See “authentication chain.”
Sources:
NIST SP 800-81-2
under Chain of Trust
A method for maintaining valid trust boundaries by applying a principle of transitive trust, where each software module in a system boot process is required to measure the next module before transitioning control.
Sources:
NISTIR 8320
under Chain of Trust