Back to Search
Start Over
KEY OVER LOAD.
- Source :
-
Network Computing . 4/30/2007, Vol. 18 Issue 8, p38-47. 8p. - Publication Year :
- 2007
-
Abstract
- The article presents information on the management of encryption to protect access to data. According to the author, Enterprise Key Management (EKM) suite should be adopted by business enterprises for data security. The author believes that EKM suite may be effective only after accomplishing hardware that can defend against side-channel attacks against cryptographic implementations. The author says that EKM suite should know how to turn human-language data-security standards into technical policies for each encryption mechanism. INSETS: GOING THE ALL-MICROSOFT ROUTE;GOOD CRYPTO, BAD CRYPTO.
Details
- Language :
- English
- ISSN :
- 10464468
- Volume :
- 18
- Issue :
- 8
- Database :
- Academic Search Index
- Journal :
- Network Computing
- Publication Type :
- Periodical
- Accession number :
- 25087666