upload
Alliance for Telecommunications Industry Solutions
Industrie: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
An association of an abstract syntax with a transfer syntax.
Industry:Telecommunications
An asymmetric cryptographic algorithm whereby (a) messages encrypted using the public key can only be decrypted by using the private key, and (b) data that are encrypted using the private key can only be decrypted by using the public key.
Industry:Telecommunications
An asynchronous terminal that (a) does not use a transmission control protocol and (b) sends or receives data sequentially one character at a time. Note: Dumb terminals usually handle ASCII characters.
Industry:Telecommunications
An asynchronous transfer mode in which the maximum information transfer capacity of a telecommunication service is provided throughout a call.
Industry:Telecommunications
An atmospheric duct consisting of a high-density air layer that starts at high altitudes and continues upward or remains at high altitudes, thus affecting primarily very-high-frequency (VHF) transmission.
Industry:Telecommunications
An attempt to break a code or to find a key using analytical methods. Note: Examples of an analytical attack are: a statistical analysis of patterns; a search for flaws in an encryption algorithm. Synonym cryptanalytical attack.
Industry:Telecommunications
An Attempt to gather information about an information system (IS) or its users.
Industry:Telecommunications
An attempt to terminate a telecommunications system access. Note: Disengagement attempts may be initiated by a user or the telecommunications system.
Industry:Telecommunications
An attempt to violate computer security. Note: An example of an attack is malicious logic. 2. An intentional act of attempting to bypass one or more of the following security controls of an information system (IS) : nonrepudiation, authentication, integrity, availability, or confidentiality.
Industry:Telecommunications
An attribute describing the special arrangement for transferring information between two or more access points; it completes the structure associated with a telecommunication service as it associates the relationship between the access points involved and the flow of information between these access points. Values associated with this attribute are point-to-point, multipoint, and broadcast.
Industry:Telecommunications