Chris J. Mitchell and Rantos, K. (2004) Matching key recovery mechanisms to business requirements. Computers and security, 24 (3).
Full text access: Open
This paper addresses the business needs for key recovery as a counter-measure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are indentified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms to these two cases.
This is a Published version This version's date is: 11/2004 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/70856266-529d-09b1-1f39-7fb0e16df91b/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
The eprint is the authors' final draft. The published version may be found at the Science Direct link given. Copyright 2005 Elsevier Science B.V., Amsterdam.