Перевод: со всех языков на арабский

с арабского на все языки

data authentication

  • 1 authentication data

    "A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated."

    English-Arabic terms dictionary > authentication data

  • 2 authentication

    "The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords."

    English-Arabic terms dictionary > authentication

  • 3 Digest authentication

    "An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems."

    English-Arabic terms dictionary > Digest authentication

  • 4 Basic authentication

    "An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network."

    English-Arabic terms dictionary > Basic authentication

  • 5 plaintext authentication

    "An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network."

    English-Arabic terms dictionary > plaintext authentication

  • 6 Message Authentication Code

    An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received.

    English-Arabic terms dictionary > Message Authentication Code

  • 7 anonymous FTP authentication

    "A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password."

    English-Arabic terms dictionary > anonymous FTP authentication

  • 8 digital signature

    "Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services."

    English-Arabic terms dictionary > digital signature

  • 9 signature

    "Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services."

    English-Arabic terms dictionary > signature

  • 10 Secure Sockets Layer

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > Secure Sockets Layer

  • 11 SSL

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > SSL

  • 12 ar-sa عامل تصفية

    "The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation."

    English-Arabic terms dictionary > ar-sa عامل تصفية

  • 13 cryptography

    "The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation."

    English-Arabic terms dictionary > cryptography

  • 14 hash

    "A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing."

    English-Arabic terms dictionary > hash

  • 15 message digest

    "A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing."

    English-Arabic terms dictionary > message digest

  • 16 hash code

    "A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing."

    English-Arabic terms dictionary > hash code

  • 17 access token

    "A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority."

    English-Arabic terms dictionary > access token

  • 18 packet privacy

    An authentication level in which each data packet is signed and encrypted in order to protect the entire communication between the client and server.

    English-Arabic terms dictionary > packet privacy

  • 19 Point-to-Point Protocol

    "A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661."

    English-Arabic terms dictionary > Point-to-Point Protocol

  • 20 PPP

    "A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661."

    English-Arabic terms dictionary > PPP

См. также в других словарях:

  • Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm …   Wikipedia

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia

  • Data Protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… …   Wikipedia

  • Data protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… …   Wikipedia

  • Data curation — In science, Data curation is a term used to indicate the process of extraction of important information from scientific texts such as research articles by experts and converting them into an electronic form such as an entry of a biological… …   Wikipedia

  • authentication — In the context of bonds, refers to the validation of a bond certificate. Bloomberg Financial Dictionary * * * authenticate UK US /ɔːˈθentɪkeɪt/ US  /ɑːˈθenṱɪ / verb [T] ► to prove that something is real, true, or what people say it is: »Each of… …   Financial and business terms

  • Authentication —   An ISO term. A process used, between a sender and a receiver, to ensure data integrity and to provide data origin authentication.   The checking of a request (e.g.. to execute a financial transaction) to ensure that it is bona fide …   International financial encyclopaedia

  • Data Stream Interface — The Data Stream Interface (DSI) is a session layer used to carry Apple Filing Protocol traffic over Transmission Control Protocol. Contents 1 Overview 2 Protocol 2.1 Packet structure 2.2 Commands …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»