Digital Certificate Operation in a Complex Environment
homebackgroundprojectdocumentsdesignglossary
navigation search
search query:

6. Glossary T - Z

TERENA Trans-European Research and Education Networking Association TERENA carries out technical activities and provides a platform for discussion to encourage the development of a high-quality computer networking infrastructure for the European research community. Formed in October 1994 by the merger of RARE (Réseaux Associés pour la Recherche Européenne) andEARN (European Academic and Research Network). Does work on authentication and LDAP and much much more...
http://www.terena.nl/
Thumbprint AKA message digest See message digest
TIES Technologies for Information Environment Security Project within the same (AAA) programme as DCOCE at/run by EDINA and Edinburgh University Computing Services. One of the aims is to investigate digital certificate verification software.
http://edina.ed.ac.uk/projects/ties/
TLS Transport Layer Security TLS is a secure communications protocol standardised by the IETF. IETF definition: (RFC2246): The TLS protocol provides communication privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. See also SSL.
Top CA IETF definition: "A CA that is at the top of a PKI hierarchy. Note: This is often also called a 'Root CA,' since in data structures terms and in graph theory, the node at the top of a tree is the 'root.' ...These terms are not used consistently throughout the PKIX documents, as the Internet PKI profile [2459bis] uses 'Root CA' to refer to what this and other documents call a 'Top CA' and 'most-trusted CA' to refer to what this and other documents call a 'Root CA.' ".
Triple-DES Triple-Data Encryption Standard Makes DES more secure by using it 3 times with different keys (total key length of 168 bits). Used in SSH.
Trust A measure of how much you believe the honesty and judgement of the person who holds the key. The more you trust a key, the more you trust the person who created the key to certify other people's keys.
Trust anchor See Root CA
TSA Time Stamp Authority IETF definition: "A TSA is a trusted Third Party who provides a 'proof-of-existence' for a particular datum prior to an instant in time".
TSP Time Stamp[ing] Protocol Protocol defined by the PKIX working group to determine how the time stamp field is used. See RFC3161.
Validity An indication of whether you believe that the [digital] key you have in your possession actually belongs to the personto whom it says it belongs. Keys are valid if you created them or they are signed with a key that you trust.
X.509 ITU-T recommendation specifiying aspects of digital certificates and PKI ITU-T Recommendation X.509 specifies the authentication service for X.500 directories, as well as the widely adopted X.509 certificate syntax. The initial version of X.509 was published in 1988, version 2 was published in 1993, and version 3 was proposed in 1994 and considered for approval in 1995. Version 3 addresses some of the security concerns and limited flexibility that were issues in versions 1 and 2.
http://www.ietf.org/rfc/rfc2459.txt
XAP eXtensible Authentication Point Authentication point provided by Athens devolved authentication (AthensDA) "that can be extended and hosted by the institution". The XAP performs authentication in an institution-defined way (e.g. it can use a local LDAP server to look a subject up).
XKMS XML Key Management Specification An open standard under development within the W3C. The goal is to simplify the integration of PKI security services anddigital certificates into Internet applications requiring secure transactions. See W3C XKMS.
Z39.50 In basic terms, Z39.50 is a network protocol which allows searching of (usually remote) heterogeneous databases and retrieval of data, via one user interface. It is most often used for retrieving bibliographic records, although there arealso some non-bibliographic implementations. (Text taken from the UKOLN web site ).
Services such as Zetoc make use of the Z39.50 protocol to make the data searchable and available to remote users.
Zetoc Z39.50-compliant access to the British Library's Electronic Table of Contents Managed by MIMAS, Zetoc is the name of the project that gives access to the British Library table of contents Users can search the Zetoc database for relevant entries, or they can register for Zetoc alerts (to alert the researcher tonew publications in the relevant areas).

Up: Contents Previous: 5. Glossary R - S

Oxford University Computing Services Mimas Athens access management services Oxfore e-Science Centre Systems and Electronic Resources Service Joint Information Systems Committee