Search results

Term entries in the full glossary starting with the letter "S"

W3C Glossaries

Showing results 21 - 40 of 235

schema, RDF schema

From Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 (2004-01-15) | Glossary for this source

An RDF Schema denotes resources which constitute the particular unchanging versions of an RDF vocabulary at any point in time. It is used to provide information (such as organization and relationship) about the interpretation of the statements in an RDF data model. It does not include the values associated with the attributes.
schema-aware XSLT processor

From XSL Transformations (XSLT) 2.0 (2007-01-23) | Glossary for this source

A schema-aware XSLT processor is an XSLT processor that implements all the mandatory requirements of this specification, including those features that a basic XSLT processor signals as an error. The mandatory requirements of this specification are taken to include the mandatory requirements of XPath 2.0, as described in . A requirement is mandatory unless the specification includes wording (such as the use of the words should or may) that clearly indicates that it is optional.
schema-determined ID

From XPointer Framework (2003-03-25) | Glossary for this source

An element or attribute information item is a schema-determined ID if and only if one of the following is true:
scheme

From XPointer Framework (2003-03-25) | Glossary for this source

A specialized pointer data format that has a name and is defined in a specification.
scope of a declaration

From Mathematical Markup Language (MathML) Version 2.0 (2001-02-21) | Glossary for this source

The portion of a MathML document in which a particular definition is active.
screen magnifier

From Web Content Accessibility Guidelines 1.0 (1999-05-05) | Glossary for this source

A software program that magnifies a portion of the screen, so that it can be more easily viewed. Screen magnifiers are used primarily by individuals with low vision.
screen reader

From Web Content Accessibility Guidelines 1.0 (1999-05-05) | Glossary for this source

A software program that reads the contents of the screen aloud to a user. Screen readers are used primarily by individuals who are blind. Screen readers can usually only read text that is printed, not painted, to the screen.
scribe

From Glossary of W3C Jargon (2003-03-11) | Glossary for this source

n. A person designated to record and publish the proceedings of a meeting. v. To record and publish the proceedings of a meeting.
script

From Voice Extensible Markup Language (VoiceXML) Version 2.0 (2004-03-16) | Glossary for this source

A fragment of logic written in a client-side scripting language, especially ECMAScript , which is a scripting language that must be supported by any VoiceXML interpreter .
script

From User Agent Accessibility Guidelines 1.0 (2002-12-17) | Glossary for this source

In this document, the term "script" almost always refers to a scripting (programming) language used to create dynamic Web content. However, in checkpoints referring to the written (natural) language of content, the term "script" is used as in Unicode [UNICODE] to mean "A collection of symbols used to represent textual information in one or more writing systems."Information encoded in (programming) scripts may be difficult for a user agent to recognize. For instance, a user agent is not expected to recognize that, when executed, a script will calculate a factorial. The user agent will be able to recognize some information in a script by virtue of implementing the scripting language or a known program library (e.g., the user agent is expected to recognize when a script will open a viewport or retrieve a resource from the Web).
secondary resource

From Architecture of the World Wide Web, Volume One (2004-12-15) | Glossary for this source

A resource related to another resource through the primary resource with additional identifying information (the fragment identifier).
security

From Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 (2004-01-15) | Glossary for this source

Describes a set of procedures applied to data communications to ensure that information is transferred exactly as the sender and receiver intend, and in no other way. Security generally breaks down into Integrity, Authentication, Confidentiality and Privacy.
security administration

From Web Services Glossary (2004-02-11) | Glossary for this source

Configuring, securing and/or deploying of systems or applications enabling a security domain.

security architecture

From Web Services Glossary (2004-02-11) | Glossary for this source

A plan and set of principles for an administrative domain and its security domains that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat environment. A complete security architecture for a system addresses administrative security, communication security, computer security, emanations security, personnel security, and physical security, and prescribes security policies for each. A complete security architecture needs to deal with both intentional, intelligent threats and accidental threats. A security architecture should explicitly evolve over time as an integral part of its administrative domain's evolution. [RFC 2828]

security auditing

From Web Services Glossary (2004-02-11) | Glossary for this source

A service that reliably and securely records security-related events producing an audit trail enabling the reconstruction and examination of a sequence of events. Security events could include authentication events, policy enforcement decisions, and others. The resulting audit trail may be used to detect attacks, confirm compliance with policy, deter abuse, or other purposes.

security domain

From Web Services Glossary (2004-02-11) | Glossary for this source

An environment or context that is defined by security models and a security architecture, including a set of resources and set of system entities that are authorized to access the resources. One or more security domains may reside in a single administrative domain. The traits defining a given security domain typically evolve over time. [RFC 2828]

security mechanism

From Web Services Glossary (2004-02-11) | Glossary for this source

A process (or a device incorporating such a process) that can be used in a system to implement a security service that is provided by or within the system.

security model

From Web Services Glossary (2004-02-11) | Glossary for this source

A schematic description of a set of entities and relationships by which a specified set of security services are provided by or within a system. [RFC 2828]

security policy

From Web Services Glossary (2004-02-11) | Glossary for this source

A set of rules and practices that specify or regulate how a system or organization provides security services to protect resources. Security policies are components of security architectures. Significant portions of security policies are implemented via security services, using security policy expressions. [RFC 2828]

security policy expression

From Web Services Glossary (2004-02-11) | Glossary for this source

A mapping of principal identities and/or attributes thereof with allowable actions. Security policy expressions are often essentially access control lists. [STG]


The Glossary System has been built by Pierre Candela during an internship in W3C; it's now maintained by Dominique Hazael-Massieux

Copyright © 2000-2003W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark, document use and software licensing rules apply. Your interactions with this site are in accordance with our public and Member privacy statements.