Overview#
Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of data to unauthorized entities[1]Confidentiality is a Facet Of Building Trust
Confidentiality implies the data is confidential
More Information#
There might be more information for this subject on one of the following:- A Low Infrastructure Public Key Mechanism Using SPKM
- AES-GCM
- Accountable vs responsible
- Application Layer Security
- Attacker
- Authenticated Encryption
- Authenticated Encryption with Associated Data
- Authenticated Protected Channel
- Best Practices for LDAP Security
- Block Cipher Mode
- Burrows Abadi Needham logic
- CIA
- CRAM-MD5 SASL Mechanism
- Certificate
- Certificate Level Of Assurance
- Channel Binding
- Computational Hardness Assumption
- Confidential
- Cryptography Objectives
- CurveCP
- Data Classification
- Data Security Impact
- Domain Name System Security Extensions
- Domain Validated Certificate
- Draft-behera-ldap-password-policy
- EAX
- Electronic Code Book
- Encryption
- Encryption And Hashing
- End-to-End Communications
- FIPS 199
- Galois-Counter Mode
- HHSOCR
- Health Insurance Portability and Accountability Act
- Homomorphic Encryption
- How To Crack SSL-TLS
- Identity Token
- Incident Management
- Information security
- Informed Pull
- Internet Protocol Security
- JWT Data Exchange
- Key Deletion
- Key Encrypting Key
- Key Management
- LDAP Result Codes
- Login_hint_token
- Messaging Layer Security
- NIST.SP.800-122
- OAuth 2.0 Bearer Token Usage
- OAuth 2.0 JWT Secured Authorization Request
- OAuth 2.0 Message Authentication Code (MAC) Tokens
- OAuth 2.0 Security Considerations
- OAuth Confidential Client
- OAuth Public Client
- Organization Validated Certificate
- Passive attacker
- Privacy
- Public Key Infrastructure Weaknesses
- Public data
- Quality of Protection
- SAML Holder of Key
- SAML V2.0
- SASL
- SOC 2
- SSL-TLS Interception
- Same Origin Policy
- Sarbanes-Oxley Act
- Secret
- Secure connection
- Security
- Security Strength Factor
- Security Token
- Session
- Simple Authentication
- Symmetric Key Cryptography
- Terms Of Engagement
- Transport Layer Security
- Transport-layer Security Mechanism
- Trust
- Trust No One
- Trusted Execution Environment
- U-Prove
- Unfortunate event
- Vulnerability
- Webtask
- Why Use Tokens
- [#1] - Confidentiality
- based on information obtained 2015-03-08