Index

A P3P Preference Exchange Language (APPEL), 10251026

A priori trust, in ad hoc networks, 787

A3 encryption algorithm, 713, 728

A5 encryption algorithm, 713, 728

ABBYY software, 58

Abraham Lincoln papers (Library of Congress), 51

Absolute delay guarantees, 581582

Absorption, of radio waves, 371

Abstract Syntax notation one (ASN.1), 977. See also ASN.1 distinguished encoding rules (DER)

Abusive language, on bulletin boards, 282

Acceptable use policies, 213, 295

Access

to broadband subscriber files, 781782

defined, 513, 519

to an outgoing mail server, 894

Access categories (AC), 633

Access control(s), 71, 513, 519, 689

as an EDI security mechanism, 181

extranet, 220, 221

with groupware, 114

intranet, 210

with VANs, 182

in wireless communications security, 376377

Access control firewalls, 28

Access control lists (ACLs), 356, 357, 359, 360, 462, 470, 852

Access control service, 425

Access control systems, 6465

ACCESS element, P3P, 1024

Access feedback channel (ACH), 629, 633

Access image, 58

Access management, 64

Access modes

802.11 MAC, 619621

PCF, 621622

Access networks, 480

Access points (APs), 265, 376, 378, 383, 433, 442, 546, 633, 709, 750, 10091011, 1019

in next-generation wireless networks, 735

WLAN, 697

Access provider backbone, in broadband network architecture, 775, 776

Access routers (ARs)

with hierarchical architecture, 745, 746

with MIRAI, 744

with Mobydick, 743

Access security, LAN, 440

Access technologies, MAN and WAN, 447448

Access units (AUs), in broadband ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.