UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ISO/IEC 9798-1

Information technology - Security techniques - Entity authentication - Part 1: General

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 July 2010
Status: active
Page Count: 18
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party.

The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.

Document History

ISO/IEC 9798-1
July 1, 2010
Information technology - Security techniques - Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to...
August 1, 1997
Information Technology - Security Techniques - Entity Authentication - Part 1: General
A description is not available for this item.
September 1, 1991
Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General Model
A description is not available for this item.

References

Advertisement