Security Definitions Sample Clauses

Security Definitions. In this Agreement:
AutoNDA by SimpleDocs
Security Definitions. AD A B A B •
Security Definitions. The following security properties are commonly required in a certificateless key establishment protocols in general[5].
Security Definitions. In this section we first define the security of a group key agreement protocol and then describe the cryptographic assumptions on which the security of our protocol is based. A A
Security Definitions. We next characterize the security of a ConBE conspire. A few techniques have been proposed to change public key encryption (PKE) with security against picked plaintext assaults (CPA) into encryption against adaptively picked ciphertext assaults (CCA2) in the standard model. In [48], Xxxxxxx et al. recommended change from CPA secure IBE to CCA2- secure PKE utilizing a one-time signature. In [49], Xxxxxxx and Xxxxxxx proposed to acquire CCA2- secure PKE from any CPA-secure PKE with a general computational extractor. In [50], Xxx et al. acquired CCA2-secure ABE from CPA-secure ABE without additional cryptographic natives, however with an extra on-the-fly sham trait. We take note of that these techniques are appropriate to our ConBE setting with/without adjustment (e.g., by including a the-fly sham recipient). The cost relies upon the techniques, i.e., an all inclusive computational extractor, a one- time signature or a spurious client. Thus, it is adequate to just characterize the CPA security of a ConBE conspire. Nonetheless, taking note of that ConBE is intended for circulated applications where the clients are probably going to be defiled; we incorporate full intrigue obstruction into our security definition. The completely plot safe security of a ConBE conspire is characterized by the accompanying security amusement between a challenger CH and an assailant A.
Security Definitions. The correctness of a CBE scheme means that if all members and the sender follow the scheme honestly, then the members in the receiver set can always correctly decrypt. Formally, the correctness of a CBE scheme is defined as follows. Definition 1 (Correctness). A CBE scheme is correct if for any parameter λ ∈ N and any element ξ in the session key space, (U1(dk1), · · · , Un(dkn); gek) ← CBSetup(U1(x1), · · · , Un(xn)), and (c, ξ) ←CBEncrypt(R, gek), it holds that CBDecrypt(R, j, dkj, c) = ξ for any j ∈ R. We next define the secrecy of a CBE scheme. In the above, to achieve better practicality, a CBE scheme is modeled as a KEM in which a sender sends a (short) secret session key to the intended receivers and simultaneously, (long) messages can be encrypted using a secure symmetric encryption algorithm with the session key. Hence, we define the secrecy of a CBE scheme by the indistin- guishability of the encrypted session key from a random element in the session key space. Since there exist standard conversions (e.g., [16]) from secure KEM against chosen-plaintext attacks (CPA) to secure encryption against adaptively chosen-ciphertext attacks (CCA2), it is sufficient to only define the CPA se- crecy of CBE schemes. However, noting that CBE is designed for distributed applications where the users are likely to be corrupted, we include full collusion resistance into our secrecy definition. CH A The fully collusion-resistant secrecy of a CBE scheme is defined by the fol- lowing secrecy game between a challenger and an attacker . The secrecy game is defined as follows. CH
Security Definitions. Some security definitions are proposed for our protocol to provide strong security guarantees. AdvKey =| 2 Pr[Succ( A)Key ] −1 | . 𝐴 Assuming that the advantage 𝐴𝑑𝑣𝐾𝑒𝑦 is negligible for any PPT adversary, then the protocol 𝛬 can be said to be AKA-secure.
AutoNDA by SimpleDocs
Security Definitions. Now we define the security assumptions for the pro- posed key agreement protocol within the security model given above. The detailed definitions can be found in (X. Xxxxxxx and Xxxxxxxxxxx, 2004; X. Xxx and Xxx, 2005c; Xxxx and Xxxxx, 2003). • Freshness Freshness captures the intuitive fact that a session key is not obviously known to the adversary. A session key is fresh if it has been accepted by an uncorrupted oracle and the oracle or any of its partners are not subjected to the reveal or corrupt query. • Authenticated group key agreement The security of an authenticated group key agree- ment protocol P is defined by a game G(A , P ) between the computationally bound adversary A and protocol P . The adversary A executes the protocol P and executes all the queries described in the security model, as many times as she wishes. A wins the game, if at any time it asks a single Test query to a fresh user and gets back a l-bit string as the response to the query. At a later point of time it outputs a bit b′ as a guess for the hidden bit b. Let GG (Good Guess) be the event that b = b′, i.e. the adversary A , correctly guesses the bit b. Then we define the advantage of A in attacking P , as AdvP(k) = 0.Xx[GG] − 1 We say that a group key agreement scheme P is secure if AdvP(k) is negligible for any probabilis- tic polynomial time adversary A . • Secure Signature Scheme The security notion for a signature scheme is that it is computationally infeasible for an adversary to produce a valid forgery σwith respect to any mes- sage m under (adaptive) chosen message attack (CMA). A signature scheme τ(G , S , V ) is (t, q, ε) secure if there is no adversary whose probabil- ity in mounting an existential forgery under CMA within time t after making q queries is greater than ε(negligible). The probability is denoted as Succτ(A ). • Secure encryption scheme A public-key encryption scheme PE = (K; E; D) consists of three algorithms: A key generation al- gorithm K giving a pair (e; d) of matching public and private keys, an encryption algorithm E, and a decryption algorithm D. The encryption scheme PE is secure if the ad- versary’s advantage is negligible. We denote the probability as Succenc(A ). Thus, we have defined the security model for the protocol definition. In the next section, we proceed to describe the detail of the proposed protocol. We now analyze the security of the protocol as the probability that an adversary can some information on the key and gain some advant...
Security Definitions. ∈ { } AD

Related to Security Definitions

  • Key Definitions As used herein, the following terms shall have the following respective meanings:

  • Amendments to Equity Definitions (i) Section 12.6(a)(ii) of the Equity Definitions is hereby amended by (1) deleting from the fourth line thereof the word “or” after the word “official” and inserting a comma therefor, and (2) deleting the semi-colon at the end of subsection (B) thereof and inserting the following words therefor “or (C) the occurrence of any of the events specified in Section 5(a)(vii)(1) through (9) of the ISDA Master Agreement with respect to that Issuer.” (ii) Section 12.9(b)(i) of the Equity Definitions is hereby amended by (1) replacing “either party may elect” with “Dealer may elect” and (2) replacing “notice to the other party” with “notice to Counterparty” in the first sentence of such section.

  • Seniority Definition Seniority is the Layoff Service Date which is the date the employee began state service (except as a temporary appointee) as adjusted for break(s)-in-service. (See Letter of Agreement 70.00-09-179 in Appendix A).

  • UCC Definitions Unless otherwise defined herein or the context otherwise requires, terms for which meanings are provided in the UCC are used in this Security Agreement, including its preamble and recitals, with such meanings.

  • 000 DEFINITIONS 6. 100 Maintenance shall be work performed for the repair, renovation, revamp and upkeep of property, machinery and equipment within the limits of the plant property.

  • Amendments to the Equity Definitions (A) Section 11.2(a) of the Equity Definitions is hereby amended by deleting the words “a diluting or concentrative” and replacing them with the words “an”; and adding the phrase “or Warrants” at the end of the sentence. (B) Section 11.2(c) of the Equity Definitions is hereby amended by (x) replacing the words “a diluting or concentrative” with “an”, (y) adding the phrase “or Warrants” after the words “the relevant Shares” in the same sentence and (z) deleting the phrase “(provided that no adjustments will be made to account solely for changes in volatility, expected dividends, stock loan rate or liquidity relative to the relevant Shares)” and replacing it with the phrase “(and, for the avoidance of doubt, adjustments may be made to account solely for changes in volatility, expected dividends, stock loan rate or liquidity relative to the relevant Shares).” (C) Section 11.2(e)(vii) of the Equity Definitions is hereby amended by deleting the words “a diluting or concentrative” and replacing them with the word “a material”; and adding the phrase “or Warrants” at the end of the sentence. (D) Section 12.6(a)(ii) of the Equity Definitions is hereby amended by (1) deleting from the fourth line thereof the word “or” after the word “official” and inserting a comma therefor, and (2) deleting the semi-colon at the end of subsection (B) thereof and inserting the following words therefor “or (C) at Dealer’s option, the occurrence of any of the events specified in Section 5(a)(vii) (1) through (9) of the ISDA Master Agreement with respect to that Issuer.” (E) Section 12.9(b)(iv) of the Equity Definitions is hereby amended by:

  • DPA Definitions The definition of terms used in this DPA is found in Exhibit “C”. In the event of a conflict, definitions used in this DPA shall prevail over terms used in any other writing, including, but not limited to the Service Agreement, Terms of Service, Privacy Policies etc.

  • Seniority Defined Seniority is defined as the total length of service in the bargaining unit as an employee, regardless of occupational change. Seniority shall be used as one of the factors in determining preference or priority for promotion, transfers, demotions, terminations and layoff caused by force reductions and recall. Seniority shall operate on a bargaining unit wide basis.

  • Tax Definitions The following terms, as used herein, have the following meanings:

  • Term Definition Consensus Assessments Initiative Questionnaire (CAIQ) As established by the Cloud Security Alliance (CSA). The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable Cloud computing assessments. Consulting The providing of expert knowledge by a third party for a fee. Continental United States (CONUS) The 48 contiguous States, and the District of Columbia. Contract Term The initial term of the Contract and any renewals and/or extensions. Copyright Copyright is a legal concept, enacted by most governments, that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to receive compensation for their work and be able to financially support themselves. Custom Software Software that does not meet the definition of COTS Software. Customization Customization of Product is the modification of packaged Product to meet the individual requirements of an Authorized User. Customized Training Training that is designed to meet the special requirements of an Authorized User. Data Any information, Analytic Derivatives, formula, algorithms, or other content that the Authorized User may provide to the Contractor pursuant to this Contract. Data includes, but is not limited to, any of the foregoing that the Authorized User and/or Contractor (i) uploads to the Cloud Service, and/or (ii) creates and/or modifies using the Cloud Service. See also Analytic Derivatives. Data Breach Data Breach refers to unauthorized access by any person, including employees, officers, partners or subcontractors of Contractor, who have not been authorized to access such Data. Data Center The term "Data center" applies to all facilities which Authorized User Data is processed or stored. Data Categorization Data categorization is the process of risk assessment of Data. See also “High Risk Data”, “Moderate Risk Data” and “Low Risk Data”. Data Conversion The conversion of computer data from one format to another. Data Mining Data Mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Aside from the raw analysis step, it involves database and data management aspects, data pre-processing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating. Database A single collection of Data stored in one place that can be used by personnel to make decisions and assist in analysis. Deliverable Products, Software, Information Technology, telecommunications technology, Hardware, and other items (e.g. reports) to be delivered pursuant to this Contract, including any such items furnished within the provision of services. Device A piece of electronic equipment (such as a laptop, server, hard drive, USB drive) adapted for a particular purpose. Discount An allowance, reduction or deduction from a selling price or list price extended by a seller to a buyer in order for the net price to become more competitive. More common forms of discounts include trade discounts, quantity discounts, seasonal discounts and cash discounts. Discount from List Mathematical calculation to determine the buyer’s price from a manufacturer’s price list. Encryption A technique used to protect the confidentiality of information. The process transforms ("encrypts") readable information into unintelligible text through an algorithm and associated cryptographic key(s). Equal Employment Opportunity (EEO) Policies and procedures of the jurisdiction to ensure non-discrimination and equal opportunity to all employees, especially women, minorities, and persons with disabilities. Equipment An all-inclusive term which refers either to individual Machines or to a complete Data Processing System or Subsystem, including its Hardware and Operating Software (if any). See also “device, “appliance,” and “hardware,” “machine.” Federal Information Security Management Act (FISMA) The Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541, et seq.) is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002 (Pub.L. 107–347, 116 Stat. 2899). The act recognized the importance of information security to the economic and national security interests of the United States. The act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. Fleet Management The development and management of inventory (e.g. Software inventory, Hardware inventory, Cloud inventory). Follow the Sun Follow-the-sun is a type of global workflow in which tasks are passed around daily between work sites that are many time zones apart. General Services Administration (GSA) The department within the U.S. government that is responsible for procurement of goods and services. Government Entity A federal, state or municipal entity located in the United States. Hardware Refers to IT Equipment and is contrasted with Software. See also Equipment. High Risk Data Is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems (“High Impact Data”). Implementation Implementation refers to post sales process of guiding a client from purchase to use of the Product that was purchased. This may include but is not limited to post sales requirements analysis, scope analysis, limited customizations, systems integrations, data conversion/migration, business process analysis/improvement, user policy, customized user training, knowledge transfer, project management and system documentation. Information Technology (IT) Includes, but is not limited to, all electronic technology systems and services, automated information handling, System design and analysis, conversion of data, computer programming, information storage and retrieval, telecommunications which include voice, video, and data communications, requisite System controls, simulation, electronic commerce, and all related interactions between people and Machines. Information Technology Services (ITS) New York State Office of Information Technology Services (xxxx://xxx.xxx.xx.xxx/). It is the responsibility of ITS to provide centralized IT services to the State and its governmental entities with the awareness that our citizens are reliant on those services. Infrastructure as a Service (IaaS) The capability provided to the Authorized User is to provision processing, storage, networks, and other fundamental computing resources where the Authorized User is able to deploy and run arbitrary Software, which can include operating systems and applications. The Authorized User does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications; and possibly limited control of select networking components (e.g., host firewalls). Installation The act or process of making Products ready to be used. Installation does not include Configuration. Installation Date The date specified in the Authorized User Agreement by which the Contractor must have the ordered Equipment ready for use by the Authorized User. Installation of Hardware Involves physically installing various types of computer systems and/or adding new components to an already existing system. Installation set up of computer systems includes the initial installation of Hardware and other components that are or may be part of a larger system. Intellectual Property (IP) Includes inventions, patents, copyrights, trade secrets, trademarks, technical Data, industrial designs that are generally protected and proprietary. Internet Access Connection to the internet through an Internet Service Provider (ISP). Internet Service Provider (ISP) An ISP is an organization that provides services for accessing, using, or participating in the Internet. Interoperability The capability to communicate, to execute programs, or to transfer Data among various functional units under specified conditions Legacy Systems Any outdated Hardware/Software system that remains in use despite the availability of more current technology. It usually is an archaic Data management platform that may contain proprietary custom designed Software (e.g. An old database management system running on mainframes). Logical Partition (LPAR) A logical partition is a subset of computer's Hardware resources, virtualized as a separate computer. Low Risk Data Is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems (“Low Impact Data”). Machine An individual unit of a Data processing system or subsystem, separately identified by a type and/or model number, comprised of but not limited to mechanical, electro-mechanical, and electronic parts, microcode, and special features installed thereon and including any necessary Software, e.g., central processing unit, memory module, tape unit, card reader, etc. Maintenance The upkeep of Product that keeps the Product operating in accordance with the Manufacturer’s specification. Mandatory Refers to items or information that the State has deemed that a Vendor must submit as compulsory, required and obligatory. These items or information are noted as such, or the requirements may be phrased in terms of “must” or “shall”. Mandatory requirements must be met by the Vendor for Vendor’s Submission to be considered responsive. Manufacturer A person or business entity that creates, makes, processes, or fabricates a Product or something of value, which changes a raw material or commodity from one form to another or creates a new Product or commodity. Manufacturer - Software An organization that creates, programs, or develops proprietary Software that are branded, warranted, supported, and maintained by the entity that creates it and holds all intellectual property rights of the assembled solution. Manufacturer - Cloud An organization that creates, programs, or develops a proprietary system that is delivered as a subscription service that is branded, warranted, supported, and maintained by the entity that creates it. It may or may not be hosted by the Manufacturer, but the Manufacturer will be held responsible for the performance of the service provided regardless of the owner of the support infrastructure. Manufacturer - Hardware An organization that creates or assembles Hardware components into an integrated proprietary system that is branded, warranted, supported, and maintained by the entity that creates it and holds all intellectual property rights of the assembled solution. Manufacturer Part Number (SKU) An identification number assigned to an individual part by the Manufacturer or distributor of that part; usually includes a combination of alpha and/or numeric characters. Manufacturer’s Price List A price list published in some form by the Manufacturer and available to and recognized by the trade. May Denotes the permissive in a contract clause or specification. Refers to items or information that the State has deemed are worthy of obtaining, but not required or obligatory. Mean The arithmetic average. The average value of a set of numbers. Minority and/or Woman- Owned Business (MWBE) A business certified with Empire State Development (ESD) as a Minority and/or Woman-Owned Business. Model Number An identification number assigned to describe a style or class of item, such as a particular design, composition or function, by the Manufacturer or distributor of that item. Moderate Risk Data Is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems (“Moderate Impact Data”). Must Denotes the imperative in a Contract clause or specification. Means required - being determinative/mandatory, as well as imperative. National Institute of Standards and Technology (NIST) NIST is the federal technology agency that works with industry to develop and apply technology, measurements, and standards. xxxx://xxx.xxxx.xxx New York State Small Business Enterprise (NYS SBE) A “New York State Small Business” is defined as a company that is a resident to New York State, independently owned and operated, with 100 or fewer employees, and not dominant in its field. See State Finance Law §160(8). Non-State Agencies Political subdivisions and other entities authorized by law to make purchases from OGS Centralized Contracts other than those entities that qualify as State Agencies. This includes all entities permitted to participate in centralized contracts per Xxxxxxxx X, §00(x), Xxx-Xxxxx Agency Authorized Users and §39(c), Voluntary Extension and State Finance Law Section 163(1)(k). NYS Procurement The New York State Office of General Services that is authorized by law to issue centralized, statewide contracts for use by New York State agencies, political subdivisions, schools, libraries and others authorized by law to participate in such contracts. xxxx://xxxxxx.xxx.xx.xxx Office of the State Comptroller (OSC) The New York State Office of the State Comptroller. xxxx://xxx.xxx.xxxxx.xx.xx/ Operating System (OS) Those routines, whether or not identified as program Products, that reside in the Equipment and are required for the Equipment to perform its intended function(s), and which interface the operator, other Contractor-supplied programs, and user programs to the Equipment. Personally Identifiable Information (PII) As defined in NIST Special Publication 800-122 “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)”, Platform as a Service (PaaS) The capability provided to the Authorized User to deploy onto the Cloud, infrastructure Authorized User-created or acquired applications created using programming languages and tools supported by the Vendor. The Authorized User does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Preventive Maintenance Maintenance, performed on a scheduled basis by the Contractor, which is designed to keep the Equipment in proper operating condition.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!