Multitech MultiAccess MA30120 User Manual page 168

Communications server
Hide thumbs Also See for MultiAccess MA30120:
Table of Contents

Advertisement

Glossary
particular HTML element once, and then use it over and over on any number of Web pages. To change how an
element looks, you just change the style; the element automatically changes wherever it appears. (Before CSS,
you had to change the element individually, each time it appeared.) Style sheets let Web designers more
quickly create consistent pages and more consistent web sites.
Browsers began supporting the first CSS Specification, Cascading Style Sheets, Level 1 (CSS1), in versions
3.0 of Opera and Microsoft Internet Explorer and in version 4.0 of Netscape Navigator. The 4.0 and later
versions of all three browsers also support properties from the newer Cascading Style Sheets, Level 2 (CSS2)
specification, which let you specify elements' visibilities, their precise positions on the page, and how they
overlap each other.
– A cryptographically signed object that contains an identity and a public key associated with the
Certificate
identity. Public key certificates are digital stamps of approval for electronic security. The three main
characteristics of certificates are: 1) provide identification of the web site and the owner, 2) contain the public
key to be used to encrypt and decrypt messages between parties, and 3) provide a digital signature from the
trusted organization that issued the certificate, as well as when the certificate expires.
– The issuer of a certificate is the Certificate Authority (CA). The CA is the party that
Certificate Authority
digitally signs a certificate and ensures its validity. There are two types of CAs, private and public. Private CAs
issue certificates for use in private networks where they can validate the certificate. Public CAs issues
certificates for servers that belong to the general public. A Public CA must meet certain requirements before
they are added as a root authority to a browser. Since this is a controlled process, all public CA must be
registered to issue certificates.
– A log of certificates that have been revoked before their expiration date.
Certificate Revocation List
– An encryption/decryption algorithm.
Cipher
– Encrypted data.
Ciphertext
– A common way to describe the paradigm of many network protocols. Examples include
Client-Server Model
the name-server/name-resolver relationship in DNS and the file-server/file-client relationship in NFS.
– An IETF standard for authentication using PPP
CHAP (Challenge Handshake Authentication Protocol)
which uses a "random Challenge", with a cryptographically hashed "Response" which depends on the
Challenge and a secret key.
– A client is a program that communicates with a server via a network, so as to use the service provided
Client
by that server. Example: Netscape is a www client, with the help of which one can call up information from a
www server.
– Applications based on the client-server principle use a client program (client) at the
Client-Server Principle
user-end that exchanges information with a server on the network. Usually the server is responsible for the data
keeping, while the client takes over the presentation of this information and the interaction with the user. For
this, the server and the client employ an exactly defined protocol. All the important applications in the Internet
(e.g. www, FTP, news) are based on the client-server principle.
– A protocol defining the online interactions between the end entities
CMP (Certificate Management Protocol)
and the certification authority in PKI. It is written by PKIX working group of IETF and is specified in document
RFC 2510.
– The unintended disclosure or discovery of a cryptographic key or secret.
Compromise
– Certificate Revocation List.
CRL
– The art and science of using mathematics to secure information and create a high degree of
Cryptography
trust in the networking realm. See also public key, secret key.
– The form used to obtain a certificate from a CA. A CSR generates a
CSR (Certificate Signing Request)
formatted certification. This request is located on the web site of all certificate authorities. Another way to
generate a CSR is to use a utility such as Microsoft IIS or OpenSSL.
– The unit of transmission at the ISO Network layer (such as IP). A datagram may be encapsulated
Datagram
in one or more packets passed to the data link layer. A datagram is a self-contained, independent entity of data
carrying sufficient information to be routed from the source to the destination computer without reliance on
earlier exchanges between this source and destination computer and the transporting network.
MultiAccess Communications Server MA30120 User Guide
168

Advertisement

Table of Contents
loading

Table of Contents