Applications of Trusted Review to Information Security

  • Authors:
  • John Yesberg;Marie Henderson

  • Affiliations:
  • -;-

  • Venue:
  • ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

The review process is an important part of many everyday activities. We introduce the concept of trusted review for electronic data. The review process is performed using an insertable security device called a Trusted Reviewer. The Trusted Reviewer can be designed to satisfy high assurance evaluation requirements. We show how the Trusted Reviewer can offer increased security in messaging, certification authorities, funds transfer, witnessing, and information downgrade.