Search Keyword By: O

Description

OAM

Operations, Administration, and Maintenance

OAM&P

Operations, Administration, Maintenance, and Provisioning

OAMP

Operate, Administer, Maintain, and Provision

object

1. In image processing, a sub-region of an image that is perceived as a single entity. Note: An image can contain more than one object. 2. In facsimile systems, the image, the likeness of which is to be transmitted. 3. [A] Passive entity containing or receiving information. Access to an object implies access to the information it contains. [INFOSEC-99]4. A passive entity within a system that contains or receives information [CESG].Examples: records, blocks, pages, segments, files, etc.Note: [1] Access to an object implies potential access to the information it contains.[2] An entity (e.g. a program) may be both a subject and an object. Which it is depends on consideration of the type of access in which it participates.[3] The range of valid objects is restricted by the available types of operations that can be performed, e.g. read, write, execute, etc.See also: Subject.5.Abbreviation of security object [ECMATR46].6.A passive entity that contains or receives information [ITSEC].7.A passive entity that contains or receives information. Access to an object potentially implies access to the information that it contains. Examples of items that may be considered objects are: records, blocks, pages, segments, files, directories, directory trees, and programs, as well as bits, bytes, words, fields, processors, video displays, keyboards, clocks, printers, network nodes, etc[POSIX.6].8.A passive entity that contains or receives information. Access to an object potentially implies access to the information it contains. Examples of objects are: records, blocks, pages, segments, files, directories, directory trees and programs, as well as bits, bytes, words, fields, processors, video displays, keyboards, clocks, printers, network nodes, etc [TCSEC].

object oriented

1. Pertaining to, or characteristic of, a computer program consisting of (a) many relatively small, simple programs (subroutines), and (b) one monitor program, the function of which is to coordinate the exchange of data among the subroutines. Note: Subroutines designed under this concept may be stored in object libraries, and used by other computer programmers with similar functional requirements. 2. Pertaining to, or characteristic of, data to be processed by object-oriented programs. Note 1: Each data object in an object-oriented program may have multiple attributes associated with it. For example, if a data object were defined as a person, several appropriate attributes might be the person’s birth date, social security number, and eye color. Note 2: The data and its attributes are considered as one object as they pass between subroutines. Note 3: Objects with similar attributes are considered as a particular class of objects. For example, “people” would be one class of objects and “automobiles” could be another, because the objects in the “automobiles” class are likely to have a completely different set of attributes associated with them.

object persistence

In a video display, distortion wherein the entirety of some object (or objects) that appeared in a previous frame (and that should no longer appear) remain in the current frame and in subsequent frames as a faded image or as an outline.

object retention

In a video display, distortion in which a fragment of an object that appeared in a previous frame (and should no longer appear) remains in the current and subsequent video frames.

object reuse

1.Reassignment and re-use of a storage medium containing one or more objects after ensuring no residual data remains on the storage medium. [INFOSEC-99]2.Reuse of a storage medium for a different object [CESG].Note: [1] A vulnerability may exist if the medium contains residual data from a previous object.[2] This is now the accepted term, despite the fact that it is the storage medium, not the object, that is reused.See also: Purge.3.The reassignment to some subject of a medium (e.g., page frame, disk sector, magnetic tape) that contained one or more objects. To be securely reassigned, such media must contain no residual data from the previously contained object(s) [TCSEC].

obsolete

In cryptography, pertaining to the state of a key that must no longer be used either to transmit information from the originator or to process received secure information. [After X9.17]

Total Count: 297