user
nounid
4577·updated May 9, 2026candidate
An individual or a process (subject) acting on behalf of the individual that accesses a cryptographic module in order to obtain cryptographic services.
Classifications
Entity Type
Identity95%llm-generatedllm:claude-haiku-4-5
Sensitivity
unclassified
Information Class
unclassified
Variants
- synonym
- information system user
- alternatephrasing
- UserUsers
- plural
- usersUserses
- possessive
- user'sUsers's
- pluralpossessive
- users'Userses'
Framework definitions
- §1
- A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.
- §1
- This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.
- §1
- This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.
- §1
- This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.
- §1
- This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.
- §1
- Individual or (system) process authorized to access an information system.
- §2 · sense_2_pending_review
- Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
- §3 · sense_3_pending_review
- An individual or a process (subject) acting on behalf of the individual that accesses a cryptographic module in order to obtain cryptographic services.
- §1
- Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
- §1
- Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
- §1
- Individual or (system) process authorized to access an information system.
- §1
- An individual or a process (subject) acting on behalf of the individual that accesses a cryptographic module in order to obtain cryptographic services.
- §1
- Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
- §1
- A person, organization, or other entity which requests access to and uses the resources of a computer system or network.
- §1
- individual or group that interacts with a system or benefits from a system during its utilization
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.