Rantos, 2001 - Google Patents
Key recovery in a business environmentRantos, 2001
View PDF- Document ID
- 9340082783929614438
- Author
- Rantos K
- Publication year
External Links
Snippet
This thesis looks at the use of key recovery primarily from the perspective of business needs, as opposed to the needs of governments or regulatory bodies. The threats that necessitate the use of key recovery as a countermeasure are identified together with the requirements …
- 238000011084 recovery 0 title abstract description 371
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5557765A (en) | System and method for data recovery | |
US8788803B2 (en) | Self-encryption process | |
Abelson et al. | The risks of key recovery, key escrow, and trusted third-party encryption | |
Thomas | SSL andTLS essentials | |
Chang et al. | An efficient and secure multi-server password authentication scheme using smart cards | |
US9411976B2 (en) | Communication system and method | |
JP4463887B2 (en) | Protected storage of core data secrets | |
US20060282681A1 (en) | Cryptographic configuration control | |
US20040255137A1 (en) | Defending the name space | |
US20150006895A1 (en) | Distributed network system | |
Kou | Networking security and standards | |
JP3872616B2 (en) | User authentication method on the Internet using a shared key encryption IC card | |
Press | Secure transfer of identity and privilege attributes in an open systems environment | |
WO2023278902A1 (en) | System and method of virtual private keys | |
Rupa et al. | Study and improved data storage in cloud computing using cryptography | |
Rantos | Key recovery in a business environment | |
Bakker | Mutual authentication with smart cards | |
Varadharajan | Distributed object systems security | |
Kravitz et al. | Secure open systems for protecting privacy and digital services | |
Mathur et al. | A Novel Approach For Secured Decentralised Data Protection Vault | |
Schmidt | ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area | |
Pricope | Hardware and software technologies used in the financial industry | |
THOMAS et al. | Securing the Web | |
Kowalski | CRYPTOBOX V2. | |
AU2012202853A1 (en) | Self encryption |