Matching key recovery mechanisms to business requirements

Chris J. Mitchell and Rantos, K.

(2004)

Chris J. Mitchell and Rantos, K. (2004) Matching key recovery mechanisms to business requirements. Computers and security, 24 (3).

Our Full Text Deposits

Full text access: Open

Full Text - 167.26 KB

Links to Copies of this Item Held Elsewhere


Abstract

This paper addresses the business needs for key recovery as a counter-measure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are indentified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms to these two cases.

Information about this Version

This is a Published version
This version's date is: 11/2004
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/70856266-529d-09b1-1f39-7fb0e16df91b/1/

Item TypeJournal Article
TitleMatching key recovery mechanisms to business requirements
AuthorsMitchell, Chris
Rantos, K.
Uncontrolled Keywordskey recovery, key management, disaster recovery, encryption
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1016/j.cose.2004.08.010

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

The eprint is the authors' final draft. The published version may be found at the Science Direct link given.
Copyright 2005 Elsevier Science B.V., Amsterdam.


Details