authentication and integrity
- authentication and integrity
- аутентификация и целостность
аутентификация и целостность
Это смешанная часть услуг защиты, которая поддерживает целостность сообщений в сочетании с аутентификацией пользователя. Обе услуги защиты обеспечиваются одним и тем же механизмом защиты. Аутентификация пользователя происходит по его цифровой подписи под определенными данными с помощью частного ключа. Кроме того, сообщение защищено от несанкционированного использования.
[http://www.iks-media.ru/glossary/index.html?glossid=2400324]
Тематики
- электросвязь, основные понятия
EN
- authentication and integrity
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "authentication and integrity" в других словарях:
Simple Authentication and Security Layer — (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Authentication — An ISO term. A process used, between a sender and a receiver, to ensure data integrity and to provide data origin authentication. The checking of a request (e.g.. to execute a financial transaction) to ensure that it is bona fide … International financial encyclopaedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Health Insurance Portability and Accountability Act — The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers… … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Integrated Windows Authentication — (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT based… … Wikipedia
Message Authentication Code — Ein Message Authentication Code (MAC) dient dazu, Gewissheit über den Ursprung von Daten oder Nachrichten zu erhalten und ihre Integrität zu überprüfen.[1] MAC Algorithmen erfordern zwei Eingabeparameter, erstens die zu schützenden Daten und… … Deutsch Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia