Federal Information Processing Standards Publication 186
GPTKB entity
Statements (67)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:government_agency
|
gptkbp:bfsLayer |
2
|
gptkbp:bfsParent |
gptkb:award
|
gptkbp:amended_by |
gptkb:Federal_Information_Processing_Standards_Publication_186-1
gptkb:Federal_Information_Processing_Standards_Publication_186-2 gptkb:Federal_Information_Processing_Standards_Publication_186-3 |
gptkbp:content_type |
technical standard
|
https://www.w3.org/2000/01/rdf-schema#label |
Federal Information Processing Standards Publication 186
|
gptkbp:impact |
information security
|
gptkbp:is_adopted_by |
gptkb:private_sector
|
gptkbp:is_standardized_by |
gptkb:U._S._government
|
gptkbp:objective |
specifies methods for digital signatures
|
gptkbp:published_by |
gptkb:Research_Institute
|
gptkbp:published_year |
gptkb:1994
|
gptkbp:regulatory_compliance |
federal contracts
|
gptkbp:related_to |
gptkb:NIST_Special_Publication_800-56_A
gptkb:NIST_Special_Publication_800-57 gptkb:NIST_Special_Publication_800-90_A gptkb:XMPP_Extension_Protocol gptkb:Certification gptkb:software_framework gptkb:SHA-1 gptkb:SHA-3 gptkb:SHA-2 gptkb:currency gptkb:X.509_certificates cybersecurity data integrity encryption risk management RSA algorithm authentication cloud security data protection digital signatures identity verification incident response key management network security secure communications security audits security training electronic signatures federal regulations secure transactions penetration testing compliance standards privacy laws integrity digital forensics non-repudiation security frameworks secure email software security hardware security vulnerability assessments security awareness programs information assurance mobile security ECDSA algorithm IT security policies secure web transactions Io T security ISO/ IEC standards DSA algorithm |
gptkbp:title |
gptkb:award
|
gptkbp:used_in |
federal agencies
|