-
21 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
22 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication." -
23 push-button configuration
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
24 PBC
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
25 BDC model
"An XML file that contains sets of descriptions of one or more external content types, their related external data sources, and information that is specific to the environment, such as authentication properties." -
26 Cloud App Model
"An application-hosting architecture that relies on cloud-based services. Application logic and data are typically hosted on a distributed set of services on the Internet, connected through web APIs, and authenticated with server-to-server authentication technologies such as OAuth."
- 1
- 2
См. также в других словарях:
Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Data Protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… … Wikipedia
Data protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… … Wikipedia
Data curation — In science, Data curation is a term used to indicate the process of extraction of important information from scientific texts such as research articles by experts and converting them into an electronic form such as an entry of a biological… … Wikipedia
authentication — In the context of bonds, refers to the validation of a bond certificate. Bloomberg Financial Dictionary * * * authenticate UK US /ɔːˈθentɪkeɪt/ US /ɑːˈθenṱɪ / verb [T] ► to prove that something is real, true, or what people say it is: »Each of… … Financial and business terms
Authentication — An ISO term. A process used, between a sender and a receiver, to ensure data integrity and to provide data origin authentication. The checking of a request (e.g.. to execute a financial transaction) to ensure that it is bona fide … International financial encyclopaedia
Data Stream Interface — The Data Stream Interface (DSI) is a session layer used to carry Apple Filing Protocol traffic over Transmission Control Protocol. Contents 1 Overview 2 Protocol 2.1 Packet structure 2.2 Commands … Wikipedia