Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Placement of cryptographic key distribution within OSI: design alternatives and assessment
Computer Networks and ISDN Systems
Computer Security and Industrial Cryptography: State of the Art and Evolution: ESAT Course, Leuven, Belgium, May 21-23, 1991
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Securing the core with an Enterprise Key Management Infrastructure (EKMI)
Proceedings of the 7th symposium on Identity and trust on the Internet
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computer Research
WSEAS Transactions on Information Science and Applications
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computers
Hi-index | 0.00 |
One of the major problems that security aware organizations, such as the military, are concerned with when introducing innovative computational systems inside their operations is the fact that such systems will be allowing the sharing of critical information between multiple users that are connected on different terminals and are possibly located in different sites. All these features represent possible compromises in information security and hence demand the use of advanced encryption algorithms. In the case of such large scale systems, the concept of information lifecycle management has been proposed to help rationalise disk usage for distributed data storage and backup. In this paper the need for a standard to offer services for information security by encryption in such systems is explained. Such schemes exist for the case of asymmetric encryption but not for the case of symmetric key encryption. The requirements from a key management scheme are outlined. An extension of the concept of lifecycle management is proposed for this purpose. The secret key management scheme is shown to be suitable for providing an integrated information protection solution for military and critical civil systems.