upload
Alliance for Telecommunications Industry Solutions
行业: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. An Internet program or a UNIXTM command that displays personal information ( e.g., full name, address, company name, phone number, e-mail address, and log-in status) for an account holder, which information is also used by an Internet network information center (InterNIC) to enable users to identify the existence of a given domain name or the owner of a given domain name. 2. The name of a variety of white pages used within the Internet.
Industry:Telecommunications
1. An intelligent network element that interfaces between customer access lines and digital facilities. 2. The digital loop carrier (DLC) multiplexer that is at the end of the DLC that is closest to the network interface (NI. )
Industry:Telecommunications
1. An initiator that is capable of initiating interactions on objects, which is not acting on behalf of, or by proxy, of another object. A Principal can be either a human user or an active object. 2. An entity whose identity can be authenticated.
Industry:Telecommunications
1. An information systems (IS) mode of operation wherein each user with direct or indirect access to a system, its peripherals, remote terminals, or remote hosts has all of the following: (a) valid security clearance for the most restricted information processed in the system; (b) formal access approval and signed nondisclosure agreements for that information which a user is to have access; and (c) valid need-to-know for information which a user is to have access. 2. A system operating in this mode is one whose users are all cleared for all the data stored on and/or processed by it, but who only need to have, and are only given, access to some of that data. A. K. A. Compartmented security mode.
Industry:Telecommunications
1. An information system (IS) security mode of operation wherein each user, with direct or indirect access to the information system (IS,) its peripherals, remote terminals, or remote hosts, has all of the following: (a) valid security clearance for all information within an IS; (b) formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs); and (c) valid need-to-know for some of the information contained within the IS. 2. A system operating in this mode is one whose users are all cleared for and have access to all the information stored on and/or processed by it, but not all of whom actually need to know about all of the data. See also: Dedicated Security Mode, Multilevel Security Mode, and Compartmented Security Mode.
Industry:Telecommunications
1. An information system (IS) employing sufficient hardware and software assurance measures to allow simultaneous processing of a range of classified or sensitive information. 2. A data processing system that provides sufficient computer security to allow for concurrent access to data by users with different access rights and to data with different security classification and security categories. 3. A system that employs sufficient hardware and software integrity measures to allow its use for processing simultaneously a range of sensitive or classified information.
Industry:Telecommunications
1. An informal presentation of a formal security policy model. 2. An informal presentation of a formal security policy model. 3. A logically precise distillation of all or part of a System Electronic Information Security Policy, developed to avoid ambiguities and inconsistencies and to form a sound basis for subsequent stages of the development of a system. Note: A Security Policy Model may be formal (i.e. Based on principles of mathematics. )
Industry:Telecommunications
1. An independent and impartial national organization that performs certification. 2. The Certification Body for the UK Evaluation and Certification Scheme is a joint CESG/DTI operation under a Scheme Management Board. Its principal role is to carry out the certification of the results of all evaluations of systems and products carried out under the auspices of the UK Scheme and to deal with other nations on the mutual recognition of such certificates.
Industry:Telecommunications
1. An implementation-defined relation between the values of MAC labels or Information Labels which satisfies partial order algebraic property. 2. Security level S1 is said to dominate security level S2 if the hierarchical classification of S1 is greater than or equal to that of S2 and the non-hierarchical categories of S1 include all those of S2 as a subset.
Industry:Telecommunications
1. An essential technical requirement for items, materials, or services, including the procedures to be used to determine whether the requirement has been met. Note: Specifications may also include requirements for preservation, packaging, packing, and marking. 2. An official document intended primarily for supporting procurement, which document clearly and accurately describes the essential technical requirements for items, materials, or services, including the procedures by which it will be determined that the requirements have been met. Note: An example of a Federal specification is FIPS-PUB 159, Detail Specification for 62. 5- m Core Diameter/125- m Cladding Diameter Class Ia Multimode Optical Fibers. 3. A document that prescribes, in a complete, precise, verifiable manner, the requirements, design, behavior, or characteristics of a system or system component.
Industry:Telecommunications
© 2024 CSOFT International, Ltd.