Rantos, Kostas and Mitchell, Chris J (2005) Matching key recovery mechanisms to business requirements. Computers and Security, 24 (3).
Full text access: Open
This paper addresses the business needs for key recovery as a counter-measure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are indentified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms to these two cases.
This is a Submitted version This version's date is: 2005 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/70856266-529d-09b1-1f39-7fb0e16df91b/7/
Deposited by Research Information System (atira) on 03-Jul-2014 in Royal Holloway Research Online.Last modified on 03-Jul-2014
The eprint is the authors' final draft. The published version may be found at the Science Direct link given. Copyright 2005 Elsevier Science B.V., Amsterdam.