Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (1997)
MIT, Cambridge, MA
June 18, 1997 to June 20, 1997
B.C. Davis , Appl. Knowledge Group LC, Reston, VA., USA
T. Ylonen , Appl. Knowledge Group LC, Reston, VA., USA
Abstract: The Internet/Intranet Security Working Group's discussions focused on the various models for key recovery and/or key backup. Opinions were given on the types of fault tolerance (redundant paths to keys) that should be provided. The discussion invariably focused on the side-effect of key backup, which is the opening of the door to key escrow and law enforcement. Security within the Internet/intranet environment continues to be a rapid growth area. In the past year, many more security solutions have become available. The integration of security into an enterprise continues to be a balancing act between the costs of the security implementation and the value of the data that is being protected. What continues to be a goal is the development of an information infrastructure that incorporates and supports security functionality. Without this infrastructure, there can be no real secure communications outside of an enterprise.
Internet; Internet security; intranet security; key recovery; key backup; fault tolerance; redundant paths; key escrow; law enforcement; security implementation costs; data protection; data value; information infrastructure; security functionality; secure communications; enterprises
B. Davis and T. Ylonen, "Working Group Report on Internet/Intranet Security," Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE), MIT, Cambridge, MA, 1997, pp. 0305.