Map
Index
Random
Help
th

Quote: implement secrecy/authentication policies with key-or (one of several) and key-and (all keys)

topics > all references > references g-h > QuoteRef: giffDK7_1985 , p. gifford [



Topic:
authentication
Topic:
encryption
Topic:
security leaks and weaknesses

Note

Key-or function provides an encryption key that is decrypted by either key. Key-and requires both keys. Can then build any secrecy/ authentication policy. Define these by appending an "opener" to newly encrypted data followed by the encrypted key (see Gifford paper). Domains: prevent data from getting out. i.e. "confine" the data. eg physical barrier. Color rooms where wash the room of all information. problems if share any resources can communicate data eg on Multics can hit disk for a 1 -- allows about 70 baud.

Additional Titles

Quote: secure systems need to confine data to a domain; problems if share resource, e.g., channel of 'disk hits' allows 70baud

Related Topics up

Topic: authentication (87 items)
Topic: encryption (43 items)
Topic: security leaks and weaknesses (56 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.