HP P4518A - Traffic Management Server Sa7150 User Manual page 206

Hp e-commerce/xml server accelerator sa7150 - user guide
Hide thumbs Also See for P4518A - Traffic Management Server Sa7150:
Table of Contents

Advertisement

G L O S S A R Y
Cipher
Comparison Operators
Context Node
"Default" XML Keyword
DNS
Element
Flash
Fulfillment Server
HTTP
HTTPS
Inline
IP Address
IP Service
Key Strength
Keypair
196
HP e-Commerce/XML Server Accelerator SA7150 User Guide
Any encryption algorithm, either symmetric or public key, operating
either as a data stream or divided into blocks.
Comparison operators are used in the XML expression components
of XML patterns allow the SA7150 to look for specific values in the
XML data tree. These operators are: =, !, <, >, <=, and >=.
The node that establishes the level within the XML data tree's
hierarchy at which the SA7150 searches for a match when comparing
incoming XML documents to active XML patterns.
Keyword used as an XML pattern's XML expression component to
catch cases not covered by active XML patterns with specific XML
expressions.
Domain Name Server. A mechanism used in the Internet for
translating the names of host computers into addresses.
An object in an XML document, e.g., <name>, <address>, or
<amount>. Elements often contain attributes (see).
Permanent (non-volatile) storage for configuration changes.
A server that stores content used to satisfy user requests.
Hypertext Transfer Protocol: the protocol used between a Web
browser and a server to request a document and transfer its contents.
HTTP exchanged over an SSL-encrypted session.
When the SA7150 is able to process SSL traffic, the Inline LED on
the front panel is lit (blinking or steadily illuminated).
IP
Internet Protocol
A unique identifier for a node on an IP network. Expressed in "dotted
decimal" notation. For example: 10.0.0.1.
A network-accessible, IP-accessible Application Protocol. For
example: HTTP, FTP, and the like.
Key
A public key and private key pair used to encrypt/decrypt messages.
Length, in bits, of keys used in data encryption or authentication. For
example: 56, 128, 512.
Matching public and private keys.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sa7150

Table of Contents