Skip to content
SynAc
Browse

Acronyms

Alphabetical index of published acronym entries. Acronym slugs are lowercase in URLs.

  1. AAUpdated Jan 06, 2026

    See: Deprecated Usage under "attribute authority".

  2. AADUpdated Jan 06, 2026

    The input data to the authenticated encryption function that is authenticated but not encrypted.

  3. AALUpdated Jan 06, 2026

    A category describing the strength of the authentication process.

  4. AARUpdated Jan 06, 2026

    A document containing findings and recommendations from an exercise or a test.

  5. ABACUpdated Jan 06, 2026

    An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy defined) correlation can be made between the attributes of that object and of the requesting subject.

  6. ACUpdated Jan 06, 2026

    The process of granting or denying specific requests to 1) obtain and use information and related information processing services and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).

  7. ACCUpdated Jan 06, 2026

    See: access control center.

  8. ACESUpdated Jan 06, 2026

    See: Access Certificate for Electronic Services.

  9. ACLUpdated Jan 06, 2026

    A list of entities, together with their access rights, that are authorized to have access to a resource.

  10. ACMUpdated Jan 06, 2026

    Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.

  11. ACMEUpdated Jan 06, 2026

    A protocol defined in IETF RFC 8555 that provides for the automated enrollment of certificates.

  12. ACPUpdated Jan 06, 2026

    High level requirements that specify how access is managed and who may access information under what circumstances.

  13. ADUpdated Jan 06, 2026

    Input data to the CCM generation encryption process that is authenticated but not encrypted.

  14. AESUpdated Jan 06, 2026

    AES stands for Advanced Encryption Standard, a widely used symmetric key block cipher standardized by NIST.

  15. AHUpdated Jan 06, 2026

    See: Authentication Header

  16. AIaaSUpdated Jan 06, 2026

    a cloud based service offering artificial intelligence (AI) outsourcing

  17. ALCUpdated Jan 06, 2026

    See: accounting legend code.

  18. ANSIUpdated Jan 06, 2026

    See: American National Standards Institute.

  19. anti-CSRFUpdated Jan 06, 2026

    related pairs of tokens given to users to validate their requests and prevent issue requests from attackers via the victim

  20. APIUpdated Jan 06, 2026

    See: application programming interface.

  21. APOPUpdated Jan 06, 2026

    See: POP3 APOP.

  22. ARPANETUpdated Jan 06, 2026

    Advanced Research Projects Agency (ARPA) Network, a pioneer packet switched network that (a) was designed, implemented, operated, and maintained by BBN from January 1969 until July 1975 under contract to the U.S. Government; (b) led to the development of today's Internet; and (c) was decommissioned in June 1990. [B4799, Hafn]

  23. ASCIIUpdated Jan 06, 2026

    See: American Standard Code for Information Interchange.

  24. ASN.1Updated Jan 06, 2026

    See: Abstract Syntax Notation One.

  25. ATISUpdated Jan 06, 2026

    See: "Alliance for Telecommunications Industry Solutions" under "ANSI".

  26. AUTHUpdated Jan 06, 2026

    See: POP3 AUTH.