- المجال: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. In dial-pulse signaling, that portion of the dial pulse in which the network applies a low resistance between the tip and ring conductors at the network interface (NI. ) 2. In dial-pulse signaling, that portion of the dial pulse in which the pulsing circuit is in its low-impedance condition.
Industry:Telecommunications
1. In data transmission, the sequence of contiguous bits delimited by, and including, beginning and ending flag sequences. Note 1: A frame usually consists of a specified number of bits between flag sequences and usually includes an address field, a control field, and a frame check sequence. Note 2: Frames usually consist of a representation of the original data to be transmitted, together with other bits which may be used for error detection or control. Additional bits may be used for routing, synchronization, or overhead information not directly associated with the original data. 2. In the multiplex structure of pulse-code modulation (PCM) systems, a set of consecutive time slots in which the position of each digit can be identified by reference to a frame-alignment signal. Note: The frame-alignment signal does not necessarily occur, in whole or in part, in each frame. 3. In a time-division multiplexing (TDM) system, a repetitive group of signals resulting from a single sampling of all channels, including any required system information, such as additional synchronizing signals. Note: "In-frame" is the condition that exists when there is a channel-to-channel and bit-to-bit correspondence, exclusive of transmission errors, between all inputs of a time-division multiplexer and the output of its associated demultiplexer. 4. In ISDN, a block of variable length, labeled at the Data Link Layer of the Open Systems Interconnection--Reference Model. 5. In video display, the set of all picture elements that represent one complete image. Note: In NTSC and other television standards used throughout the world, a frame consists of two interlaced fields, each of which has half the number of scanning lines, and consequently, half the number of pixels, of one frame. 6. In video display, one complete scanned image from a series of video images. Note: A video frame is usually composed of two interlaced fields. 7. In computer screen displays of HTML documents, a portion (usually rectangular) of the screen where one usually finds the same types of fields/information displayed, in the same manner as one usually finds the same or similar information displayed in the same segment of different copies of a printed form. 8. An HTML feature that allows multiple Web pages to be viewed simultaneously (by means of scrolling or re-sizing) through a browser window.
Industry:Telecommunications
1. In computer or data processing technology, the privilege (or capability) of reading electronically the information in a file or data base, without the privilege (or capability) to modify it. Synonym read-only access. 2. Permission to read information in an information system (IS. ) 3. Permission to read information.
Industry:Telecommunications
1. In data communications, a sequence of signals, noise, or interference counted as a unit in accordance with some specific criterion or measure. 2. To separate continuous-form or multipart paper into discrete sheets.
Industry:Telecommunications
1. In data communication, a sequence of binary digits, including data and control signals, that is transmitted and switched as a composite whole. Note: The data, control signals, and possibly error control information, are arranged in a specific format. 2. The fundamental unit of communication on the Internet.
Industry:Telecommunications
1. In cryptosystems, the denial by one of the entities involved in a communication of having participated in all or part of the communication. 2. Denial by one of the entities involved in a communication of having participated in all or part of the communication.
Industry:Telecommunications
1. In cryptosystems, a functional unit that can simultaneously process data of two or more security levels without risk of compromising computer security. 2. A device that is used in a manner that permits it to simultaneously process data of two or more security levels without risk of compromise. To accomplish this sensitivity labels are normally stored on the same physical medium and in the same form (i.e., machine-readable or human-readable) as the data being processed.
Industry:Telecommunications
1. In cryptology and cryptosystems, that characteristic allowing one entity to assume that a second entity will behave exactly as the first entity expects. Note: Trust may apply only for some specific function. The critical role of trust in the authentication framework is to describe the relationship between an authenticating entity and a certification authority; an authenticating entity must be certain that it can trust the certification authority to create only valid and reliable certificates. 2. Reliance upon Security Measures to uphold the Security policy. Note: The term is not synonymous with "trustworthy". The trustworthiness of trusted items may be established (e.g. By evaluation) at a later stage. 3. A relationship between two elements, a set of activities and a security policy in which element X trusts element Y if and only if X has confidence that Y will behave in a well defined way (with respect to the activities) that does not violate the given security policy. 4. Confidence, that may be based on assurances which are outside the scope of this Report, that an entity to which trust is applied, will perform in a way that will not prejudice the security of the user of the system of which that entity is a part. Trust is always restricted to specific functions or ways of behavior (e. G. , "trusted to connect A to B properly". )Trust is meaningful only in the context of a security policy: an entity may be trusted in the context of one policy but untrusted in the context of another policy.
Industry:Telecommunications
1. In cryptography, the public key and the identity of an entity, with other information, rendered unforgeable by digitally signing the entire information with the private key of the issuing certification authority. Synonym digital certificate. 2. A record holding security information about an information-system (IS) user and vouches to the truth and accuracy of the information it contains. 3. Security data sealed by an Authority. The certificate contains the security data and the seal.
Industry:Telecommunications
1. In cryptography, an entity whose public key is certified in a public key certificate. 2. Generally, a person, process, or device, causing information to flow among objects or change to the system state. 3. An active entity, generally in the form of a person, process, executing program or device that causes information to flow among objects or changes the system state. Examples: process, executing program. See also: Object. 4. Abbreviation of security subject. 5. An active entity, generally in the form of a person, process, or device. 6. An active entity that causes information to flow between objects or changes the system state; a process. 7. An active entity, generally in the form of a person, process, or device that causes information to flow among objects or changes the system state. Technically, a process/domain pair.
Industry:Telecommunications