1: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Footnote 1= For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More spe...) |
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
==Footnote 1= | ==Footnote 1== | ||
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). | For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). |
Latest revision as of 12:40, 16 October 2014
Footnote 1
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).