No resource would be complete without a comprehensive glossary of terms. We’ve compiled a list of terms and their definitions to better help you navigate.
Publish-Subscribe Pub-Sub is a style of inter-application communications. Publishers are able to broadcast data to a community of information users or subscribers, which have issued the type of information they wish to receive (normally defining topics or subjects of interest). An application or user can be both a publisher and subscriber. The Process Router to Trading Network Agent interaction can be considered as a pub-sub form of communications where the agent registers the subscriber and the process router is the publisher.
Publication The data source grants visibility of item, party and partner profiles, including party capabilities data to a given list of parties (identified by their GLNs) or to all parties in a given market.
Public key encryption Encryption that uses a key pair of mathematically related encryption keys. The public key can be made available to anyone who wishes to use it and can encrypt information or verify a digital signature; the private key is kept secret by its holder and can decrypt information or generate a digital signature. This permits users to verify each other's messages without having to securely exchange secret keys.
Public key The mathematical value of an asymmetric key pair that is shared with trading partners. The public key works in conjunction with the private key to encrypt and decrypt data. For example, when the public key is used to encrypt data, only the private key can successfully decrypt that data.
Process Router A specialized networking device that automates the execution of specific business process(es) and appropriate routing and or transformation algorithm(s), given a business document.
Private key The mathematical value of an asymmetric key pair that is not shared with trading partners. The private key works in conjunction with the public key to encrypt and decrypt data. For example, when the private key is used to encrypt data, only the public key can successfully decrypt that data. See secret-key.
Point-of-Sale (POS) Place where the purchase is made at the checkstand or scanning terminals in a retail store. The acronym 'POS' frequently is used to describe the sales data generated at checkout scanners. The relief of inventory and computation of sales data at a time and place of sale, generally through the use of bar coding or magnetic media equipment.
Plaintext Unencrypted data; intelligible data that can be directly acted upon without decryption.
PKI Public Key Infrastructure. A system of CAs, RAs, directories, client applications, and servers that model trust. The Internet Engineering Task Force (IETF)'s X.509 standard is the de-facto standard by which public keys can be managed on a secure basis. See CA and RA.
PGP Pretty Good Privacy is a security system used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route.
Persistent Queue In contrast to perishable queues, persistence refers to a message queue that resides on a permanent device, such as a disk, and can be recovered in case of system failure or relatively (from a computer processing cycle perspective) long process or idle duration.
Party A party (or) location is any legal, functional or physical entity involved at any point in any supply chain and upon which there is a need to retrieve pre-defined information (GDAS definition). A party is uniquely identified by a EAN/UCC Global Location Number (GLN).