MSDN Home >  MSDN Library >  Win32 and COM Development >  Security >  Security Glossary
 
Security Glossary

T

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

T=0 protocol
An asynchronous, character-oriented half-duplex transmission protocol.
T=1 protocol
An asynchronous, block-oriented half-duplex transmission protocol.
terminal
A combination of monitor, keyboard, mouse, and co-located peripherals, such as smart card readers. Multiple processes may be associated with a single terminal, but only one process controls the terminal at any given time.
three-phase key-exchange protocol
A protocol used to generate an authenticated and encrypted connection between two users on a nonsecure network. Users exchange a set of messages to negotiate a pair of encryption keys. One key is used by the sender to encrypt messages sent to the receiver and the other is used by the receiver to encrypt messages sent to the sender. This protocol ensures that both users are active and are sending messages directly to each other.
thumbprint
The SHA-1 hash of a certificate.
TLS
See Transport Layer Security protocol.
token
See access token.
transaction
An operation that allows you to perform multiple interactions as a single operation. Intermediate steps are not actually taken until all interactions are completed successfully. If any interaction fails, all steps are returned to their original setting.
transport layer
The network layer that is responsible for both quality of service and accurate delivery of information. Among the tasks performed in this layer are error detection and correction.
Transport Layer Security protocol
(TLS) A protocol that provides communications privacy and security between two applications communicating over a network.
triple DES
A variation of the DES block cipher algorithm that encrypts plain text with one key, encrypts the resulting ciphertext with a second key, and finally, encrypts the result of the second encryption with a third key. Triple DES is a symmetric algorithm that uses the same algorithm and keys for encryption and decryption.
trustee
The user account, group account, or logon session to which an access control entry (ACE) applies. Each ACE in an access control list (ACL) applies to one trustee.

See also access control entry and access control list.

trust list
See certificate trust list.
trust provider
The software that decides whether a given file is trusted. This decision is based on the certificate associated with the file.

Send comments about this topic to Microsoft


© 2006 Microsoft Corporation. All rights reserved. Terms of Use |Trademarks |Privacy Statement
Microsoft