Browse Prior Art Database

Internet Security Glossary (RFC2828)

IP.com Disclosure Number: IPCOM000003426D
Original Publication Date: 2000-May-01
Included in the Prior Art Database: 2000-Sep-13

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Shirey: AUTHOR

Abstract

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with Internet security, particularly Internet Standards documents (ISDs). To avoid confusion, ISDs should use the same term or definition whenever the same concept is mentioned. To improve international understanding, ISDs should use terms in their plainest, dictionary sense. ISDs should use terms established in standards documents and other well-founded publications and should avoid substituting private or newly made-up terms. ISDs should avoid terms that are proprietary or otherwise favor a particular vendor, or that create a bias toward a particular security technology or mechanism versus other, competing techniques that already exist or might be developed in the future.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 1% of the total text.

Network Working Group R. Shirey

Request for Comments: 2828 GTE / BBN Technologies

FYI: 36 May 2000

Category: Informational

Internet Security Glossary

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2000). All Rights Reserved.

Abstract

This Glossary (191 pages of definitions and 13 pages of references)

provides abbreviations, explanations, and recommendations for use of

information system security terminology. The intent is to improve the

comprehensibility of writing that deals with Internet security,

particularly Internet Standards documents (ISDs). To avoid confusion,

ISDs should use the same term or definition whenever the same concept

is mentioned. To improve international understanding, ISDs should use

terms in their plainest, dictionary sense. ISDs should use terms

established in standards documents and other well-founded

publications and should avoid substituting private or newly made-up

terms. ISDs should avoid terms that are proprietary or otherwise

favor a particular vendor, or that create a bias toward a particular

security technology or mechanism versus other, competing techniques

that already exist or might be developed in the future.

Table of Contents

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2

2. Explanation of Paragraph Markings . . . . . . . . . . . . . . 4

2.1 Recommended Terms with an Internet Basis ("I") . . . . . . 4

2.2 Recommended Terms with a Non-Internet Basis ("N") . . . . 5

2.3 Other Definitions ("O") . . . . . . . . . . . . . . . . . 5

2.4 Deprecated Terms, Definitions, and Uses ("D") . . . . . . 6

2.5 Commentary and Additional Guidance ("C") . . . . . . . . . 6

3. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 6

4. References . . . . . . . . . . . . . . . . . . . . . . . . . . 197

5. Security Considerations . . . . . . . . . . . . . . . . . . . 211

6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 211

7. Author's Address . . . . . . . . . . . . . . . . . . . . . . . 211

8. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 212

1. Introduction

This Glossary provides an internally consistent, complementary set of

abbreviations, definitions, explanations, and recommendations for use

of terminology related to i...