upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In reception using heterodyning in the tuning process, the ratio of (a) the intermediate-frequency (IF) signal level produced by the desired input frequency to (b) that produced by the image frequency. Note 1: The image rejection ratio is usually expressed in dB. Note 2: When the image rejection ratio is measured, the input signal levels of the desired and image frequencies must be equal for the measurement to be meaningful. Synonym image frequency rejection ratio.
Industry:Telecommunications
In security, a user who may, according to an organization's security policy, perform an operation.
Industry:Telecommunications
In security, a segment of time, generally expressed in days or weeks, during which specified access rights prevail.
Industry:Telecommunications
In security, a resource or information that is to be protected. 2. Any system or component (e.g., subsystem, hardware, firmware, software, database, or interconnection communications network or facility) that is part of a communications system or an information system.
Industry:Telecommunications
In security, a relationship between requirements such that one requirement must be satisfied before others can meet their own objectives.
Industry:Telecommunications
In security, a profile that associates each user with a list of protected objects that the user may access. 2. Associates each user with a list of protected objects the user may access.
Industry:Telecommunications
In security, a hardware, software, or firmware feature, operating procedure, or management procedure that (a) permits authorized access to a system, such as a communications, computer, and data processing system, (b) prevents unauthorized access to the system, and (c) is considered to have failed when unauthorized access is permitted or when authorized access is prevented. 2. A Security safeguard designed to detect and deny unauthorized access and permit authorized access in an information system (IS. )
Industry:Telecommunications
In security systems, a process of using two or more separate individuals (or entities,) operating together (but with split knowledge) to protect sensitive functions or information so that no single person is able to access or use the materials (such as a cryptographic key. )
Industry:Telecommunications
In secure systems, an authorization certificate that indicates the security restrictions on documents and transactions that an entity may authorize.
Industry:Telecommunications
In secure systems, a permutation of the bits in a byte or other data unit, which permutation is used to increase redundancy during the signature process.
Industry:Telecommunications