Matching key recovery mechanisms to business requirements

Rantos, Kostas and Mitchell, Chris J

(2005)

Rantos, Kostas and Mitchell, Chris J (2005) Matching key recovery mechanisms to business requirements. Computers and security, 24 (3).

Our Full Text Deposits

Full text access: Open

Full Text - 167.26 KB

Links to Copies of this Item Held Elsewhere


Abstract

This paper addresses the business needs for key recovery as a counter-measure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are indentified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms to these two cases.

Information about this Version

This is a Submitted version
This version's date is: 2005
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/70856266-529d-09b1-1f39-7fb0e16df91b/2/

Item TypeJournal Article
TitleMatching key recovery mechanisms to business requirements
AuthorsRantos, Kostas
Mitchell, Chris J
Uncontrolled Keywordskey recovery, key management, disaster recovery, encryption
DepartmentsResearch Groups and Centres\Information Security\ Information Security Group
Faculty of Science\Mathematics

Identifiers

doihttp://dx.doi.org/10.1016/j.cose.2004.08.010

Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012

Notes

The eprint is the authors' final draft. The published version may be found at the Science Direct link given.
Copyright 2005 Elsevier Science B.V., Amsterdam.


Details