upload
Alliance for Telecommunications Industry Solutions
المجال: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. The entity that verifies the authenticity of a digital signature. 2. An entity which is or represents the entity requiring an authenticated identity. A verifier includes the functions necessary for engaging in authentication exchanges.
Industry:Telecommunications
1. The diminution, usually expressed in dB, of signal level in a communications medium. 2. The power, usually expressed in watts, consumed or dissipated by a circuit or component without accomplishing useful work or purpose; e.g., heating (hysteresis loss) that occurs in the core of a transformer. 3. In computer security, a quantitative measure of harm or deprivation resulting from a compromise.
Industry:Telecommunications
1. The difference between the limiting frequencies within which performance of a device, in respect to some characteristic, falls within specified limits. 2. The difference between the limiting frequencies of a continuous frequency band. 3. A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, usually expressed in bits per second.
Industry:Telecommunications
1. The detailed waveform of a detected radar echo. Note: Radar signatures may be used to identify or distinguish among objects, i.e., targets, such as aircraft, decoys, missiles with warheads, and chaff. 2. The detailed characteristics of a radar transmission. Note: Radar signatures based upon emission analysis may be used to identify or distinguish among specific radar types.
Industry:Telecommunications
1. The degree to which video and image formats can be sized in systematic proportions for distribution over communications channels of varying capacities. 2. The ease with which software can be transferred from one graduated series of application platforms to another.
Industry:Telecommunications
1. The degree to which a system, subsystem, or equipment is operable and in a committable state at the start of a mission, when the mission is called for at an unknown, i.e., a random, time. Note 1: The conditions determining operability and committability must be specified. Note 2: Expressed mathematically, availability is 1 minus the unavailability. 2. The ratio of (a) the total time a functional unit is capable of being used during a given interval to (b) the length of the interval. Note 1: An example of availability is 100/168 if the unit is capable of being used for 100 hours in a week. Note 2: Typical availability objectives are specified in decimal fractions, such as 0. 9998. 3. Timely, reliable access to data and information services for authorized users. 4. The prevention of denial of service. 5. The property of being accessible and useable upon demand by an authorized entity. 6. The prevention of the unauthorized withholding of information or resources. 7. The property of an object being accessible and usable upon demand by an authorized subject.
Industry:Telecommunications
1. The corroboration that a peer entity in an association is the one claimed. 2. The corroboration that a peer entity in an association is the one claimed.
Industry:Telecommunications
1. The condition existing when data is unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed. 2. The condition in which data are identically maintained during any operation, such as transfer, storage, and retrieval. 3. The preservation of data for their intended use. 4. Relative to specified operations, the a priori expectation of data quality. 5. The property that data has not been altered or destroyed in an unauthorized manner. 6. The state that exists when computerized data is the same as that in the source documents and has not been exposed to accidental or malicious alteration or destruction.
Industry:Telecommunications
1. The concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization. 2. A system operating in this mode is one which stores and/or processes data at various classifications etc, but for which there are users not cleared for or who need to know about all the data and whose access is restricted appropriately. See also: Dedicated Security Mode, System High Security Mode, Compartmented Security Mode.
Industry:Telecommunications
1. The comprehensive evaluation of the technical and nontechnical security features of an IS and other safeguards, made as a part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meets a set of specified security requirements. 2. The issue by the UK Certification Body of a formal statement, based on a review of the conduct and results of an evaluation, of the extent to which; a. Technical security measures meet the Security Requirement for a system, or b. Security claims are upheld by a product. Note: A System Electronic Information Security policy is required as the basis for certification of a system. See also: Accreditation, Confidence, Information Technology Security Evaluation and Certification Scheme. 3. The issue of a formal statement confirming the results of an evaluation, and that the evaluation criteria used were correctly applied. 4. The technical evaluation of a system's security features, made as part of and in support of the approval/accreditation process, that establishes the extent to which a particular computer system's design and implementations meet a set of specified security requirements.
Industry:Telecommunications