Basic HTML version of Foils prepared June 5 99

Foil 67 Secure Access: terminology

From Use of Java in Computational Science DoD Modernization Users Group Conference Monterey -- June 7 99. by Tom Haupt,Geoffrey C. Fox


1 Access Control (or Authorization)
  • Assurance that the person or computer at the other end of the session is permitted to do what he asks for.
2 Authentication
  • Assurance that the resource (human or machine) at the other end of the session is what it claims to be
3 Integrity
  • Assurance that the information that arrives is the same as when it was sent
4 Accountability (or non-repudiation)
  • Assurance that any transaction that takes place can subsequently proved to have taken place
5 Privacy
  • Assurance that sensitive information is not visible to an eavesdropper (usually achieved using encryption)

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999