Controlling the use of cryptographic keys

For high integrity cryptographic systems, the control mechanisms are already available as exemplified by the IBM symmetric and asymmetric control vector approaches. These have been designed for effective extension. Such mechanisms are always inevitably in conflict with existing standards which have...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 1995-01, Vol.14 (7), p.587-598
1. Verfasser: Holloway, Christopher J
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:For high integrity cryptographic systems, the control mechanisms are already available as exemplified by the IBM symmetric and asymmetric control vector approaches. These have been designed for effective extension. Such mechanisms are always inevitably in conflict with existing standards which have not sought to define control over key usage. It would be of considerable value to the community as a whole if a consolidated and effective mechanism were to be standardized in the future.
ISSN:0167-4048
1872-6208
DOI:10.1016/0167-4048(96)81665-8