A review of information security issues and respective research contributions
ACM SIGMIS Database
Strategies for improving the parametric yield and profits of 3D ICs
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
Hi-index | 0.00 |
Abstract: The Internet/Intranet Security Working Group's discussions focused on the various models for key recovery and/or key backup. Opinions were given on the types of fault tolerance (redundant paths to keys) that should be provided. The discussion invariably focused on the side-effect of key backup, which is the opening of the door to key escrow and law enforcement. Security within the Internet/intranet environment continues to be a rapid growth area. In the past year, many more security solutions have become available. The integration of security into an enterprise continues to be a balancing act between the costs of the security implementation and the value of the data that is being protected. What continues to be a goal is the development of an information infrastructure that incorporates and supports security functionality. Without this infrastructure, there can be no real secure communications outside of an enterprise.