upload
Alliance for Telecommunications Industry Solutions
Industri: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. The linking together of interoperable systems. 2. The linkage used to join two or more communications units, such as systems, networks, links, nodes, equipment, circuits, and devices.
Industry:Telecommunications
1. The physical axis of a directional antenna. 2. To align a directional antenna, using either an optical procedure or a fixed target at a known location.
Industry:Telecommunications
1. The person responsible for performing the day-to-day and periodic maintenance of a computer forum. 2. An individual responsible for the physical operations of a network or of a computer system.
Industry:Telecommunications
1. The person or organization that purchases a Target of Evaluation. 2. The corroboration that the source of data received is as claimed.
Industry:Telecommunications
1. The overall principles, regulations, requirements, and/or procedures which govern security as expressed by a responsible security authority: Examples: National security policy, Departmental security policy. Note: Responsibility for security may be delegated by Departmental Security Officers to System Managers in accordance with a System Security Policy. 2. A set of rules that specify the procedures and mechanisms required to maintain the security of a system, and the security objects and the security subjects under the purview of the policy. 3. A set of rules which define and constrain the types of security- relevant activities of entities. 4. The set of criteria for the provision of security services (see also identity-based and rule-based security policy. ) Note: A complete security policy will necessarily address many concerns which are outside the scope of OSI. 5. See Corporate Security Policy, System Security Policy, Technical Security Policy. 6. The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. 7. The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.
Industry:Telecommunications
1. The overall length of time required to establish a circuit-switched call between users. 2. For data communication, the overall length of time required to establish a circuit-switched call between terminals; i.e., the time from the initiation of a call request to the beginning of the call message. Note: Call set-up time is the summation of: (a) call request time--the time from initiation of a calling signal to the delivery to the caller of a proceed-to-select signal; (b) selection time--the time from the delivery of the proceed-to-select signal until all the selection signals have been transmitted; and (c) post selection time--the time from the end of the transmission of the selection signals until the delivery of the call-connected signal to the originating terminal.
Industry:Telecommunications
1. The method, act, process, or effect of using a device or system. 2. A well-defined action that, when applied to any permissible combination of known entities, produces a new entity, e.g., the process of addition in arithmetic--in adding 5 and 3 to obtain 8, the numbers 5 and 3 are the operands, the number 8 is the result, and the plus sign is the operator indicating that the operation performed is addition. 3. A program step, usually specified by a part of an instruction word, that is undertaken or executed by a computer. Note: Examples of operations include addition, multiplication, extraction, comparison, shift, transfer. 4. The process of using a Target of Evaluation.
Industry:Telecommunications
1. The Mechanism by which a person using a terminal can communicate directly with the trusted computing base (TCB. ) Trusted path can only be activated by the person or the TCB and cannot be imitated by untrusted software. 2. A mechanism by which a user can communicate directly with a trusted function. Example: A trusted path is required when a user changes his password. 3. A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person or the Trusted Computing Base and cannot be imitated by untrusted software.
Industry:Telecommunications
1. The measures used to provide physical protection of resources against deliberate and accidental threats. 2. See communications security.
Industry:Telecommunications
1. The maximum possible information transfer rate through a channel, subject to specified constraints. 2. The rate at which information may be transmitted through a channel. Note: Usually measured in bits per second.
Industry:Telecommunications