O'Reilly logo

Security Risks in Social Media Technologies by Alan Oxley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix 5

Key terms in secure computing

Attestation identity key

A cryptographic key used when a computer wants a trusted third party to vouch for it. It can vouch for the computer without revealing its identity.

Authorization

The action confirming whether or not a user is allowed to access a resource.

Endorsement key

A pair of cryptographic keys, one private, one public. The private key is built in to the trusted platform module (TPM) when it is manufactured.

Federated access management

The rules and policies giving access to online resources shared by a group of organizations in a federation. Representatives from the organizations in the federation sign an agreement on how details of users and resources are shared. The organizations trust ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required