The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2004 vol. 8)
ISSN: 1089-7801
pp: 18-24
Kenneth Goldman , IBM T.J. Watson Research Center
Enriquillo Valdez , IBM T.J. Watson Research Center
Homeland security requires that organizations share sensitive data, but both suppliers and users must typically restrict data access for security, legal, or business reasons. Matchbox database servers provide highly secure, fine-grained access control using digitally cosigned contracts to enforce sharing restrictions. To handle security operations, Matchbox uses the tamper-responding, programmable IBM 4758 cryptographic coprocessor. Matchbox servers can be distributed on a network for high availability, and parties can communicate with Matchbox over public networks — including hostile environments with untrusted hardware, software, and administrators.
Network-level security and protection, Infrastructure protection, Security and privacy protection, Access controls, Authentication, Cryptographic controls, Data encryption, Public key cryptosystems, Database management, Database security, Data mining

E. Valdez and K. Goldman, "Matchbox: Secure Data Sharing," in IEEE Internet Computing, vol. 8, no. , pp. 18-24, 2004.
94 ms
(Ver 3.3 (11022016))