The supervision and control of the process, usually in accordance with a security policy, by which cryptographic keys are generated, stored, protected, distributed, applied, archived, revoked and destroyed.
Context Categories:
Back to Dictionary