Netscape MANAGEMENT SYSTEM 6.2 - ADMINISTRATOR Administrator's Manual page 854

Table of Contents

Advertisement

intermediate CA A CA whose certificate is located between the root CA and the
issued certificate in a certificate chain.
IP spoofing The forgery of client IP addresses.
JAR file A digital envelope for a compressed collection of files organized
according to the Java archive (JAR) format.
Java archive (JAR) format A set of conventions for associating digital signatures,
installer scripts, and other information with files in a directory.
Java Cryptography Architecture (JCA) The API specification and reference
developed by Sun Microsystems for cryptographic services. See
http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec
.
.html#Introduction
Java Development Kit (JDK) Software development kit provided by Sun
Microsystems for developing applications and applets using the Java
programming language.
Java Native Interface (JNI) A standard programming interface that provides
binary compatibility across different implementations of the Java Virtual Machine
(JVM) on a given platform, allowing existing code written in a language such as C
or C++ for a single platform to bind to Java. See
.
http://java.sun.com/products/jdk/1.2/docs/guide/jni/index.html
Java Security Services (JSS) A Java interface for controlling security operations
performed by Netscape Security Services (NSS).
KEA See Key Exchange Algorithm (KEA).
key A large number used by a cryptographic algorithm to encrypt or decrypt
data. A person's public key, for example, allows other people to encrypt messages
intended for that person. The messages must then be decrypted by using the
corresponding private key.
key exchange A procedure followed by a client and server to determine the
symmetric keys they will both use during an SSL session.
Key Exchange Algorithm (KEA) An algorithm used for key exchange by the US
Government.
854
Netscape Certificate Management System Administrator's Guide • June 2003

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.2

Table of Contents