- cryptographic control
- управление (доступом) с использованием криптографии
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All … Wikipedia
Cryptographic service message — (CSM) An ISO term. A message for transporting cryptographic keys or related information used to control a keying relationship … International financial encyclopaedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… … Wikipedia
Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… … Wikipedia
Deployable Joint Command and Control — DJC2 Program logo The Deployable Joint Command and Control system, commonly known as DJC2, is an integrated command and control headquarters system which enables a commander to set up a self contained, self powered, computer network enabled… … Wikipedia
Resource Access Control Facility — RACF, short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. Its primary market competitors have been ACF2… … Wikipedia
Dual control — An ISO term. A process of utilising two or more separate entities (usually persons), operating in concert, to protect sensitive functions or information whereby no single person is able to access or utilise the materials, e.g., cryptographic… … International financial encyclopaedia