Applicability Statement 2


Applicability Statement 2 (AS2) is a specification for data exchange, to perform the task of sending and receiving data via a secure connection. It works as a kind of “envelope,” in which data is embedded, so that it is possible to send it using the HTTP-protocol. It is a quick and direct transfer, without using a mailbox. AS2 is able to transmit every kind of document and it’s suited especially for the traditional EDI transactions. The data to be sent will be prepared by internal systems and will be transferred via an AS2 communication software.
[Source: Adapted from AS2 (Applicability Statement 2): Description and Parameter, EDI-AKH]

Read Also:

  • Application Infrastructure Provider (AIP)

    AIP is short for application infrastructure provider. A hosting provider that offers a full set of infrastructure services for hosting online applications, or more simply, an ASP for ASPs.

  • Application Lifecycle Management

    Abbreviated as ALM, Application Lifecycle Management refers to the capability to integrate, coordinate and manage the different phases of the software delivery process. From development to deployment, ALM is a set of pre-defined process and tools that include definition, design, development, testing, deployment and management. Throughout the ALM process, each of these steps are closely […]

  • Application Session Controller

    Abbreviated as ASC, the Application Session Controller network element resides at the application layer and sits between the application layer and the core network to provide and manage connectivity to the evolving telecom network. The ASC incorporates a number of open standard APIs, plus the signaling, media between disparate networks that converged. See session controller.

  • Archie

    A program that enables you to search for files anywhere on the Internet by filename.

  • Armored Virus

    A type of virus that has been designed to thwart attempts by analysts from examining its code by using various methods to make tracing, disassembling and reverse engineering more difficult. An Armored Virus may also protect itself from antivirus programs, making it more difficult to trace. To do this, the Armored Virus attempts to trick […]


Disclaimer: Applicability Statement 2 definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.