1

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 12:40, 16 October 2014 by Mdpeters (talk | contribs) (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Footnote 1

For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).