Security of Rep Sample Clauses

Security of Rep. Even if the adversary modifies P, the string produced by Rep has high entropy: for all (adversarial) functions A and suitable (W, W′, E), if (R, P ) ← Gen(W ), P′ ← A(P, E), and R′ ← Rep(W′,P′), then H∞(R′ | E, P ) ≥ hR' . We can build weakly robust fuzzy conductors out of any secure sketch (SS, Rec). (Secure sketches, defined in [DORS08], allow the recovery of w from a close string w′). We use the secure sketch constructions of [DORS08] to build weakly robust fuzzy conductors for Hamming, set difference, and edit distance metrics. Namely, in Appendix A, we easily obtain – − − − − – for Hamming distance over an alphabet of size F , given an [n, κ, 2t+1] linear error-correcting code for the alphabet, we get hR = hW (n κ) log F , hR' = hW 2(n κ) log F , and η = t. – c c −[ | − − − [ | −[ | − − − − for set difference, with sets whose elements come from a universe of size U , we get hR = hW η log(U + 1) and hR' = hW 2η log(U + 1) for any η. for edit distance over an alphabet of size we get hR = hW n log(n c+1) α, and hR' = hW n log(n c + 1) 2α, where α = (2c 1)η log(Fc + 1) , for any constant c and η.
AutoNDA by SimpleDocs
Security of Rep. Even if the adversary modifies P , the string produced by Rep has high entropy: for all (adversarial) functions A and suitable (W, W', E), if (R, P ) ← Gen(W ), P' ← A(P, E), and R' ← Rep(W',P'), then H˜ ∞(R' | E, P ) ≥ hR' . We can build weakly robust fuzzy conductors out of any secure sketch (SS, Rec). We use the secure sketch constructions of [DORS08] to build weakly robust fuzzy conductors for Hamming, set difference, and edit distance metrics. Namely, in Appendix B, we easily obtain • for Hamming distance over an alphabet of size F , given an [n, κ, 2t + 1] linear error-correcting code for the alphabet, we get hR = hW − (n − κ) log F , hR' = hW − 2(n − κ) log F , and η = t. • for set difference, with sets whose elements come from a universe of size U , we get hR = hW − η log(U + 1) and hR' = hW − 2η log(U + 1) for any η. c • for edit distance over an alphabet of size we get hR = hW − [ n| log(n − c + 1) − α, and c hR' = hW − [ n| log(n − c + 1) − 2α, where α = (2c − 1)η[log(F c + 1)|, for any constant c and η.

Related to Security of Rep

  • Security of Data a. Each of the parties shall:

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security Bond The security bond provides protection to Owner if Contractor presents an acceptable guaranteed maximum price (“GMP”) to Owner but is unable to deliver the required payment and performance bonds within the time period stated below.

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • Security of Premises 6A.5 The Customer shall be responsible for maintaining the security of the Premises in accordance with its standard security requirements. The Supplier shall comply with all reasonable security requirements of the Customer while on the Premises and shall ensure that the Supplier’s Staff comply with such requirements.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Interest Absolute All rights of the Secured Party and all Obligations of the Company hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Notes, the Warrants or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Notes, the Warrants or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Intellectual Property, or any release or amendment or waiver of or consent to departure from any other Intellectual Property for, or any guaranty, or any other security, for all or any of the Obligations; (d) any action by the Secured Party to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Intellectual Property; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to the Company, or a discharge of all or any part of the Security Interest granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Party shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. The Company expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Intellectual Property or any payment received by the Secured Party hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Party, then, in any such event, the Company's obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. The Company waives all right to require the Secured Party to proceed against any other person or to apply any Intellectual Property which the Secured Party may hold at any time, or to marshal assets, or to pursue any other remedy. The Company waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!