expand for answer

Data origin authentication

Corroborating the source of data is as claimed. The corroboration that the entity responsible for the creation of a set of data is the one claimed.


Similar items:
Data that is transferred to establish the claimed identity of an entity. Information, passed from one entity to another, used to establish the sending entity’s access rights.
[view]
A set of values representing a specific entity belonging to a particular entity type. A single value is also the instance of a data item. An occurrence of an entity class that can be uniquely described. In object-oriented programming, an instance can be an object, example, or representation of a class.
[view]
(1) An entity that can have many properties (either declarative, procedural, or both) associated with it. (2) An instance of a class. A passive entity that provides information or data to subjects. An object can be a file, a database, a computer, a program, a process, a file, a printer, a storage media, and so on. Passive entity containing or receiving information. Access to an object implies access to the information it contains.
[view]
(1) The process, generally employing unique machinereadable names, that enables recognition of users or resources as identical to those previously described to the computer system. (2) The assignment of a name by which an entity can be referenced. The entity may be high level (such as a user) or low level (such as a process or communication channel). Process an information system uses to recognize an entity. The process by which a subject professes an identity and accountability is initiated. The identification process can consist of a user providing a username, a logon ID, a PIN, or a smart card or a process providing a process ID number.
[view]
<p>(1) A security principle stating that individuals must be able to be identified. With accountability, violations or attempted violations can be traced to individuals who can be held responsible for their actions. </p><p>(2) The ability to map a given activity or event back to the responsible party; the property that ensures that the actions of an entity can be traced to that entity. </p><p>(IS) Process of tracing information system activities to a responsible source. </p><p>(COMSEC) Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information. </p><p>The process of holding someone responsible (accountable) for something. In this context, accountability is possible if a subject’s identity and actions can be tracked and verified.</p>
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in