SW Engineering Terms







Index:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
 

 

 


A

 


C

A model for binary code developed by Microsoft. The Component Object Model (COM) enables programmers to develop objects that can be accessed by any COM-compliant application. Both OLE and ActiveX are based on COM.

 



D

D
 

 


E

E

F
A.

H
U.

 
 
 


I

I


J

A

L
 

M
D



O

O

P

P

 

 


R
D
 
 
 


Stakeholder

An individual who serves as the primary source for some information about requirements. E.g. Business Executive, Marketing, Design, Customer Support

 

 

 

 

hereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. Not as prevalent as SSL.

Servlet

Kind of Java program (extends a Java class, API), that runs on the server and can process CGI requests and return responses (including creation of dynamic HTML). Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java servlet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java servlets makes them faster because there's no wasted time in setting up and tearing down the process.

 

SET

Secure Electronic Transaction, a new standard that will enable secure credit card transactions on the Internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and Mastercard. By employing digital signatures, SET will enable merchants to verify that buyers are who they claim to be. And it will protect buyers by providing a mechanism for their credit card number to be transferred directly to the credit card issuer for verification and billing without the merchant being able to see the number.

SmartCard

A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Authentication (security), Storing a patient's medical records. Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

S/MIME

Secure/MIME, a new version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA's public-key encryption technology.

 

 

SSH

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled. When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords. SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication. Developed by SSH Communications Security Ltd

SSL

Secure Socket Layer. A protocol developed by Netscape for transmitting private documents via the Internet. Actually creates a secure connection over which any amount of encrypted data can be sent. SSL works by using a private key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, Web pages that require an SSL connection start with https: instead of http:.

SQL

Structured Query Language.  Language used by many databases for data manipulation.

 


T

D

V
S
 

XML
Extensible Markup Language. A specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations.
© Lynne Grewe