1: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Footnote 1= For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More spe...) |
|||
Line 1: | Line 1: | ||
==Footnote 1= | ==Footnote 1== | ||
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). | For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication). |
Revision as of 15:21, 3 April 2007
Footnote 1
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).