[go: up one dir, main page]

Rantos, 2001 - Google Patents

Key recovery in a business environment

Rantos, 2001

View PDF
Document ID
9340082783929614438
Author
Rantos K
Publication year

External Links

Snippet

This thesis looks at the use of key recovery primarily from the perspective of business needs, as opposed to the needs of governments or regulatory bodies. The threats that necessitate the use of key recovery as a countermeasure are identified together with the requirements …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
US5557765A (en) System and method for data recovery
US8788803B2 (en) Self-encryption process
Abelson et al. The risks of key recovery, key escrow, and trusted third-party encryption
Thomas SSL andTLS essentials
Chang et al. An efficient and secure multi-server password authentication scheme using smart cards
US9411976B2 (en) Communication system and method
JP4463887B2 (en) Protected storage of core data secrets
US20060282681A1 (en) Cryptographic configuration control
US20040255137A1 (en) Defending the name space
US20150006895A1 (en) Distributed network system
Kou Networking security and standards
JP3872616B2 (en) User authentication method on the Internet using a shared key encryption IC card
Press Secure transfer of identity and privilege attributes in an open systems environment
WO2023278902A1 (en) System and method of virtual private keys
Rupa et al. Study and improved data storage in cloud computing using cryptography
Rantos Key recovery in a business environment
Bakker Mutual authentication with smart cards
Varadharajan Distributed object systems security
Kravitz et al. Secure open systems for protecting privacy and digital services
Mathur et al. A Novel Approach For Secured Decentralised Data Protection Vault
Schmidt ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area
Pricope Hardware and software technologies used in the financial industry
THOMAS et al. Securing the Web
Kowalski CRYPTOBOX V2.
AU2012202853A1 (en) Self encryption