Map
Index
Random
Help
th

Quote: authenticated operation requires program identity; e.g., restrict access to financial data via cryptographic hash of executable code

QuoteRef: englP7_2003 , p. 56



Topic:
authentication
Topic:
entities
Topic:
proper names

Quotation Skeleton

Authenticated operation bases access-control decisions in part on … files containing financial data to only certain authorized … Code-based access control requires a method of establishing … The simplest approach is a cryptographic digest or … If the application is modified, its cryptographic hash--and …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: authentication (93 items)
Topic: entities (20 items)
Topic: proper names (35 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.