cryptographic control

cryptographic control
управление (доступом) с использованием криптографии

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно решить контрольную?

Смотреть что такое "cryptographic control" в других словарях:

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… …   Wikipedia

  • Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All …   Wikipedia

  • Cryptographic service message — (CSM)   An ISO term. A message for transporting cryptographic keys or related information used to control a keying relationship …   International financial encyclopaedia

  • Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… …   Wikipedia

  • List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… …   Wikipedia

  • Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… …   Wikipedia

  • Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… …   Wikipedia

  • Deployable Joint Command and Control — DJC2 Program logo The Deployable Joint Command and Control system, commonly known as DJC2, is an integrated command and control headquarters system which enables a commander to set up a self contained, self powered, computer network enabled… …   Wikipedia

  • Resource Access Control Facility — RACF, short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. Its primary market competitors have been ACF2… …   Wikipedia

  • Dual control —   An ISO term. A process of utilising two or more separate entities (usually persons), operating in concert, to protect sensitive functions or information whereby no single person is able to access or utilise the materials, e.g., cryptographic… …   International financial encyclopaedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»