Map
Index
Random
Help
th

Quote: split large-scale systems into security domains with their own SD-key server and key-access partition; tag all wrapped objects

topics > all references > references m-o > QuoteRef: michJR9_2000 , p. 52



Topic:
key distribution

Quotation Skeleton

We base our approach on the group-security-domain paradigm. … a common set of keys and are attached … Our approach divides the network into smaller virtual … … [p. 55] In our SD implementation for Novell's Directory … [Novell International Cryptography Infrastructure] as the local [cryptography] service. … We use a strongly tagged approach for all … [p. 56] Our structure lets the administrator distribute SD-key … to meet system demand. A key-access partition [KAP], which holds keying object (one per SD [for wrapping objects]), is associated … [p. 58] The tagged approach … supports key recovery as long as the SD-key …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: key distribution (33 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.