The Community for Technology Leaders
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (1997)
MIT, Cambridge, MA
June 18, 1997 to June 20, 1997
ISBN: 0-8186-7967-0
pp: 0305
B.C. Davis , Appl. Knowledge Group LC, Reston, VA., USA
T. Ylonen , Appl. Knowledge Group LC, Reston, VA., USA
ABSTRACT
Abstract: The Internet/Intranet Security Working Group's discussions focused on the various models for key recovery and/or key backup. Opinions were given on the types of fault tolerance (redundant paths to keys) that should be provided. The discussion invariably focused on the side-effect of key backup, which is the opening of the door to key escrow and law enforcement. Security within the Internet/intranet environment continues to be a rapid growth area. In the past year, many more security solutions have become available. The integration of security into an enterprise continues to be a balancing act between the costs of the security implementation and the value of the data that is being protected. What continues to be a goal is the development of an information infrastructure that incorporates and supports security functionality. Without this infrastructure, there can be no real secure communications outside of an enterprise.
INDEX TERMS
Internet; Internet security; intranet security; key recovery; key backup; fault tolerance; redundant paths; key escrow; law enforcement; security implementation costs; data protection; data value; information infrastructure; security functionality; secure communications; enterprises
CITATION

B. Davis and T. Ylonen, "Working Group Report on Internet/Intranet Security," Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE), MIT, Cambridge, MA, 1997, pp. 0305.
doi:10.1109/ENABL.1997.630830
89 ms
(Ver 3.3 (11022016))