Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Non-Repudiation

Cybersecurity Measures for E-Government Frameworks
Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data (Harris, 2002 AU16: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Published in Chapter:
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Maurice Dawson (Illinois Institute of Technology, USA) and Damon Walker (University of Missouri, Saint Louis, USA)
Copyright: © 2022 |Pages: 11
DOI: 10.4018/978-1-7998-9624-1.ch006
Abstract
The Economic Community of West African States is an economic region located in West Africa. This region has a population of over 349 million and representation for approximately 15 countries. With the explosion of technological advances in agriculture, healthcare, and personal device use, cybersecurity has become an important issue. Coupled with dictatorships, corrupt regimes, religious extremists, and other illicit activities, it is imperative that cybersecurity become a cornerstone in local governments to ensure the safety of citizens. This chapter reviews recent literature that surrounds West African states to present an argument on why cybersecurity must be considered essential for local governments. Observations and interviews were conducted at a government facility concerning its security posture as it relates to physical and cybersecurity. This activity included interviews with senior government officials and employees to understand the state of affairs at the organization.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
Or inalienable, it is a security service closely related to authentication, and that allows to prove the participation of the parties in a communication. For example, when someone has sent us a message if they are who they say they are.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Forensics and Cyber Attacks
Non-repudiation is the assurance that someone cannot deny the validity of something.
Full Text Chapter Download: US $37.50 Add to Cart
Security Improvements for Safer Cross-Border E-Health Services in Europe
The security service by which the entities involved in a communication cannot deny having participated. Specifically the sending entity cannot deny having sent a message (non-repudiation with proof of origin) and the receiving entity cannot deny having received a message (non-repudiation with proof of delivery).
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study in the Role of Trust in Web Service Securities
Protects the providers, requesters, and brokers in Web services via acknowledgment procedures.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Ad Hoc Network and Computing Paradigms
An assurance that a node cannot deny its authenticity of signing or sending any message that they have originated.
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Also known as authenticity the ability to state that an entity was involved in a communication exchange or prove that an entities credentials are genuine based on the trust established between two entities or using a trusted third entity. Non-repudiation is a mechanism for insuring the relationship of entities involved in the communications channel as a security service.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Methods behind Cyber Terrorism
Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data (Harris, 2002 AU33: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Intelligence and Security Informatics
Non-repudiation is verification that ensures that the sender cannot deny that he or she sent, or is responsible for sending, a message
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Management and Information Technology Security Services
Prevents the receiver or originator of the transactions from denying that the transaction was received or sent.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
Mechanisms to ensure that the client (customer) can be certain he is communicating with the genuine server (bank) or vice versa, such that neither of the communicating parties can later falsely deny that the transaction took place.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Security Issues in VANETS for E-Business
Ensures that a transferred information has been sent and received by the parties claiming to have sent and received the information.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Fog Computing
It refers to an assurance that sender and receiver cannot refuse that sender has not sent message and receiver has not received message.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication
The ability to ensure a party cannot deny to be the author of a specific action (e.g. writing, sending, storing) an a specific object (e.g. a document, a network packet, a server, …). This can also be seen as an authenticated traceability.
Full Text Chapter Download: US $37.50 Add to Cart
An Analysis of Cryptographic Algorithms in IoT
Non-repudiation is the assurance that someone cannot deny the validity of something. In other words, it makes very difficult to successfully deny who (or where) a message came from as well as the authenticity of that message.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR