Appendix 5

Key terms in secure computing

Attestation identity key

A cryptographic key used when a computer wants a trusted third party to vouch for it. It can vouch for the computer without revealing its identity.

Authorization

The action confirming whether or not a user is allowed to access a resource.

Endorsement key

A pair of cryptographic keys, one private, one public. The private key is built in to the trusted platform module (TPM) when it is manufactured.

Federated access management

The rules and policies giving access to online resources shared by a group of organizations in a federation. Representatives from the organizations in the federation sign an agreement on how details of users and resources are shared. The organizations trust ...

Get Security Risks in Social Media Technologies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.