We base our approach on the group-security-domain paradigm. … a common set of keys and are attached … Our approach divides the network into smaller virtual … … [p. 55] In our SD implementation for Novell's Directory … [Novell International Cryptography Infrastructure] as the local [cryptography] service. … We use a strongly tagged approach for all … [p. 56] Our structure lets the administrator distribute SD-key … to meet system demand. A key-access partition [KAP], which holds keying object (one per SD [for wrapping objects]), is associated … [p. 58] The tagged approach … supports key recovery as long as the SD-key …
Google-1
Google-2
Copyright clearance needed for quotation.