upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. In cryptography, a certificate subject that (a) uses its private key for purposes other than signing certificates, or (b) uses its public key for purposes other than signing certificates. 2. The subject of the final certificate in a certification path, i.e., that subject which is not a certificate authority.
Industry:Telecommunications
1. In CRT displays, the difference in brightness between the lightest and the darkest element of a scene or its display. 2. Of a CRT or other display device, the ratio of (a) the maximum brightness that is (or can be) displayed to (b) the minimum brightness that is (or can be) displayed.
Industry:Telecommunications
1. In COMSEC, a countermeasure that generates spurious data in transmission media to make traffic analysis or decryption more difficult. 2. In reliability techniques, see pilot-make-busy circuit. 3. Generation of spurious communications or data units to disguise the amount of real data units being sent. 4. The generation of spurious instances of communication, spurious data units and/or spurious data within data units.
Industry:Telecommunications
1. In computer technology, the state or condition of a device or equipment that is not under the direct control of another device. 2. In computer technology, the status of a device that is disconnected from service.
Industry:Telecommunications
1. In computer systems, a permanent communications link that connects directly to a mainframe computer through a terminal controller, usually at binary synchronous (bi-sync) transmission rates. 2. In computer systems, a temporary connection between a microcomputer, i.e., a desktop workstation, and a host bulletin board system or server.
Industry:Telecommunications
1. In computer security, an error of commission, an omission, or an oversight that allows protection mechanisms to be bypassed or disabled. 2. An error of commission, omission, or oversight in an information system (IS) that may allow protection mechanisms to be bypassed. Synonym loophole. 3. An error of commission, omission, or oversight in a system that allows protection mechanisms to be bypassed.
Industry:Telecommunications
1. In computer security, an entity that is trusted by at least two entities to create and assign attribute certificates. 2. An authority recognized in a security domain as a trusted source of attributes for entities within the domain. (See also Subject Authority. )
Industry:Telecommunications
1. In computer or data processing technology, the privilege (or capability) of reading electronically the information in a file or data base, without the privilege (or capability) to modify it. Synonym read-only access. 2. Permission to read information in an information system (IS. ) 3. Permission to read information.
Industry:Telecommunications
1. In computer conferencing, a set of sequential messages containing closely related information. Synonyms discussion thread, followup. 2. A single flow of control within a process.
Industry:Telecommunications
1. In computer conferencing, a set of sequential messages containing closely related information. Synonyms discussion thread, followup. 2. A single flow of control within a process.
Industry:Telecommunications