| < Free Open Study > |
|
KBSs (Knowledge-based Systems), 275-277, 292
Kerberos V5 authentication protocol, 25-26, 52
Kernels, 286, 287
Keyboard shortcuts, 384
Key Distribution Centers (KDC), 152
Keyring trust model, 175-176
Keys, 47, 187, 189
centralized vs. decentralized management, 176-177
database relational keys, 265, 271
destruction of, 179
escrow and, 178-179
expiration, 179
Key Distribution Centers (KDCs), 152
key management systems, 176-181, 183
multiple key pairs, 180-181
pass-phrases and, 178
private-key encryption, 19, 149, 155-157, 181, 187
public-key encryption, 19, 125, 149, 181, 189
Public Key Infrastructure (PKI), 168-176
renewal, 179
S / FTP and, 78
storage of, 111, 177-178
symmetric-key encryption, 124, 155-160
usage extensions, 180
weak keys, 45, 156
zeroization, 183
see also Encryption Knowledge-based Systems (KBSs), 275-277
vs. expert systems, 275-276, 292
Neural Networks, 277
| < Free Open Study > |
|