The IT Law Wiki
(Adding categories)
Tag: categoryselect
 
(4 intermediate revisions by the same user not shown)
Line 25: Line 25:
   
 
{{Quote|[a] mechanical characteristic of any [[digital object]] that reflects the degree of [[trustworthiness]] in the [[object]], in that the supportive [[metadata]] accompanying the [[object]] makes it clear that the possessed [[object]] is what it purports to be.<ref>[[NDSA Glossary]].</ref>}}
 
{{Quote|[a] mechanical characteristic of any [[digital object]] that reflects the degree of [[trustworthiness]] in the [[object]], in that the supportive [[metadata]] accompanying the [[object]] makes it clear that the possessed [[object]] is what it purports to be.<ref>[[NDSA Glossary]].</ref>}}
 
== References ==
 
<references />
 
   
 
=== Security ===
 
=== Security ===
Line 34: Line 31:
   
 
{{Quote|[a] [[security]] service that provides a [[user]] with a means of verifying the [[identity]] of the [[sender]] of a [[message]], a [[file]], a [[computer system]], a [[software]] process, or even a [[database]] or individual [[software]] component.<ref>[[Cryptography's Role in Securing the Information Society]], App. B, Glossary, at 354.</ref>}}
 
{{Quote|[a] [[security]] service that provides a [[user]] with a means of verifying the [[identity]] of the [[sender]] of a [[message]], a [[file]], a [[computer system]], a [[software]] process, or even a [[database]] or individual [[software]] component.<ref>[[Cryptography's Role in Securing the Information Society]], App. B, Glossary, at 354.</ref>}}
  +
  +
{{Quote|[[validating]] the source of a [[message]]; i.e., that it was [[transmitted]] by a properly identified [[sender]] and is not a replay of a previously [[transmitted]] [[message]].<ref>[[NIST Special Publication 800-2]].</ref>}}
   
 
== References ==
 
== References ==
Line 40: Line 39:
 
== See also ==
 
== See also ==
   
<div style="column-count:2;-moz-column-count:2;">
+
<div style="{{column-count|2}}">
   
 
* [[Authenticate]]
 
* [[Authenticate]]
Line 62: Line 61:
 
</div>
 
</div>
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:Definition]]

Latest revision as of 01:26, 1 September 2015

Definitions[]

General[]

Authenticity is:

[t]he property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.[1]
[t]he property that allows the ability to validate the claimed identity of a system entity.[2]

Authenticity is "[h]aving an undisputed identity or origin."[3]

Internet[]

Authenticity is:

[t]he sense that something or someone is "real." Blogs enable people to publish content, and engage in conversations, that show their interests and values, and so help them develop an authentic voice online.[4]

Preservation[]

Authenticity is "the perfect identity of a current object with its original state."[5]

Authenticity is

[a] mechanical characteristic of any digital object that reflects the degree of trustworthiness in the object, in that the supportive metadata accompanying the object makes it clear that the possessed object is what it purports to be.[6]

Security[]

Authenticity is:

[a] security service that provides a user with a means of verifying the identity of the sender of a message, a file, a computer system, a software process, or even a database or individual software component.[7]
validating the source of a message; i.e., that it was transmitted by a properly identified sender and is not a replay of a previously transmitted message.[8]

References[]

See also[]