Public Key Infrastructure Sample Clauses

Public Key Infrastructure. (PKI) and Public Key (PK) Enabling when transmitting CUI that has not been cleared for Public Release.
AutoNDA by SimpleDocs
Public Key Infrastructure. (PKI) and Public Key (PK) Enabling.
Public Key Infrastructure. The public key infrastructure is responsible for generate public & private key pairs and certificates to vehicles. In our solution we assume that all vehicles have been deployed public & private key pairs, and certificates already.
Public Key Infrastructure. We assume that all the parties have access to a public key infrastructure (PKI). That is, parties hold the same vector of pub- lic keys (pk1, pk2, . . . , pkn), and each honest party Pi holds the secret key ski associated with pki.5 → sk A signature on a value v using secret key sk is computed as σ Sign (v); a signature is verified relative to public key pk by calling Verpk(v, σ). For simplicity, we assume in our proofs that the signatures are perfectly unforgeable. When replacing the signatures with real-world instantiations, the results hold except with a negligible failure probability. Coin-Flip. Parties have access to an ideal coin-flip protocol CoinFlip that gives the parties a common uniform random value (in some range depending on the 5 This is a bulletin-board PKI, where the keys from corrupted parties can be chosen adversarially. See [BCG21] for a nice discussion. protocol of choice). This value remains uniform from the adversary’s view until the first honest party has queried CoinFlip. Such a primitive can be achieved from a trusted setup of unique threshold signatures [CKS05, LJY14].
Public Key Infrastructure. (PKI)‌ The notion of public key cryptography was first introduced by Xxxxxxxxx Xxxxxx and Mar- tin Xxxxxxx in their 1976 seminal paper [21]. Realizing that the proposed public key directory had its shortcomings (both in regard to performance and availability), Xxxxx Xxxxxxxxxx introduced the concept of certificates in 1978 [35]. The idea was to allow a certificate authority (CA) to bind a name to a key through a digital signature and store it in a repository. A few years later, certificates were incorporated into X.500, a hierarchical database model for the public key infrastructure (PKI). These certificates (X.509) were designed to address the access control issues of the X.500 directory. The original motivation for PKI was to provide mechanisms for issuing, storing, and distributing public key certificates. Over the years, however, a number of problems [30, 29] with PKI have been discovered. One concerns the identity of the X.509 certificate and how to properly retrieve the desired key should the repository hold certificates with identical names (DN). It is possible to disambiguate names by adding uniquely identifi- able strings or digits such as a user’s Social Security number to the DN, but this again makes it trivial to perform name lookups for third parties. The fact that certificates are based on owner identity also becomes a problem if the owner changes affiliation, e-mail address, or name. Usually, an owner will have several certificates with the same identity.
Public Key Infrastructure. ‌ Like many other protocols, DCGKA requires a means for one user to obtain correct public keys for the other group members. These public keys are then used to authenticate messages at the ACB layer, and to initialize the 2SM protocol. We assume that each user is identified by an ID, and we model this module as follows:

Related to Public Key Infrastructure

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Utility Infrastructure During the term of this Agreement, Company will have the right to receive water, sanitary sewer, electric, storm drainage, telecommunication and data services at the Premises.

  • Infrastructure Improvements The design, redevelopment and construction and completion of certain infrastructure improvements, including sewer, stormwater, electrical and water main improvements, along with other similar improvements.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Partnership Working 7.1 Partnerships will be supported by local authorities on four levels between:

  • PUBLIC WORKS AND BUILDING SERVICES CONTRACTS Work being done under a resulting Authorized User Agreement may be subject to the prevailing wage rate provisions of the New York State Labor Law. Such work will be identified by the Authorized User within the RFQ. See “Prevailing Wage Rates – Public Works and Building Services Contracts’ in Appendix B, Clause 10, OGS General Specifications. Any federal or State determination of a violation of any public works law or regulation, or labor law or regulation, or any OSHA violation deemed "serious or willful" may be grounds for a determination of vendor non-responsibility and rejection of proposal. The Prevailing Wage Case Number for this Contract is PRC# 2014011745. The Prevailing Wage Rates for various occupations and General Provisions of Laws Covering Workers on Article 8 Public Work Contract can be accessed at the following NYS Department of Labor website: xxxxx://xxxxxxxxxxxx.xxxxx.xx.xxx/wpp/xxxxXxxxXxxxxxx.xx?method=showIt  Insert PRC# 2014011745 in the box provided and click Submit.  Click Wage Schedule located underneath the main header of this page. The PDF file may be searched to obtain the Prevailing Wage Rate for a specific occupation. SHORT TERM EXTENSION In the event a replacement Contract has not been issued, any Contract let and awarded hereunder by the State, may be extended unilaterally by the State for an additional period of up to 3 months upon notice to the Contractor with the same terms and conditions as the original Contract including, but not limited to, prices and delivery requirements. With the concurrence of the Contractor, the extension may be for a period of up to 6 months in lieu of 3 months. However, this extension terminates should the replacement Contract be issued in the interim. PROCUREMENT INSTRUCTIONS Authorized Users should refer to the documents attached as Appendix G – Processes and Forms Templates for specific instructions on the usage of this Contract. OGS reserves the right to unilaterally make revisions, changes, additions and/or updates to the documents attached as Appendix G - Processes and Forms Templates without processing a formal amendment and/or modification. SPECIFICATIONS During the term of the Contract, the Authorized User may request Product specifications for particular items that have been included by the Contractor in its Pricing Pages. These specifications will be provided by the Contractor at no cost.

Time is Money Join Law Insider Premium to draft better contracts faster.