Category: Technology
Company: Gartner
Created by: consultant
Number of Blossarys: 2
A defined protocol with options applicable for specific functions that can be implemented as a product. Also called a functional standard or functional profile.
Refers to a device’s capability to perform its function independent of the communications protocol.
A network management agent that comes between an unmanaged device and a management system, allowing management by proxy, i.e., on behalf of the device.
Devices that process and filter all Internet Protocol (IP) packets that are directed to them and decide which protocols and services can be served out of their caches. Proxy servers tend to offer the ...
The public half of the asymmetric key pair used in public-key cryptography (see separate entry).
An encryption technique developed to overcome the limitations of secret-key cryptography (see separate entry). Public key (also called “asymmetric key”) cryptography uses two mathematically related ...
Public-key infrastructure (PKI) was developed mainly to support secure information exchanges over unsecure networks. It has been used to ensure that the person identified as sending a transaction is ...