Category: Technology
Company: Gartner
Created by: consultant
Number of Blossarys: 2
Public-key infrastructure (PKI) was developed mainly to support secure information exchanges over unsecure networks. It has been used to ensure that the person identified as sending a transaction is ...
An encryption technique developed to overcome the limitations of secret-key cryptography (see separate entry). Public key (also called “asymmetric key”) cryptography uses two mathematically related ...
The public half of the asymmetric key pair used in public-key cryptography (see separate entry).
Devices that process and filter all Internet Protocol (IP) packets that are directed to them and decide which protocols and services can be served out of their caches. Proxy servers tend to offer the ...
A network management agent that comes between an unmanaged device and a management system, allowing management by proxy, i.e., on behalf of the device.
Refers to a device’s capability to perform its function independent of the communications protocol.
A defined protocol with options applicable for specific functions that can be implemented as a product. Also called a functional standard or functional profile.