Issue No.03 - May/June (2010 vol.14)
Stephen Farrell , Trinity College Dublin
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2010.62
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.
application layer crypto, confidentiality, object security, Internet
Stephen Farrell, "Applications Directly Using Cryptography", IEEE Internet Computing, vol.14, no. 3, pp. 84-87, May/June 2010, doi:10.1109/MIC.2010.62