Showing results 21 - 40 of 235
previous 20 results next 20 resultsFrom Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 (2004-01-15) | Glossary for this source
From XSL Transformations (XSLT) 2.0 (2007-01-23) | Glossary for this source
From XPointer Framework (2003-03-25) | Glossary for this source
From XPointer Framework (2003-03-25) | Glossary for this source
From Mathematical Markup Language (MathML) Version 2.0 (2001-02-21) | Glossary for this source
From Web Content Accessibility Guidelines 1.0 (1999-05-05) | Glossary for this source
From Web Content Accessibility Guidelines 1.0 (1999-05-05) | Glossary for this source
From Glossary of W3C Jargon (2003-03-11) | Glossary for this source
From Voice Extensible Markup Language (VoiceXML) Version 2.0 (2004-03-16) | Glossary for this source
From User Agent Accessibility Guidelines 1.0 (2002-12-17) | Glossary for this source
From Architecture of the World Wide Web, Volume One (2004-12-15) | Glossary for this source
From Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 (2004-01-15) | Glossary for this source
From Web Services Glossary (2004-02-11) | Glossary for this source
Configuring, securing and/or deploying of systems or applications enabling a security domain.
From Web Services Glossary (2004-02-11) | Glossary for this source
A plan and set of principles for an administrative domain and its security domains that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat environment. A complete security architecture for a system addresses administrative security, communication security, computer security, emanations security, personnel security, and physical security, and prescribes security policies for each. A complete security architecture needs to deal with both intentional, intelligent threats and accidental threats. A security architecture should explicitly evolve over time as an integral part of its administrative domain's evolution. [RFC 2828]
From Web Services Glossary (2004-02-11) | Glossary for this source
A service that reliably and securely records security-related events producing an audit trail enabling the reconstruction and examination of a sequence of events. Security events could include authentication events, policy enforcement decisions, and others. The resulting audit trail may be used to detect attacks, confirm compliance with policy, deter abuse, or other purposes.
From Web Services Glossary (2004-02-11) | Glossary for this source
An environment or context that is defined by security models and a security architecture, including a set of resources and set of system entities that are authorized to access the resources. One or more security domains may reside in a single administrative domain. The traits defining a given security domain typically evolve over time. [RFC 2828]
From Web Services Glossary (2004-02-11) | Glossary for this source
A process (or a device incorporating such a process) that can be used in a system to implement a security service that is provided by or within the system.
From Web Services Glossary (2004-02-11) | Glossary for this source
A schematic description of a set of entities and relationships by which a specified set of security services are provided by or within a system. [RFC 2828]
From Web Services Glossary (2004-02-11) | Glossary for this source
A set of rules and practices that specify or regulate how a system or organization provides security services to protect resources. Security policies are components of security architectures. Significant portions of security policies are implemented via security services, using security policy expressions. [RFC 2828]
From Web Services Glossary (2004-02-11) | Glossary for this source