| Document Date: 1999-11-05 00:00:00 Open Document File Size: 78,56 KBShare Result on Facebook
Company IBM / CDSA / Hewlett-Packard / SKIPJACK / Cryptoki / Motorola / Sun / BATON / CAPI / TIS / JUNIPER / KEA / Netscape / Microsoft / Intel Architecture Labs / / / Facility Cryptoki library / Data Store / port Abstract The Common Data Security Architecture / / IndustryTerm cryptographic software / network operating systems / auxiliary services / individual software module / cryptographic context management / set-up services / layered infrastructure / software cryptographic modules / cryptographic algorithm / desired cryptographic algorithms / bitmask describing services / e.g. algorithm / direct interface to hardware / direct hardware / software architects / software cryptographic module / module management / cryptographic algorithms / security services / software tokens / cryptographic services / authentication device / security services infrastructure / correct services / signed manifest credentials to applications / encryption algorithm / memory management / official algorithms / software cryptomodule / / Organization Defense Advanced Research Projects Agency / National Security Agency / CDSA’s CSP / SPI’s CSP / / Person Ruth Taylor / / Position driver / Cryptographic Services Manager / system administrator / cryptographically-aware programmer / private / sensitive or always sensitive / application programmer / but Cryptoki does not / official algorithms / security officer / Cryptographic Application Programmer / General / cryptographically aware programmer / experienced programmer / model for administration / Cryptoki General / model for CSP administration / Common Security Services Manager / application programmer / driver writer / programmer / / Product Cryptoki / CSSM / / ProgrammingLanguage C / / Technology specific algorithm / desired cryptographic algorithms / encryption algorithm / Information Technology / API / private key / secret key / operating system / MISSI algorithms / operating systems / cryptographic algorithm / encryption / Cryptography / Public Key / seventy algorithms / cryptographic algorithms / e.g. algorithm / /
SocialTag |