Term | Definition |
bridge trust model | a trust model with one CA that acts as a facilitator to interconnect all other CAs |
certificate authority | a trusted third party agency that is responsible for issuing digital certificates |
certificate repository | a publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate |
certificate revocation list | a repository that lists revoked digital certificates |
certificate signing request | a specially formatted encrypted message that validates the information the ca requires to issue a digital certificate |
cipher suite | a named combination of the encryption authentication and message authentication coe algorithms that are used with SSL and TLS |
digital certificate | a technology used to associate a user's identity to a public key in which the user's public key is digitally signed by a trusted third party |
direct trust | a type of trust model in which a relationship exists between two individuals because one person knows the other person |
distributed trust model | a trust model that has multiple CAs that sign digital certificates |
hierarchical trust model | a trust model that has a single hierarchy with one master CA |
hypertext transport protocol secure | a secure version of HTTP sent over SSL or TLS |
internet protocol security | a set of protocols developed to support the secure exchange of packets between hosts or networks |
key escrow | a process in which keys are managed by a third party, such as a trusted CA |
key recovery agent | a highly trusted person responsible for recovering lost of damaged digital certificates |
online certificate status protocol | a protocol that performs a real time look-up of a certificate's status |
public key infrastructure | a framework for managing all of the entities involved in creating, storing, distributing and revoking digital certificates |
registration authority | a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users |
secure shell | a Linux/UNIX-based command interface and protocol for securely accessing a remote computer |
secure sockets layer | a protocol originally developed by Netscape for securely transmitting data |
session keys | symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server |
thid party trust | a trust model in which two individuals trust each other because each individually trusts a third party |
transport layer security | a protocol that is more secure than SSL and guarantees privacy and data integrity between applications |
trust model | the type of trust relationship that can exist between individuals of entities |