Difference between revisions of "Credential"
Karl Jones (Talk | contribs) |
Karl Jones (Talk | contribs) (→External link) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
== Examples == | == Examples == | ||
− | Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on. | + | Examples of credentials include academic diplomas, academic degrees, certifications, [[security]] clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on. |
Sometimes publications, such as scientific papers or books, may be viewed as similar to credentials by some people, especially if the publication was peer reviewed or made in a well-known journal or reputable publisher. | Sometimes publications, such as scientific papers or books, may be viewed as similar to credentials by some people, especially if the publication was peer reviewed or made in a well-known journal or reputable publisher. | ||
Line 18: | Line 18: | ||
* [[Computer security]] | * [[Computer security]] | ||
+ | * [[Exploit (computer security)]] | ||
* [[Information system]] | * [[Information system]] | ||
+ | * [[Open standard]] | ||
* [[Password]] | * [[Password]] | ||
+ | * [[Security]] | ||
+ | * [[Technical standard]] | ||
+ | * [[System]] | ||
== External link == | == External link == | ||
* [https://en.wikipedia.org/wiki/Credential Credential] @ Wikipedia | * [https://en.wikipedia.org/wiki/Credential Credential] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Information]] | ||
+ | [[Category:Security]] |
Latest revision as of 07:45, 20 April 2016
A credential is an attestation of qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so.
Examples
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
Sometimes publications, such as scientific papers or books, may be viewed as similar to credentials by some people, especially if the publication was peer reviewed or made in a well-known journal or reputable publisher.
Information systems credentials
Information systems commonly use credentials to control access to information or other resources.
The classic combination of a user's account number or name and a secret password is a widely used example of credentials.
An increasing number of information systems use other forms of documentation of credentials, such as biometrics (fingerprints, voice recognition, retinal scans), X.509, public key certificates, and so on.
See also
- Computer security
- Exploit (computer security)
- Information system
- Open standard
- Password
- Security
- Technical standard
- System
External link
- Credential @ Wikipedia