non-repudiation love

non-repudiation

Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • noun Alternative spelling of nonrepudiation.

Etymologies

Sorry, no etymologies found.

Examples

  • This leaves gaping holes, asymmetric threats and security risks in the areas of confidentiality, integrity, authentication and non-repudiation of outsourced Digital Capital storage, exchange and its transactions.

    DK Matai: Digital Capital and Cloud Computing's Asymmetric Risks

  • E-Commerce employs some industry standards such as SET and SSL, which describe a set of protocols that provide non-repudiation, integrity, authentication and confidentiality.

    Enterprise Model | SciFi, Fantasy & Horror Collectibles

  • (I also advocate digital signing of online newspapers (of which there are none, as far as I can tell), mostly for the value of non-repudiation).

    The Volokh Conspiracy » Wikipedia and the Biography Problem, part 2:

  • They are non-repudiation, integrity, authentication, confidentiality and virus detection.

    Enterprise Model | SciFi, Fantasy & Horror Collectibles

  • But as I came to understand how public key cryptography facilitates encryption, authentication and (theoretically) non-repudiation, I reveled in the cleverness.

    Archive 2006-01-01

  • But as I came to understand how public key cryptography facilitates encryption, authentication and (theoretically) non-repudiation, I reveled in the cleverness.

    Sundance Film Festival Elevator Pitch Tweek

  • The result, he said, is an environment that is no longer compliant, with multi-factor authentication that doesn't offer real security because it can be circumvented, and "no possibility to apply the concept of non-repudiation" when the token is not used.

    CSO

  • The result, he said, is an environment that is no longer compliant, with multi-factor authentication that doesn't offer real security because it can be circumvented, and "no possibility to apply the concept of non-repudiation" when the token is not used.

    CSO

  • The result, he said, is an environment that is no longer compliant, with multi-factor authentication that doesn't offer real security because it can be circumvented, and "no possibility to apply the concept of non-repudiation" when the token is not used.

    CSO

  • Log Data from III for non-repudiation and assurance

    Planet Identity

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.