Public Key Infrastructure Sample Clauses

Public Key Infrastructure. (PKI) and Public Key (PK) Enabling when transmitting CUI that has not been cleared for Public Release.
AutoNDA by SimpleDocs
Public Key Infrastructure. (PKI) and Public Key (PK) Enabling.
Public Key Infrastructure. We assume that all the parties have access to a public key infrastructure (PKI). That is, parties hold the same vector of pub- lic keys (pk1, pk2, . . . , pkn), and each honest party Pi holds the secret key ski associated with pki.5 A signature on a value v using secret key sk is computed as σ Sign (v); a signature is verified relative to public key pk by calling Verpk(v, σ). For simplicity, we assume in our proofs that the signatures are perfectly unforgeable. When replacing the signatures with real-world instantiations, the results hold except with a negligible failure probability. Coin-Flip. Parties have access to an ideal coin-flip protocol CoinFlip that gives the parties a common uniform random value (in some range depending on the 5 This is a bulletin-board PKI, where the keys from corrupted parties can be chosen adversarially. See [BCG21] for a nice discussion. protocol of choice). This value remains uniform from the adversary’s view until the first honest party has queried CoinFlip. Such a primitive can be achieved from a trusted setup of unique threshold signatures [CKS05, LJY14].
Public Key Infrastructure. (PKI)‌ The notion of public key cryptography was first introduced by Xxxxxxxxx Xxxxxx and Mar- tin Xxxxxxx in their 1976 seminal paper [21]. Realizing that the proposed public key directory had its shortcomings (both in regard to performance and availability), Xxxxx Xxxxxxxxxx introduced the concept of certificates in 1978 [35]. The idea was to allow a certificate authority (CA) to bind a name to a key through a digital signature and store it in a repository. A few years later, certificates were incorporated into X.500, a hierarchical database model for the public key infrastructure (PKI). These certificates (X.509) were designed to address the access control issues of the X.500 directory. The original motivation for PKI was to provide mechanisms for issuing, storing, and distributing public key certificates. Over the years, however, a number of problems [30, 29] with PKI have been discovered. One concerns the identity of the X.509 certificate and how to properly retrieve the desired key should the repository hold certificates with identical names (DN). It is possible to disambiguate names by adding uniquely identifi- able strings or digits such as a user’s Social Security number to the DN, but this again makes it trivial to perform name lookups for third parties. The fact that certificates are based on owner identity also becomes a problem if the owner changes affiliation, e-mail address, or name. Usually, an owner will have several certificates with the same identity.
Public Key Infrastructure. ‌ Like many other protocols, DCGKA requires a means for one user to obtain correct public keys for the other group members. These public keys are then used to authenticate messages at the ACB layer, and to initialize the 2SM protocol. We assume that each user is identified by an ID, and we model this module as follows:
Public Key Infrastructure. The public key infrastructure is responsible for generate public & private key pairs and certificates to vehicles. In our solution we assume that all vehicles have been deployed public & private key pairs, and certificates already.

Related to Public Key Infrastructure

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins. (2) Maintain waterbars, drainage dips, and other water diversion measures. (3) During active use, patrol and maintain functional drainage. (4) Repair damaged culvert ends.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • External Hosting Facilities DST shall implement controls, consistent with applicable prevailing industry practices and standards, regarding the collection, use, storage and/or disclosure of Fund Data by an external hosting provider.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Project Monitoring The Developer shall provide regular status reports to the NYISO in accordance with the monitoring requirements set forth in the Development Schedule, the Public Policy Transmission Planning Process Manual and Attachment Y of the OATT.

  • Developer Attachment Facilities Developer shall design, procure, construct, install, own and/or control the Developer Attachment Facilities described in Appendix A hereto, at its sole expense.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!