- المجال: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. Abbreviation for characters per second. Note: Formerly, abbreviation for cycles per second, the unit used to express frequency. However, the hertz (Hz,)an SI unit, is now the internationally accepted unit of frequency. 2. Abbreviation for cellular priority service.
Industry:Telecommunications
1. A transmission channel that may be used to transfer data in a manner that violates security policy. 2. An unintended and/or unauthorized communications path that can be used to transfer information in a manner that violates an information system (IS) security policy. 3. A channel which allows information to flow in violation of the System Security policy. Note: Covert channels can occur via mechanisms other than explicitly designed channels. For example, a covert timing channel may transmit information by inducing variations in system response time. 4. The use of a mechanism not intended for communication to transfer information in a way which violates security. 5. A communications channel that allows a process to transfer information in a manner that violates the system's security policy. A covert channel typically communicates by exploiting a mechanism not intended to be used for communication. 6. A communications channel that allows a process to transfer information in a manner that violates the system's security policy. See also: Covert Storage Channel, Covert Timing Channel.
Industry:Telecommunications
1. A signal, usually a single frequency, transmitted over a communications system for supervisory, control, equalization, continuity, synchronization, or reference purposes. Note: Sometimes it is necessary to employ several independent pilot frequencies. Most radio relay systems use radio or continuity pilots of their own but transmit also the pilot frequencies belonging to the carrier frequency multiplex system. 2. See palm-top.
Industry:Telecommunications
1. A transfer function f which is relatively easy to compute, but for which, for a general value, y , within the selected range, it is computationally difficult to find a value x within the expected domain such that f (x) = y. There may be several values for y , for which finding x is not computationally difficult. 2. A function which is easy to compute but whose inverse is computationally intractable. 3. A (mathematical) function which is easy to compute but whose inverse is computationally intractable.
Industry:Telecommunications
1. A token allowing its holder an access right. Note: Capability-based systems (e.g. PIDs) provide added value in authentication but, since they are not cryptographically secure, cannot replace the password system. 2. As used in the context of security, a form of privilege attribute. It is a token (recognized by a process managing access to security objects) possession of which grants access to the security objects to which the token applies. 3. A privilege attribute used as an identifier for a resource such that possession of the privilege attribute confers access rights for the resource. 4. A token used as an identifier for a resource such that possession of the token confers access rights for the resource.
Industry:Telecommunications
1. A telephone switching system based on the principles of time-division multiplexing of digitized analog signals. Note: An electronic switching system digitizes analog signals from subscribers' loops, and interconnects them by assigning the digitized signals to the appropriate time slots. It may also interconnect digital data or voice circuits. 2. A switching system with major devices constructed of semiconductor components. Note: A semi-electronic switching system that has reed relays or crossbar matrices, as well as semiconductor components, is also considered to be an ESS.
Industry:Telecommunications
1. A systematic method of identifying the assets of a data processing system, the threats to those assets, and the vulnerability of the system to those threats. 2. In COMSEC (communications security,) an organized method of estimating or calculating the probability of compromise. 3. Synonym risk assessment.
Industry:Telecommunications
1. A system with characteristics that comply with specified, publicly maintained, readily available standards and that therefore can be connected to other systems that comply with these same standards. 2. A system that implements sufficient open specifications for interfaces, services, and supporting formats to enable properly engineered applications software: - to be ported with minimal changes across a wide range of systems - to interoperate with other applications on local and remote systems - to interact with users in a style that facilitates user portability.
Industry:Telecommunications
1. A system (a) for generating spread-spectrum transmissions by phase-modulating a sine wave pseudorandomly with a continuous string of pseudonoise code symbols, each of duration much smaller than a bit and (b) that may be time-gated, where the transmitter is keyed periodically or randomly within a specified time interval. 2. A signal structuring technique utilizing a digital code sequence having a chip rate much higher than the information signal bit rate. Each information bit of a digital signal is transmitted as a pseudorandom sequence of chips.
Industry:Telecommunications
1. A subset of access permissions (developed with the use of media-independent data) attesting to, or establishing, the identity of an entity, such as a birth certificate, driver's license, mother's maiden name, social security number, fingerprint, voice print, or other biometric parameter (s. ) 2. , information, passed from one entity to another, used to establish the sending entity's access rights. . 3. Data that serve to establish the claimed identity of a security subjective relative to a given security domain. 4. Data that is transferred to establish the claimed identity of an entity.
Industry:Telecommunications