Back to Search Start Over

KEY OVER LOAD.

Authors :
Wiens, Jordan
Hill, Steven
Source :
Network Computing. 4/30/2007, Vol. 18 Issue 8, p38-47. 8p.
Publication Year :
2007

Abstract

The article presents information on the management of encryption to protect access to data. According to the author, Enterprise Key Management (EKM) suite should be adopted by business enterprises for data security. The author believes that EKM suite may be effective only after accomplishing hardware that can defend against side-channel attacks against cryptographic implementations. The author says that EKM suite should know how to turn human-language data-security standards into technical policies for each encryption mechanism. INSETS: GOING THE ALL-MICROSOFT ROUTE;GOOD CRYPTO, BAD CRYPTO.

Details

Language :
English
ISSN :
10464468
Volume :
18
Issue :
8
Database :
Academic Search Index
Journal :
Network Computing
Publication Type :
Periodical
Accession number :
25087666