← Všechny kategorie   
Vybraná kategorie: Fundamental Concepts and Foundations
Terminology

abstract service primitive

Associated Standards: ISO 13143-2
Terminology

abstract test method

Associated Standards: ISO 13143-2
Terminology

abstract test suite

Associated Standards: ISO 13140-1
Terminology

examination that a product, process, or service is in conformity with the system specification

examination that a product, process, or service is in conformity with the system specification

Terminology

admittance, entry, permit to use the road network and/or associated infrastructure (bridges, tunnels etc.)

admittance, entry, permit to use the road network and/or associated infrastructure (bridges, tunnels etc.)

Terminology

prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner

prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner

Associated Standards: EN ISO 24534-2
Terminology

list of entities, together with their access right, which are authorized to have access to a resource

list of entities, together with their access right, which are authorized to have access to a resource

Associated Standards: EN ISO 24534-2
Terminology

data source governing what access to resources is permissible by peer Applications

data source governing what access to resources is permissible by peer Applications

Application Area: Cooperative systems
Terminology

conditions for use apply for which permission in writing is required

conditions for use apply for which permission in writing is required

Application Area: Traffic and Travel Information
Terminology

threat of a deliberate unauthorized change to the state of the system
EXAMPLE: Examples of security-relevant active threats may include modification of messages, replay of messages, and insertion of spurious messages, masquerading as an authorized entity and denial of service.

threat of a deliberate unauthorized change to the state of the system
EXAMPLE: Examples of security-relevant active threats may include modification of messages, replay of messages, and insertion of spurious messages, masquerading as an authorized entity and denial of service.

Associated Standards: EN ISO 24534-4
Terminology

Advanced Encryption Standard

Associated Standards: CEN TS 16439
Terminology

process by which personal information (PI) is irreversibly altered in such a way that an Individual or a legal entity can no longer be identified directly or indirectly either by the controller alone or in collaboration with any other party

process by which personal information (PI) is irreversibly altered in such a way that an Individual or a legal entity can no longer be identified directly or indirectly either by the controller alone or in collaboration with any other party

Application Area: ITS Architecture
Associated Standards: CEN TR 16742
Terminology

personal information that has been subject to a process of anonymisation and that by any means can no longer be used to identify an Individual or legal entity

personal information that has been subject to a process of anonymisation and that by any means can no longer be used to identify an Individual or legal entity

Application Area: ITS Architecture
Terminology

security requirements to assure confidence in the implementation of functional requirements

security requirements to assure confidence in the implementation of functional requirements

Associated Standards: CEN ISO TS 17574
Terminology

attempt to destroy, expose, alter, disable, steal or gain unauthorised access to or make use of an asset

attempt to destroy, expose, alter, disable, steal or gain unauthorised access to or make use of an asset

Associated Standards: CEN TS 16439
Terminology

granting of rights, which includes the granting of access based on access rights

granting of rights, which includes the granting of access based on access rights

Associated Standards: EN ISO 24534-4
Terminology

authorization authority

Associated Standards: ČSN ISO 15638-3, ČSN ISO 15638-1
Terminology

behaviour invalid

Associated Standards: ISO TS 16401-1, ISO 13143-2
Terminology

behaviour valid

Terminology

binary coded decimal

Application Area: eSafety (eCall)
Terminology

family of functions and their inverse functions that is parameterized by cryptographic keys
NOTE 1 to entry: The functions map bit strings of a fixed length to bit strings of the same length.

family of functions and their inverse functions that is parameterized by cryptographic keys
NOTE 1 to entry: The functions map bit strings of a fixed length to bit strings of the same length.

Application Area: Traffic and Travel Information
Terminology

algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity

algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity

Application Area: Traffic and Travel Information
Terminology

Bounded Secured Managed Entity

Application Area: Communications
Terminology

canonical octet encoding rules

Application Area: Cooperative systems
Terminology

certificate policy

Application Area: Cooperative systems
Terminology

signed list indicating a set of certificates that are no longer considered valid by the certificate issuer

signed list indicating a set of certificates that are no longer considered valid by the certificate issuer

Associated Standards: CEN TS 16439
Terminology

certificate trust list

Application Area: Cooperative systems
Terminology

certification point of contact

Application Area: Cooperative systems
Terminology

certification practice statement

Application Area: Cooperative systems
Terminology

cipher block chaining

Application Area: Traffic Control Systems

Filtering by Type

Filtering by Application Area