{40} \contentsline {subsection}{\numberline {4.7.1}Dishinit}{41} \contentsline {subsection}{\numberline {4.7.2}Example Scripts}{41} \contentsline {subsection}{\numberline {4.7.3}Files}{42} \contentsline {chapter}{\numberline {5}SID}{43} \contentsline {section}{\numberline {5.1}Quickstart}{43} \contentsline {section}{\numberline {5.2}Example Usage}{46} \contentsline {section}{\numberline {5.3}Use of Nicknames}{47} \contentsline {section}{\numberline {5.4}SID Commands}{47} \contentsline {section}{\numberline {5.5}Standard DISH commands}{48} \contentsline {section}{\numberline {5.6}QUIPU Profile}{49} \contentsline {chapter}{\numberline {6}FRED}{51} \contentsline {section}{\numberline {6.1}Giving Commands to Fred}{51} \contentsline {section}{\numberline {6.2}Let your Fingers do the Walking}{51} \contentsline {subsection}{\numberline {6.2.1}The Alias Command}{52} \contentsline {subsection}{\numberline {6.2.2}Back to Searching}{52} \contentsline {subsection}{\numberline {6.2.3}The Area Command}{54} \contentsline {subsection}{\numberline {6.2.4}Getting Help}{55} \contentsline {subsection}{\numberline {6.2.5}Quitting}{55} \contentsline {section}{\numberline {6.3}Advanced Usage}{56} \contentsline {chapter}{\numberline {7}WIDGET}{57} \contentsline {section}{\numberline {7.1}Types of Widget}{57} \contentsline {subsection}{\numberline {7.1.1}Label Widgets}{58} \contentsline {subsection}{\numberline {7.1.2}Command Widgets}{58} \contentsline {subsection}{\numberline {7.1.3}Dialog Widgets}{58} \contentsline {subsection}{\numberline {7.1.4}Toggle Widgets}{58} \contentsline {section}{\numberline {7.2}Using WIDGET}{58} \contentsline {subsection}{\numberline {7.2.1}Binding}{59} \contentsline {subsection}{\numberline {7.2.2}Main Options}{59} \contentsline {subsection}{\numberline {7.2.3}Read}{59} \contentsline {subsection}{\numberline {7.2.4}List}{59} \contentsline {subsection}{\numberline {7.2.5}Search}{59} \contentsline {subsection}{\numberline {7.2.6}Modify}{60} \contentsline {subsection}{\numberline {7.2.7}Quitting}{60} \contentsline {chapter}{\numberline {8}SUNINT}{61} \contentsline {section}{\numberline {8.1}Using SUNINT}{61} \contentsline {subsection}{\numberline {8.1.1}Menus}{61} \contentsline {subsection}{\numberline {8.1.2}Moving around the DIT}{62} \contentsline {subsection}{\numberline {8.1.3}Reading the Attributes}{62} \contentsline {subsection}{\numberline {8.1.4}Searching}{62} \contentsline {subsection}{\numberline {8.1.5}Quitting}{62} \contentsline {chapter}{\numberline {9}Attribute Syntaxes}{63} \contentsline {section}{\numberline {9.1}Standard Syntaxes}{63} \contentsline {subsection}{\numberline {9.1.1}PrintableString}{64} \contentsline {subsection}{\numberline {9.1.2}CaseExactString}{64} \contentsline {subsection}{\numberline {9.1.3}CaseIgnoreString}{65} \contentsline {subsection}{\numberline {9.1.4}CountryString}{67} \contentsline {subsection}{\numberline {9.1.5}IA5String}{67} \contentsline {subsection}{\numberline {9.1.6}VisibleString}{68} \contentsline {subsection}{\numberline {9.1.7}OctetString}{68} \contentsline {subsection}{\numberline {9.1.8}NumericString}{68} \contentsline {subsection}{\numberline {9.1.9}DestinationString}{69} \contentsline {subsection}{\numberline {9.1.10}TelephoneNumber}{69} \contentsline {subsection}{\numberline {9.1.11}PostalAddress}{70} \contentsline {subsection}{\numberline {9.1.12}DN}{70} \contentsline {subsection}{\numberline {9.1.13}OID}{72} \contentsline {subsection}{\numberline {9.1.14}ObjectClass}{72} \contentsline {subsection}{\numberline {9.1.15}TelexNumber}{72} \contentsline {subsection}{\numberline {9.1.16}TeletexTerminalIdentifier}{73} \contentsline {subsection}{\numberline {9.1.17}FacsimileTelephoneNumber}{73} \contentsline {subsection}{\numberline {9.1.18}DeliveryMethod}{73} \contentsline {subsection}{\numberline {9.1.19}PresentationAddress}{74} \contentsline {subsection}{\numberline {9.1.20}Password}{74} \contentsline {subsection}{\numberline {9.1.21}Certificate}{74} \contentsline {subsection}{\numberline {9.1.22}CertificatePair}{74} \contentsline {subsection}{\numberline {9.1.23}CertificateList}{75} \contentsline {subsection}{\numberline {9.1.24}Guide}{75} \contentsline {subsection}{\numberline {9.1.25}UTCTime}{76} \contentsline {subsection}{\numberline {9.1.26}Boolean}{76} \contentsline {subsection}{\numberline {9.1.27}Integer}{76} \contentsline {section}{\numberline {9.2}QUIPU Attribute Syntaxes}{76} \contentsline {subsection}{\numberline {9.2.1}ACL}{76} \contentsline {subsection}{\numberline {9.2.2}Schema}{77} \contentsline {subsection}{\numberline {9.2.3}ProtectedPassword}{77} \contentsline {subsection}{\numberline {9.2.4}SecurityPolicy}{78} \contentsline {subsection}{\numberline {9.2.5}EdbInfo}{78} \contentsline {section}{\numberline {9.3}RARE Attribute Syntaxes}{78} \contentsline {subsection}{\numberline {9.3.1}Mailbox}{78} \contentsline {subsection}{\numberline {9.3.2}CaseIgnoreIA5String}{78} \contentsline {subsection}{\numberline {9.3.3}Photo}{79} \contentsline {section}{\numberline {9.4}THORN System Attribute Syntaxes}{79} \contentsline {subsection}{\numberline {9.4.1}ThornACL}{79} \contentsline {subsection}{\numberline {9.4.2}RDType}{79} \contentsline {subsection}{\numberline {9.4.3}ODType}{79} \contentsline {subsection}{\numberline {9.4.4}ADType}{79} \contentsline {subsection}{\numberline {9.4.5}KnowledgeReference}{80} \contentsline {subsection}{\numberline {9.4.6}NRSInformation}{80} \contentsline {section}{\numberline {9.5}MHS Attribute Syntaxes}{80} \contentsline {subsection}{\numberline {9.5.1}ORAddress}{80} \contentsline {subsection}{\numberline {9.5.2}ORName}{80} \contentsline {subsection}{\numberline {9.5.3}DLSubmitPermissions}{80} \contentsline {section}{\numberline {9.6}ASN}{80} \contentsline {chapter}{\numberline {10}Introduction to Security Features}{82} \contentsline {section}{\numberline {10.1}Passwords}{82} \contentsline {subsection}{\numberline {10.1.1}Choosing a Password}{82} \contentsline {subsection}{\numberline {10.1.2}Taking Care of Your Password}{83} \contentsline {section}{\numberline {10.2}Discretionary Access Control}{84} \contentsline {subsection}{\numberline {10.2.1}Model}{84} \contentsline {subsection}{\numberline {10.2.2}Detect Access}{86} \contentsline {subsection}{\numberline {10.2.3}Effect of ACLs on Operations}{86} \contentsline {subsection}{\numberline {10.2.4}Example Use of ACLs}{87} \contentsline {part}{\uppercase {iii}\phspace {1em}Administrator's Guide}{91} \contentsline {chapter}{\numberline {11}Installing QUIPU}{93} \contentsline {section}{\numberline {11.1}Files}{94} \contentsline {chapter}{\numberline {12}Configuring a DUA}{96} \contentsline {section}{\numberline {12.1}Connecting to a DSA}{96} \contentsline {section}{\numberline {12.2}Tailoring}{97} \contentsline {chapter}{\numberline {13}Configuring a DSA}{101} \contentsline {section}{\numberline {13.1}Basic Formats and Structures}{101} \contentsline {subsection}{\numberline {13.1.1}Entry Data Block}{101} \contentsline {subsection}{\numberline {13.1.2}Object Class attribute}{103} \contentsline {subsection}{\numberline {13.1.3}Database Structure}{104} \contentsline {subsection}{\numberline {13.1.4}Long Distinguished Names}{105} \contentsline {section}{\numberline {13.2}Setting up an Initial DSA}{106} \contentsline {subsection}{\numberline {13.2.1}Setting up YOUR DSA}{108} \contentsline {section}{\numberline {13.3}Tailoring}{110} \contentsline {subsection}{\numberline {13.3.1}Tailoring a Running DSA}{113} \contentsline {section}{\numberline {13.4}Connection to Other DSAs}{113} \contentsline {subsection}{\numberline {13.4.1}Choosing a Name for Your DSA}{115} \contentsline {subsection}{\numberline {13.4.2}Connection to the Global Directory}{117} \contentsline {section}{\numberline {13.5}Adding more Data}{118} \contentsline {subsection}{\numberline {13.5.1}More on Object Classes}{119} \contentsline {subsubsection}{Person}{119} \contentsline {subsubsection}{OrganizationalPerson}{120} \contentsline {subsubsection}{ThornPerson}{121} \contentsline {subsubsection}{OrganizationalRole}{121} \contentsline {subsubsection}{Alias}{122} \contentsline {subsubsection}{OrganizationalUnit}{123} \contentsline {subsubsection}{Organization}{124} \contentsline {subsubsection}{domainRelatedObject}{124} \contentsline {subsection}{\numberline {13.5.2}Schemas}{125} \contentsline {subsection}{\numberline {13.5.3}Photograph Attributes}{126} \contentsline {subsection}{\numberline {13.5.4}File Attributes}{127} \contentsline {section}{\numberline {13.6}How a DSA Starts}{128} \contentsline {section}{\numberline {13.7}Adding more DSAs}{129} \contentsline {section}{\numberline {13.8}Receiving EDB Updates}{129} \contentsline {section}{\numberline {13.9}Tables}{131} \contentsline {section}{\numberline {13.10}More Help Installing Quipu}{133} \contentsline {chapter}{\numberline {14}Security Management}{134} \contentsline {section}{\numberline {14.1}Configuration}{134} \contentsline {subsection}{\numberline {14.1.1}Compilation Options}{134} \contentsline {subsection}{\numberline {14.1.2}Quipu Userid}{135} \contentsline {subsection}{\numberline {14.1.3}File Permissions}{135} \contentsline {section}{\numberline {14.2}Discretionary Access Control}{136} \contentsline {subsection}{\numberline {14.2.1}What must be Publicly Readable}{136} \contentsline {section}{\numberline {14.3}Audit}{137} \contentsline {subsection}{\numberline {14.3.1}Enabling Auditing}{137} \contentsline {subsection}{\numberline {14.3.2}Relating Events to Users}{137} \contentsline {subsection}{\numberline {14.3.3}Format of Audit Records}{137} \contentsline {subsection}{\numberline {14.3.4}Start of an Association}{138} \contentsline {subsection}{\numberline {14.3.5}End of an Association}{138} \contentsline {subsection}{\numberline {14.3.6}DAP Operation}{138} \contentsline {subsection}{\numberline {14.3.7}DAP Result}{139} \contentsline {subsection}{\numberline {14.3.8}Chaining}{139} \contentsline {subsection}{\numberline {14.3.9}Other Events}{139} \contentsline {chapter}{\numberline {15}The QUIPU Nameservice}{140} \contentsline {section}{\numberline {15.1}Requirements}{140} \contentsline {section}{\numberline {15.2}Design}{140} \contentsline {section}{\numberline {15.3}Support}{142} \contentsline {section}{\numberline {15.4}Configuring the Name Service}{142} \contentsline {section}{\numberline {15.5}Dsabuild}{143} \contentsline {section}{\numberline {15.6}Representation in the DIT}{143} \contentsline {section}{\numberline {15.7}Replacing the Name Service with DAP}{144} \contentsline {chapter}{\numberline {16}User Naming Architecture}{145} \contentsline {section}{\numberline {16.1}Overview}{145} \contentsline {section}{\numberline {16.2}THORN}{145} \contentsline {section}{\numberline {16.3}Common Name Forms}{146} \contentsline {section}{\numberline {16.4}DSA Naming Architecture }{146} \contentsline {part}{\uppercase {iv}\phspace {1em}Programmer's Guide}{149} \contentsline {chapter}{\numberline {17}Programming the Directory}{151} \contentsline {section}{\numberline {17.1}Conventions}{151} \contentsline {section}{\numberline {17.2}Attributes}{154} \contentsline {section}{\numberline {17.3}Distinguished Names}{158} \contentsline {section}{\numberline {17.4}Adding New Syntaxes to QUIPU}{160} \contentsline {subsection}{\numberline {17.4.1}Where to Add the Syntax Definition}{162} \contentsline {chapter}{\numberline {18}The Procedural DUA}{164} \contentsline {section}{\numberline {18.1}Procedure Model}{164} \contentsline {section}{\numberline {18.2}Common Parameters}{165} \contentsline {subsection}{\numberline {18.2.1}Arguments}{165} \contentsline {subsection}{\numberline {18.2.2}Results}{166} \contentsline {section}{\numberline {18.3}Continuation References}{166} \contentsline {section}{\numberline {18.4}Errors}{168} \contentsline {subsection}{\numberline {18.4.1}Attribute Error}{169} \contentsline {subsection}{\numberline {18.4.2}Name Error}{170} \contentsline {subsection}{\numberline {18.4.3}Referral Errors}{170} \contentsline {subsection}{\numberline {18.4.4}Security Error}{170} \contentsline {subsection}{\numberline {18.4.5}Service Error}{171} \contentsline {subsection}{\numberline {18.4.6}Update Error}{171} \contentsline {subsection}{\numberline {18.4.7}Abandon Failure}{171} \contentsline {subsection}{\numberline {18.4.8}Error Handling Procedures}{172} \contentsline {section}{\numberline {18.5}Binding and Unbinding}{172} \contentsline {subsection}{\numberline {18.5.1}No Authentication}{174} \contentsline {subsection}{\numberline {18.5.2}Simple Authentication}{175} \contentsline {subsection}{\numberline {18.5.3}Protected Simple Authentication}{175} \contentsline {subsection}{\numberline {18.5.4}Strong Authentication}{175} \contentsline {section}{\numberline {18.6}Unbind}{175} \contentsline {section}{\numberline {18.7}Read}{176} \contentsline {subsection}{\numberline {18.7.1}Entry Information Selection}{177} \contentsline {subsection}{\numberline {18.7.2}Entry Information}{177} \contentsline {section}{\numberline {18.8}Compare}{178} \contentsline {subsection}{\numberline {18.8.1}Attribute Value Assertion}{179} \contentsline {section}{\numberline {18.9}List}{180} \contentsline {section}{\numberline {18.10}Search}{181} \contentsline {subsection}{\numberline {18.10.1}Filters}{184} \contentsline {section}{\numberline {18.11}Modification Operations}{187} \contentsline {subsection}{\numberline {18.11.1}Add}{187} \contentsline {subsection}{\numberline {18.11.2}Remove}{187} \contentsline {subsection}{\numberline {18.11.3}Modify}{188} \contentsline {subsection}{\numberline {18.11.4}ModifyRDN}{189} \contentsline {section}{\numberline {18.12}Abandon}{190} \contentsline {section}{\numberline {18.13}Multiple Associations}{190} \contentsline {subsection}{\numberline {18.13.1}Multiple Binds}{190} \contentsline {subsection}{\numberline {18.13.2}Other DAP Operations}{191} \contentsline {section}{\numberline {18.14}Asynchronous Access}{191} \contentsline {chapter}{\numberline {19}Using the Quipu Library}{192} \contentsline {section}{\numberline {19.1}The Entry Structure}{192} \contentsline {section}{\numberline {19.2}Caching Results}{194} \contentsline {section}{\numberline {19.3}Finding Data in the Cache}{195} \contentsline {section}{\numberline {19.4}Caching List Results}{195} \contentsline {section}{\numberline {19.5}Changes}{196} \contentsline {part}{\uppercase {v}\phspace {1em}Design}{199} \contentsline {chapter}{\numberline {20}Overview}{201} \contentsline {section}{\numberline {20.1}Introduction}{201} \contentsline {section}{\numberline {20.2}General Aims}{202} \contentsline {section}{\numberline {20.3}Technical Goals}{203} \contentsline {section}{\numberline {20.4}Further QUIPU documents}{204} \contentsline {chapter}{\numberline {21}General Design}{205} \contentsline {section}{\numberline {21.1}Overview}{205} \contentsline {section}{\numberline {21.2}Service Controls}{206} \contentsline {chapter}{\numberline {22}Distributed Operation}{207} \contentsline {section}{\numberline {22.1}Overview}{207} \contentsline {section}{\numberline {22.2}DSA/DUA Interaction Model}{207} \contentsline {section}{\numberline {22.3}Model of Data Distribution}{208} \contentsline {subsection}{\numberline {22.3.1}Entry Data Blocks}{208} \contentsline {subsection}{\numberline {22.3.2}Masters and Slaves}{209} \contentsline {subsection}{\numberline {22.3.3}QUIPU Subordinate References}{209} \contentsline {subsection}{\numberline {22.3.4}Access to the root EDB}{210} \contentsline {section}{\numberline {22.4}Standard Knowledge References}{210} \contentsline {section}{\numberline {22.5}Navigation}{211} \contentsline {section}{\numberline {22.6}List}{213} \contentsline {section}{\numberline {22.7}Search}{214} \contentsline {section}{\numberline {22.8}Selecting a DSA}{215} \contentsline {subsection}{\numberline {22.8.1}DSA Quality}{216} \contentsline {subsection}{\numberline {22.8.2}Unavailable DSAs}{217} \contentsline {subsection}{\numberline {22.8.3}Operating When DSAs are not Fully Interconnected}{217} \contentsline {section}{\numberline {22.9}The External View of QUIPU}{217} \contentsline {section}{\numberline {22.10}Cached Data}{218} \contentsline {section}{\numberline {22.11}Configuration and Slave Update}{219} \contentsline {section}{\numberline {22.12}DSA Naming}{220} \contentsline {subsection}{\numberline {22.12.1}Choice of Names to Prevent Loops}{220} \contentsline {chapter}{\numberline {23}Access Control and Authentication}{222} \contentsline {section}{\numberline {23.1}Models}{222} \contentsline {subsection}{\numberline {23.1.1}Access Control}{222} \contentsline {subsection}{\numberline {23.1.2}Security Domains}{222} \contentsline {section}{\numberline {23.2}Representation in the DIT}{223} \contentsline {subsection}{\numberline {23.2.1}Simple Authentication}{223} \contentsline {subsection}{\numberline {23.2.2}Protected Simple Authentication}{223} \contentsline {subsection}{\numberline {23.2.3}Access Control Lists}{224} \contentsline {subsection}{\numberline {23.2.4}Security Policies}{224} \contentsline {subsection}{\numberline {23.2.5}Labels}{224} \contentsline {section}{\numberline {23.3}Distributed Operations}{225} \contentsline {subsection}{\numberline {23.3.1}(Protected) Simple Authentication}{225} \contentsline {subsection}{\numberline {23.3.2}Strong Authentication}{225} \contentsline {subsection}{\numberline {23.3.3}Restricting Read Access}{225} \contentsline {subsection}{\numberline {23.3.4}Restricting Write Access}{226} \contentsline {subsection}{\numberline {23.3.5}Caching}{226} \contentsline {subsection}{\numberline {23.3.6}Replicated Data}{227} \contentsline {chapter}{\numberline {24}Replicating Updates}{228} \contentsline {section}{\numberline {24.1}Basic Update Approach}{228} \contentsline {chapter}{\numberline {25}Implementation Choices}{231} \contentsline {section}{\numberline {25.1}DSA Structure}{231} \contentsline {subsection}{\numberline {25.1.1}Memory Structures}{232} \contentsline {subsection}{\numberline {25.1.2}Malloc}{233} \contentsline {subsection}{\numberline {25.1.3}Disk Structures}{233} \contentsline {section}{\numberline {25.2}OSI Choices}{234} \contentsline {part}{\uppercase {vi}\phspace {1em}Appendices}{235} \contentsline {chapter}{\numberline {A}Registered QUIPU DSAs}{237} \contentsline {chapter}{\numberline {B}BNF used Quipu}{242} \contentsline {chapter}{\numberline {C}The QUIPU Naming Architecture}{248} \contentsline {chapter}{\numberline {D}ASN.1 Summary}{252}