The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2000 vol.17)
pp: 52-58
In large-scale systems, partitioning keys among higher-level structures becomes necessary. Establishing and managing these structures as security domains requires an underlying infrastructure to securely provide local services.
John R. Michener, Tolga Acar, "Security Domains: Key Management in Large-Scale Systems", IEEE Software, vol.17, no. 5, pp. 52-58, September/October 2000, doi:10.1109/52.877864
1. Information Security: An Integrated Collection of Essays, M. Abrams, S. Jajodia, and H. Podell, eds., IEEE Computer Soc. Press, Los Alamitos, Calif., 1995.
2. D.P. Maher, "Trust in the New Information Age," AT&T Technical J., Sept./Oct. 1994, pp. 9-16.
3. S. Berkovits, "How to Broadcast a Secret," Lecture Notes in ComputerScience, No. 547, Springer-Verlag, Berlin, 1991, pp. 535-541.
4. E. Gafni, J. Staddon, and Y.L. Yin, "Efficient Methods for Integrating Traceability and Broadcast Encryption," Lecture Notes in Computer Science, No. 1666, Springer-Verlag, Berlin, 1999, pp. 372-387.
5. B. Schneier, Applied Cryptography, John Wiley&Sons, New York, 1996.
6. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla., 1996, pp. 543-590.
7. Paul F. Syverson, "Limitations on Design Principles for Public Key Protocols," Proc. 1996 IEEE Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., 1996, pp. 62-73.
8. J.R. Michener, "System Insecurity in the Internet Age," IEEE Software, Vol. 16, No. 4, July/Aug. 1999, pp. 62-69.
9. L.B. Kennard, "With NICI: It's All Holes Barred," NetWare Connection, Vol. 9, No. 11, Dec. 1998, pp. 8-20.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool