← Všechny kategorie   
Vybraná kategorie: Fundamental Concepts and Foundations
Terminology

data source governing what access to resources is permissible by peer Applications

data source governing what access to resources is permissible by peer Applications

Application Area: Cooperative systems
Terminology

authorization authority

Associated Standards: ČSN ISO 15638-3, ČSN ISO 15638-1
Terminology

canonical octet encoding rules

Application Area: Cooperative systems
Terminology

certificate policy

Application Area: Cooperative systems
Terminology

certificate trust list

Application Area: Cooperative systems
Terminology

certification point of contact

Application Area: Cooperative systems
Terminology

certification practice statement

Application Area: Cooperative systems
Terminology

assurance that equipment or a service behaves within a set of predetermined, declared and accepted parameters

assurance that equipment or a service behaves within a set of predetermined, declared and accepted parameters

Application Area: Cooperative systems
Terminology

support system that enables trusted communications among ITS components and protects data from unauthorized access

support system that enables trusted communications among ITS components and protects data from unauthorized access

Application Area: Cooperative systems
Terminology

core certification authority

Application Area: Cooperative systems
Terminology

cryptographic keys and associated material, either a secret key for a symmetric algorithm, or a private key for an asymmetric algorithm, and the associated public key or certificate

cryptographic keys and associated material, either a secret key for a symmetric algorithm, or a private key for an asymmetric algorithm, and the associated public key or certificate

Application Area: Cooperative systems
Terminology

reference to Cryptomaterial allowing that Cryptomaterial to be used in cryptographic operations, i.e. sign, verify, encrypt, decrypt

reference to Cryptomaterial allowing that Cryptomaterial to be used in cryptographic operations, i.e. sign, verify, encrypt, decrypt

Application Area: Cooperative systems
Terminology

data encryption key

Application Area: Cooperative systems
Terminology

denial-of-service

Application Area: Cooperative systems
Terminology

electronic “identification card” that establishes user credentials when doing business or other transactions
NOTE 1 to entry: This is issued by a certification authority: contains name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the
digital signature of the certificate-issuing authority so that…

electronic “identification card” that establishes user credentials when doing business or other transactions
NOTE 1 to entry: This is issued by a certification authority: contains name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the
digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.

Application Area: Cooperative systems
Terminology

something that draws the attention of a driver away from the driving task and/or divides or confuses the attention of the driver

something that draws the attention of a driver away from the driving task and/or divides or confuses the attention of the driver

Application Area: Cooperative systems
Terminology

elliptic curve digital signature algorithm

Application Area: Cooperative systems
Terminology

elliptic curve integrated encryption scheme

Application Area: Cooperative systems
Terminology

European certificate trust list

Application Area: Cooperative systems
Terminology

hardware security module

Application Area: Cooperative systems
Terminology

information privacy principle

Application Area: Cooperative systems
Terminology

key encryption key

Application Area: Cooperative systems
Terminology

act of providing false or misleading data, operating in such a fashion as to impede other service recipients, or to operate outside of their authorized scope
NOTE 1 to entry: This includes suspicious behaviour as in wrong message types or frequencies, invalid logins and
unauthorized access, or incorrect signed or encrypted messages, etc., either purposeful or unintended.

act of providing false or misleading data, operating in such a fashion as to impede other service recipients, or to operate outside of their authorized scope
NOTE 1 to entry: This includes suspicious behaviour as in wrong message types or frequencies, invalid logins and
unauthorized access, or incorrect signed or encrypted messages, etc., either purposeful or unintended.

Application Area: Cooperative systems
Terminology

misbehaviour reports from system service recipients, as well as other improper system user acts, such as sending wrong message types, invalid logins, unauthorized access, incorrectly signed messages
and other inappropriate system user behaviour

misbehaviour reports from system service recipients, as well as other improper system user acts, such as sending wrong message types, invalid logins, unauthorized access, incorrectly signed messages
and other inappropriate system user behaviour

Application Area: Cooperative systems
Terminology

information from a system user identifying suspicious behaviour from another system user that can be
characterized as misbehaviour

information from a system user identifying suspicious behaviour from another system user that can be
characterized as misbehaviour

Application Area: Cooperative systems
Terminology

national privacy principle

Application Area: Cooperative systems
Terminology

one time password

Application Area: Cooperative systems
Terminology

password authenticated key exchanges

Application Area: Cooperative systems
Terminology

authorization granted to do something (to the ‘Core System’), permissions are granted to system service recipients and operators determining what actions they are allowed to take when interacting with the ‘Core System’

authorization granted to do something (to the ‘Core System’), permissions are granted to system service recipients and operators determining what actions they are allowed to take when interacting with the ‘Core System’

Application Area: Cooperative systems

Filtering by Type

Filtering by Application Area