CAST, 90
CCTA Risk Analysis and Management Methodology, 371
center-based key distribution, 120
Central Computer and Telecommunications Agency (CCTA), 371
certificate, 337
Certificate Discovery Protocol, 239
certificate policy, 346
certificate practice statement (CPS), 346
certificate repository, 345
certificate request message format, 346
certificate revocation, 348
certificate revocation list (CRL), 346, 350
certificate revocation system (CRS), 352
certificate revocation tree (CRT), 352
certificate-based key distribution, 122
certification authority (CA), 93, 338
certification chain, 95
certification path, 95
Challenge Handshake Authentication Protocol (CHAP), 212
challenge-response mechanism, 116
Chaos Computer Club, 198
cipher block chaining, 88, 235
cipher feedback, 88
circuit-level gateway, 138, 161, 171
claimant, 112
client, 5
client-server model, 5
closed user group (CUG), 219
club de la sécurité informatique francais, 372
cnlab Software AG, 319
collision resistant, 85
commercial off-the-shelf (COTS), 321
committee draft, 28
common authentication technology, 304
common client interface, 292
common criteria, 192
Common Management Information Protocol (CMIP), 79
common object request broker architecture (CORBA), 169
communication compromise, 9
communication security, 4
computational security, 82
computer network, 4
Computer Operations, Audit, and Security Technology (COAST), 139
computer security, 4
Computer Security Institute (CSI), xix
Computer Security Products Buyers Guide, xix
Computer Systems Research Group, 14
connection confidentiality service, 73
connection integrity service, 74
connectionless confidentiality service, 73
connectionless integrity service, 74
cookie exchange, 237
Coordinating Committee for Multilateral Export Controls, 104
Council of the European Union, 106
countermeasure, 9
cryptographic algorithm, 82
cryptographic file system, 294
cryptographic hash function, 85
cryptographic message syntax, 347
cryptographic protocol, 82, 107
cryptography, 81
cumulative trust model, 94
Team-Fly |