Working Group Report on Internet/Intranet Security

  • Authors:
  • Barbara C. Davis;Tatu Ylönen

  • Affiliations:
  • -;-

  • Venue:
  • WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Abstract: The Internet/Intranet Security Working Group's discussions focused on the various models for key recovery and/or key backup. Opinions were given on the types of fault tolerance (redundant paths to keys) that should be provided. The discussion invariably focused on the side-effect of key backup, which is the opening of the door to key escrow and law enforcement. Security within the Internet/intranet environment continues to be a rapid growth area. In the past year, many more security solutions have become available. The integration of security into an enterprise continues to be a balancing act between the costs of the security implementation and the value of the data that is being protected. What continues to be a goal is the development of an information infrastructure that incorporates and supports security functionality. Without this infrastructure, there can be no real secure communications outside of an enterprise.