Key terms in secure computing
Attestation identity key
A cryptographic key used when a computer wants a trusted third party to vouch for it. It can vouch for the computer without revealing its identity.
The action confirming whether or not a user is allowed to access a resource.
A pair of cryptographic keys, one private, one public. The private key is built in to the trusted platform module (TPM) when it is manufactured.
Federated access management
The rules and policies giving access to online resources shared by a group of organizations in a federation. Representatives from the organizations in the federation sign an agreement on how details of users and resources are shared. The organizations trust ...