MKA Security with Group Manager FS and Eventual PCS Sample Clauses

MKA Security with Group Manager FS and Eventual PCS. To obtain security with respect to group manager corruptions, in addition to the security captured by user-mult, we create a new security game mgr-mult, in which we add to the user-mult game an additional 12 Note that 12.5% is the threshold such that the group size does not approach zero in expectation, as the number of operations 10 · 2i is 20 times more than the initial group size 2i−1 and thus the difference between the probabilities of Remove and Add operations needs to be less than 1/20 = 5%.‌ 13 In Section 8, we also show how to retain GUS’s O(log n) computational complexity. ∈ oracle mgr-corrupt, which simply returns the secret state of the group manager to the adversary. Observe that there are now more trivial attacks which the adversary can use to win mgr-mult (e.g., corrupting the group manager and then challenging before every user has been updated or removed from the group). We therefore check a new mgr-safe predicate at the end of the game on the queries q1, . . . , qq in order to determine if the execution had any trivial attacks. In addition to that which user-safe checks for, mgr-safe also checks for every challenge epoch t∗ if the group manager was corrupted in some epoch t < t∗, and there was any ID G[t] that did not have its secrets updated by the group manager (in an operation for which the oob to ID is not corrupted), and was not removed by the group manager, after the corruption, but before t∗. mgr-corrupt(): mgr-safe(q1, . . . , qq ): return Γsec 107 for (i, j) s.t. qi = mgr-corrupt(), qj = chall(t∗) for some t∗: 108 if q2e(qi) < t∗ and ∃ID ∈ G[q2e(qi)] s.t. $l s.t. 0 < q2e(qi) < q2e(ql) ≤ t∗∧ ((ql = update-user(ID) ∧ $m s.t. qm = corrupt-oob(q2e(ql), ID)) ∨ 109 ql = remove-user(ID)): return 0 110 return user-safe(q1, . . . , qq )
AutoNDA by SimpleDocs

Related to MKA Security with Group Manager FS and Eventual PCS

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Procurement from UN Agencies Goods estimated to cost less than $50,000 equivalent per contract may be procured directly from Inter-Agency Procurement Services Agency in accordance with the provisions of paragraphs 3.1 and 3.9 of the Procurement Guidelines.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

  • Background and/or Criminal History Investigation Prior to commencement of any services, background and/or criminal history investigation of the Vendor’s employees and subcontractors who will be providing services to the Customer under the Contract may be performed by the Customer. Should any employee or subcontractor of the Vendor who will be providing services to the Customer under the Contract not be acceptable to the Customer as a result of the background and/or criminal history check, then Customer may immediately terminate its Purchase Order and related Service Agreement or request replacement of the employee or subcontractor in question.

  • Project Manager, County The County shall appoint a Project Manager to act as liaison between the County and the Subrecipient during the term of this Contract. The County’s Project Manager shall coordinate the activities of the County staff assigned to work with the Subrecipient. The County’s Project Manager, in consultation and agreement with the County, shall have the right to require the removal and replacement of the Subrecipient’s Project Manager and key personnel. The County’s Project Manager shall notify the Subrecipient in writing of such action. The Subrecipient shall accomplish the removal within three (3) business days after written notice from the County’s Project Manager. The County is not required to provide any additional information, reason or rationale in the event it requires the removal of Subrecipient’s Project Manager from providing further services under the Contract.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Program Monitoring and Evaluation (c) The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!