SECURITY MECHANISMS Clause Samples
SECURITY MECHANISMS. The electronic ballot boxes used must include the following security mechanisms :
(1) a report displaying a total of “zero” must be auto- matically produced by an electronic ballot box upon being turned on on the first day of advance polling and on polling day ;
(2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card, and must record each procedural operation ;
(3) the electronic ballot box must not be placed in “end of election” mode while the poll is still under way ;
(4) the compilation of results must not be affected by any type of interference once the electronic ballot box has been placed in “election” mode ;
(5) each electronic ballot box must be equipped with a back-up power source (battery) able to operate for two to five hours, unless all the electronic ballot boxes are connected to a generator ;
(6) if a ballot box is defective, the memory card may be removed and transferred immediately into another electronic ballot box in order to allow the procedure to continue.
SECURITY MECHANISMS. DS Group Companies undertake legal measures to eliminate unauthorized use of their DS Offerings. In this context, Licensed Programs may include a security mechanism that can detect the installation or use of illegal copies of a DS Offering, and that is able to collect and transmit data about illegal copies only. Data collected will not include any data created by Customer with the Licensed Program. By using the Licensed Program, Customer consents to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. DS also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to, and use of, any DS Offering. Customer may not take any steps to tamper with, circumvent or disable any such measures. Use of any Licensed Program without any hardware lock device, license administration software and/or license authorization key provided by DS is prohibited.
SECURITY MECHANISMS. Each electronic voting system must include the fol- lowing security mechanisms :
(1) a report displaying a total of “zero” must be auto- matically produced by the electronic ballot box when a voting terminal is turned on on the first day of advance polling and on polling day ;
(2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card of the voting terminal, and must record each proce- dural operation ;
(3) a mechanism which prevents a voting terminal from being placed in “end of election” mode while polling is still under way, because the terminal can only be placed in “end of election” mode by the insertion of an “end of election” card ;
(4) a mechanism to ensure that the compilation of results is not affected by any type of interference once the electronic ballot box has been placed in “election” mode ;
(5) each voting terminal must be equipped with seals, two to prevent the opening of the box and one covering the screws of the voting terminal ;
(6) each voting terminal must be equipped with a back-up power source (battery) able to operate for two to five hours, unless all the terminals are connected to a generator ;
(7) if a voting terminal is defective, its internal memory card may be removed and transferred immedi- ately into another voting terminal in order to allow the procedure to continue.
SECURITY MECHANISMS. Each electronic voting system must include the fol- lowing security mechanisms :
1) a report displaying a total of “zero” must be auto- matically produced by the electronic ballot box when a voting terminal is turned on on the first day of advance polling and on polling day ;
2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card of the voting terminal, and must record each proce- dural operation ;
3) a mechanism which prevents a voting terminal from being placed in “end of election” mode while polling is still under way, because the terminal can only be placed in “end of election” mode by the insertion of an “end of election” card ;
SECURITY MECHANISMS. Dassault Systèmes and its affiliated companies take all legal steps to eliminate piracy of their software products. In this context, the Software may include a security mechanism that can detect the installation or use of illegal copies of the Software, and collect and transmit data about those illegal copies. Data collected will not include any customer data created with the Software. By using the Software, you consent to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. DS SolidWorks also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to the Software. You may not take any steps to avoid or defeat the purpose of any such measures. Use of any Software without any required lock device or authorization key provided by DS SolidWorks is prohibited.
SECURITY MECHANISMS. In order to reduce the risk effects on the users and the Platform, we have taken a number of security measures. These measures are taken at different levels across the IoT Lab system.
SECURITY MECHANISMS. DS Group Companies undertake legal measures to eliminate unauthorized use of their DS Group Offerings. In this context, Licensed Programs may include a security mechanism that can detect the installation or use of illegal copies of a No Magic Offering, and that is able to collect and transmit data about illegal copies only. Data collected will not include any data created by Customer with the Licensed Program. By using the Licensed Program, Customer consents to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. No Magic also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to, and use of, any No Magic Offering. Customer may not take any steps to tamper with, circumvent or disable any such measures. Use of any Licensed Program without any hardware lock device, license administration software and/or license authorization key provided by No Magic is prohibited.
SECURITY MECHANISMS. LICENSEE UNDERSTANDS AND AGREES THAT THE SOFTWARE MAY CONTAIN THIRD-PARTY SOFTWARE THAT MONITORS USAGE AND COMMUNICATES WITH LICENSOR'S SERVERS TO ENSURE THAT THE SOFTWARE IS LEGITIMATELY ACQUIRED AND USED UNDER LEGITMATE LICENSES. LICENSEE HEREBY EXPLICITLY CONSENTS TO THE COLLECTION AND TRANSFER OF DATA REGARDING LICENSEE'S SYSTEMS, NETWORKS, LOCATION, SOFTWARE USAGE, AND OTHER DATA USED TO DETERMINE THE LEGITIMACY OF THE SOFTWARE TO LICENSOR'S SERVERS, WHICH MAY BE LOCATED IN THE UNITED STATES, SWITZERLAND, OR OTHER JURISDICTIONS. NO DATA WILL BE TRANSFERRED AFTER LICENSOR DETERMINES THAT LICENSEE'S COPY OF THE SOFTWARE IS LEGITIMATELY OBTAINED FROM LICENSOR OR AN AUTHORIZED DISTRIBUTOR, SUBJECT TO PERIODIC RE- VERIFICATION. IF YOU ARE USING AN ILLEGAL COPY OF THE SOFTWARE, YOU MUST CEASE ALL USE OF THE SOFTWARE IMMEDIATELY AND CONTACT LICENSOR FOR A LEGALLY LICENSED COPY.
SECURITY MECHANISMS. There is no single mechanism that can provide all the security services that are mentioned in section 2.3. However, cryptographic mechanisms underly most of the security mechanisms in use (Al-Muhtadi, et al., 2002) (Stalling, 2003). This section describes the security mechanisms and highlights important concepts which are important to this thesis. Cryptography is used as the basis for much computer security as it can keep information confidential and can also preserves the integrity of data particularly when begin stored or transmitted. It is the science of secret writing (Stalling, 2003). Cryptography is used to transform original information, called plaintext or clear-text into transformed information, called ciphertext or code-text, or simply cipher, and the process of producing this cipher text is known as encryption or enciphering. It sends messages in a masked form so that only the intended receiver can remove the mask and get the message. Any one not in possession of the proper cipher algorithm and keys cannot read the information. On the other hand, cryptanalysis is the study of how to attack cryptosystems. In general, cryptography is classified according to the number of keys used:
i. Symmetric key cryptography (Private-Key cryptography).
ii. Asymmetric key cryptography (Public-Key Cryptography).
2.4.1 Symmetric-key cryptography (Single-key cryptography)
SECURITY MECHANISMS. The following security mechanisms are defined as [X.800]: • Cryptographically derived or protected authentication exchange mechanism: It can be used to provide the peer entity authentication service. • Signature mechanism: It consists of message signing and message verifying. The peer entity authentication service and data origin authentication service can be achieved by the digital signature mechanism. • Encipherment mechanism: It provides confidentiality of either data or traffic flow. It can be used as a part in or complement a number of other security mechanisms. The data origin authentication service, connection confidentiality service, and connectionless confidentiality service can be achieved by the encipherment mechanism. • Access control mechanism: It is used to provide the access control service, i.e., to provide protection against unauthorized use of resources/services. The provision of access control is a nontrivial security service which involves the application of different security mechanisms. On the one hand, authentication mechanims are needed to ensure the authenticity of a peer entity requesting access to a resource. On the other hand, authorization mechanisms are required to determine and apply the peer entity’s access rights. • Routing control mechanism: It provides a dynamic or pre-defined routing to use only physically secure sub-networks, relays, or links. The connection confidentiality ser- vice and connectionless confidentiality service can be achieved by the routing control mechanism. • Traffic padding mechanism: It can be used to provide protection against traffic analysis. It can be effective only if the traffic padding is protected by a confidentiality mechanism. The traffic flow confidentiality service can be achieved by the traffic padding mechanism, in conjunction with a confidentiality mechanism. • Data integrity mechanism: It can be used to provide the connection integrity without recovery service and connectionless integrity service, sometimes in conjunction with an encipherment mechanism. • Pseudonym configuration mechanism: It can be used to preserve location privacy. It utilizes a set of pseudonyms in IPv6 address and communication. The pseudonym configuration mechanism is not the security mechanism defined in [X.800] and is only required to the IPv6 security module deployed in vehicular and personal ITS subsys- tems. The pseudonym configuration mechanism utilizes a set of pseudonyms that are temporary identifiers (...