Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center


A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols





  Process of associating two related elements of information.
Source(s): CNSSI 4009-2015
NIST SP 800-32 (CNSSI 4009)

  The association of a HoA and CoA for a given amount of time.
Source(s): NIST SP 800-119

  An acknowledgment by a trusted third party that associates an entity’s identity with its public key. This may take place through (1) a certification authority’s generation of a public key certificate, (2) a security officer’s verification of an entity’s credentials and placement of the entity’s public key and identifier in a secure database, or (3) an analogous method.
Source(s): NIST SP 800-21 Second edition (FIPS 196)

  Assurance of the integrity of an asserted relationship between items of information that is provided by cryptographic means. Also see Trusted association.
Source(s): NIST SP 800-56A Rev. 2
NIST SP 800-56B Rev. 1



See Also: