Difference between revisions of "Resource Integrity"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== The ability of the receiver to determine that a received resource has not be tampered with before it is used. ==Context== * Where a digital device is d...")
 
(Context)
Line 5: Line 5:
 
* Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration.
 
* Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration.
 
* This is also known a tamper evident protection.
 
* This is also known a tamper evident protection.
 
+
==Problems==
 +
==Solutions==
 +
===Sub Resource Integrity===
 +
* SRI for the browser is
  
 
==References==
 
==References==
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 21:10, 2 May 2022

Full Title or Meme

The ability of the receiver to determine that a received resource has not be tampered with before it is used.

Context

  • Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration.
  • This is also known a tamper evident protection.

Problems

Solutions

Sub Resource Integrity

  • SRI for the browser is

References