23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Assertion Markup<br />

Language (SAML) –<br />

A specification for encoding security assertions in the Extensible<br />

Markup Language (XML).<br />

SOURCE: SP 800-63<br />

A framework for exchanging authentication and authorization<br />

information. <strong>Security</strong> typically involves checking the credentials<br />

presented by a party for authentication and authorization. SAML<br />

standardizes the representation <strong>of</strong> these credentials in an XML format<br />

called “assertions,” enhancing the interoperability between disparate<br />

applications.<br />

SOURCE: SP 800-95<br />

A protocol consisting <strong>of</strong> XML-based request and response message<br />

formats for exchanging security information, expressed in the form <strong>of</strong><br />

assertions about subjects, between online business partners.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Association – A relationship established between two or more entities to enable<br />

them to protect data they exchange.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Attribute – A security-related quality <strong>of</strong> an object. <strong>Security</strong> attributes may be<br />

represented as hierarchical levels, bits in a bit map, or numbers.<br />

Compartments, caveats, and release markings are examples <strong>of</strong><br />

security attributes.<br />

SOURCE: FIPS 188<br />

An abstraction representing the basic properties or characteristics <strong>of</strong><br />

an entity with respect to safeguarding information; typically<br />

associated with internal data structures (e.g., records, buffers, files)<br />

within the information system which are used to enable the<br />

implementation <strong>of</strong> access control and flow control policies; reflect<br />

special dissemination, handling, or distribution instructions; or<br />

support other aspects <strong>of</strong> the information security policy.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

<strong>Security</strong> Authorization – See Authorization.<br />

<strong>Security</strong> Authorization –<br />

(To Operate)<br />

See Authorization (to operate).<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Authorization Boundary – See Authorization Boundary.<br />

Pg 168

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!