No resource would be complete without a comprehensive glossary of terms. We’ve compiled a list of terms and their definitions to better help you navigate.
VPN Virtual Private Networks are logical networks built over a physical network. VPN is used by enterprises to link its customers and business partners via secure Internet connections. The network controls access to the VPN (hence the private aspect) yet shares the core transmission resources with other VPNs or other Internet users. In the Internet world, this is accomplished by using security methods such as packet encryption or packet encapsulation (the VPN packets refer to an addressing scheme for example that are imbedded in the IP packets of the larger, physical network). In long distance VPNs companies had specific dial plans with access control elements. In both cases, however, the company had a network with the security features of a private network and the shared economics of a public network.
Verify (digital signature) In relation to a given digital signature, message, and public key, to determine accurately that (1) the digital signature was created during the operational period of a valid certificate by the private key corresponding to the public key contained in the certificate and (2) the associated message has not been altered since the digital signature was created.
VCML Value Chain Markup Language is a set of XML-based vocabularies (words and meanings) and documents used by some firms, in certain industries for the conduct of business over the Internet. VCML is a marketing initiative of Vitria Technologies.
VAN Value Added Networks have been serving the EDI user for nearly 30 years. They provide network connections, receipt messages, aggregation services, access control and mailboxing services. EDIINT promises to eliminate
Value-Added Network (VAN) A third-party EDI service provider that provides a communication link between companies to enable electronic exchange of business data/documents.
Validation Validation is compliance checking of new or changed data versus GCI/GDAS Data Standards, principles and rules. The validation consists of ensuring as a minimum:
- Syntax (e.g., format of fields)
- Mandatory, dependent data (completeness of data)
- Semantic (e.g., can't make a change before add, allocation rules for GTINs and GLNs)
- Check of classification
- Uniqueness of the item/party/partner profile (checked by registry)