security protocol

Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms.

security protocol

A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem (see below). For example, the 802.11i standard provides these functions for wireless LANs.

On the Web, TLS and SSL are widely used to provide authentication and encryption in order to send credit card numbers and other private data to a vendor. Following are the primary components of a security protocol. See cryptography, information security, PCT and IPsec.

Access Control
Authenticates user identity. Authorizes access to specific resources based on permissions level and policies. See access control and authentication.

Encryption Algorithm
The cryptographic cipher combined with various methods for encrypting the text. See encryption algorithm, HTTPS and TLS.

Key Management
Create, distribute and maintain the keys. See key management.

Message Integrity
Ensures that the encrypted message has not been tampered with. See message integrity.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
"I was going to offer Friday prayers with my children when security protocol of Maryam Nawaz stopped us.
If order was given to allow security protocol and perks and privileges to former interior minister Rehman Malik, he questioned.
'Its purpose is to have an announcement of security protocols in case of emergencies, disasters, and others during big events in the city, especially those in the enclosed areas.'
Questions have been raised about Pakistan Tehreek-i-Insaf leaders being assigned large security protocols despite the Pakistan Tehreek-i-Insaf government's austerity drive, and the party's own opposition to the previous government's VIP protocols.
A United spokesperson said: "We will be responding to the UEFA charge and we are reviewing our pitchside security protocols in the light of the pitch incursions."
In anticipation of receiving a green signal from security protocol, Hussain waited outside before he eventually left the place without meeting the PTI chairman.
Summary: California [United States], August 14 (ANI): Mozilla has announced that its Firefox browser now supports the Transport Layer Security or TLS 1.3 security protocol out-of-the-box.
On Thursday, the CJP directed police chiefs of all provinces to withdraw within 24 hours the security protocol provided to influential individuals not entitled to official security.
Juba "However, a review of the church's security protocol has commenced and the church is working with the police on the investigation into the incident."
Responding to Congress leader Mallikarjun Kharge's allegation that last week's stone pelting incident in Gujarat could have killed Rahul, Home Minister Rajnath Singh said the Congress vice president has violated the security protocol on several occasions in India and abroad.
In the proposed methodology, our main objective is to formally specify, analyze, verify and validate the wireless protected access version-2 (WPA2) security protocol. The purpose of this research is to develop a framework for the use of formal methods in the specification, verification and validation of wireless network security protocols.
After approving the protocol, the National People's Congress Standing Committee declared that no security protocol or treaty will undermine the status of the NWFZ, and all explanations and applications of the clauses in the protocol shall support the goal of the building of the NWFZ in Central Asia.

Full browser ?