- 行业: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. A method of changing a key-enciphering key so as to confirm the identities of the originator and the ultimate recipient. 2. The registration of data with a trusted third party that allows the later assurance of the accuracy of its characteristics such as content, origin, time and delivery.
Industry:Telecommunications
1. A message that (a) is sent in the forward direction and the backward direction, (b) contains a circuit-released signal or circuit-released acknowledgment signal, and (c) usually contains an indication of whether the message is in the forward or the backward direction. 2. A message in plain language, i.e., not enciphered.
Industry:Telecommunications
1. A memory in which data, under normal conditions, can only be read. Synonym nonerasable storage. 2 A storage area in which the contents can be read but not altered during normal computer processing.
Industry:Telecommunications
1. A mechanism intended to ensure the identity of an entity by means of an information exchange. 2. A mechanism intended to ensure the identity of an entity by means of information exchange. 3. Authentication exchange A sequence of one or more transfers of exchange authentication information (AI) for the purposes of performing an authentication.
Industry:Telecommunications
1. A measure of the fineness or coarseness of definition and implementation of a System Security policy. 2. The relative fineness or coarseness by which a mechanism can be adjusted. The phrase "the granularity of a single user" means the access control mechanism can be adjusted to include or exclude any single user.
Industry:Telecommunications
1. A measure of the effectiveness of a security mechanism to prevent a breach of the System Security policy, assuming it has been correctly implemented. 2. An aspect of the assessment of the effectiveness of a Target of Evaluation, namely the ability of its security mechanisms to withstand direct attack against deficiencies in their underlying algorithms, principles and properties.
Industry:Telecommunications
1. A means of restricting access to objects based on the identity and need-to-know of users and/or groups to which the object belongs. Controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (directly or indirectly) to any other subject. Synonym surrogate access. . 2. Access control based on access rights granted by users other than the System Security Officer. Note: Normally enforced by reference to the identity of users and the groups to which they belong. A subject with an access right may pass it to another subject, unless a. Prevented by Mandatory Access Control or b. Constrained from so doing by an explicit System Security Policy (perhaps backed up by audit. ) 3. A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control. ) 4. A means of restricting access to objects. The restrictions are discretionary in the sense that the subjects granted/denied access, and the type of access granted/denied, are at the discretion of the object owner. In many systems, the controls are also discretionary in the sense that a subject with a certain access permission is capable of passing that permission on to any other subject.
Industry:Telecommunications
1. A means based upon the OSI–Reference Model to support applications in telecommunications networks. 2. Protocol functions and procedures that control non-circuit related information exchange among signaling points in SS7 networks. It provides a general purpose approach to the introduction of new services within a network as well as a framework for service architecture for providing internetwork services. Transaction capabilities includes the application layer protocol called transaction capabilities application part (TCAP) as well as the supporting Presentation, Session, and Transport layers called the application service part (ASP. )
Industry:Telecommunications
1. A mathematically precise statement of a system security policy. Some formal modeling techniques include: state transition models, temporal logic models, denotational semantics models, and algebraic specification models. 2. A mathematically precise statement of a security policy. To be adequately precise, such a model must represent the initial state of a system, the way in which the system progresses from one state to another, and a definition of a "secure" state of the system. To be acceptable as a basis for a TCB, the model must be supported by a formal proof that if the initial state of the system satisfies the definition of s "secure" state and if all assumptions required by the model hold, then all future states of the system will be secure. Some formal modeling techniques include: state transition models, temporal logic models, denotational semantics models, algebraic specification models. An example is the model described by Bell and LaPadula in reference. See also: Bell-LaPadula Model, Security Policy Model.
Industry:Telecommunications
1. A mathematical function that maps values from a large (or very large) domain into a smaller range, and that reduces a potentially long message into a "message digest" or "hash value" or that is sufficiently compact to be input into a digital signature algorithm. Note: A "good" hash function is one that results from applying the function to a (large) set of values that are evenly (and randomly) distributed over the range. 2. A function that maps values from a (possibly very) large set of values to a smaller range of values. 3. A (mathematical) function which maps values from a (possibly very) large set of values into a smaller range of values.
Industry:Telecommunications