Filters








1,148 Hits in 4.3 sec

Keys under doormats

Harold "Hal" Abelson, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie (+3 others)
2015 Communications of the ACM  
Today we are again hearing calls for regulation to mandate the provision of exceptional access mechanisms.  ...  Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data.  ...  Going back to the encryption methods of the 1990s, with separate keys for encryption and authentication, would not only double the computational effort required, but introduce many opportunities for design  ... 
doi:10.1145/2814825 fatcat:scbxwuxcknd3dnkm3bb2nzpfxy

Microcomputer security issues in an office environment

I.S. Zaritsky
1988 Computers & security  
POLICY a. SECURITY POLICY -There must be an explicit and welldefined security policy enforced by the system.  ...  Group file encryption: Some devices allow files to be grouped together for mass encryption on a single encryption key. This may be by named list or by entire subdirectory. j.  ...  Enforcement.  ... 
doi:10.1016/0167-4048(88)90207-6 fatcat:vxkwgklk2zgbllbsjfewxslja4

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller (+3 others)
2015 Journal of Cybersecurity  
Today, there are again calls for regulation to mandate the provision of exceptional access mechanisms.  ...  Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data.  ...  The MIT Internet Policy Research Initiative, supported by the Hewlett Foundation and the Ford Foundation, convened the authors and helped to produce the final version of this paper.  ... 
doi:10.1093/cybsec/tyv009 dblp:journals/cybersecurity/AbelsonABBBDGG015 fatcat:s3c4maqnezg7jiuqtu2nw5cejm

Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques [chapter]

Faisal Tawfiq Ammari, Joan Lu
2020 Securing the Internet of Things  
Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts.  ...  Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes.  ...  The ability to enforce security policies efficiently without the need to look up the underlying document. 4.  ... 
doi:10.4018/978-1-5225-9866-4.ch039 fatcat:s5dguiswgbaj3mkn6exvsfl6em

Improving the Safety and Security of the Pharmaceutical Supply Chain [chapter]

Mark Harrison, Tatsuya Inaba
2008 Networked RFID Systems and Lightweight Cryptography  
Acknowledgments The authors wish to thank the reviewers from Cardinal Health and Cyclone Commerce for additional insights and recent updates, which have now been included within this paper.  ...  which will result from the enforcement of pedigree legislation [1] and introduction of mass-serialization, which are being introduced imminently in order to make the pharmaceutical supply chain safer  ...  When mass serialization is introduced, it would be inappropriate for the distributor to re-use the serialized identifier of the bulk product for each of the smaller packages broken down from it, since  ... 
doi:10.1007/978-3-540-71641-9_12 fatcat:nzhfyio5zjeexbk4tsdptyaama

D3.5 Risks and security elements for a hyper-connected smart city

Jin Nakasawa, Arturo Medela, Antonis Litke, Xavier Cases, Koumoto Takafumi, Sonia Sotero, Akira Tsuge, Tadashi Okoshi, Aamir Bokhari, Mathieu Gallisot, Kenji Tei, Keiko Doguchi
2020 Zenodo  
TPM will encrypt data to reduce this risk. Serial connection is to be clamped and Locked.  ...  One way to enforce this is through the use of encryption.  ... 
doi:10.5281/zenodo.4234379 fatcat:qic656ap2jhozcpqjigyzenjva

Aspect-Oriented Runtime Monitor Certification [chapter]

Kevin W. Hamlen, Micah M. Jones, Meera Sridhar
2012 Lecture Notes in Computer Science  
Experiments on a variety of real-world policies and Java applications demonstrate that the approach is practical and effective.  ...  Rather than relying upon trusted advice, the system verifies semantic properties expressed in a purely declarative policy specification language.  ...  For multivalent, a document browsing utility, we enforced a policy that disallows saving a PDF document until a call has first been made to its built-in encryption method.  ... 
doi:10.1007/978-3-642-28756-5_10 fatcat:f44u3dq7cnhoppkaixqf236aqu

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

Christopher Soghoian
2010 Journal on Telecommunications and High Technology Law  
Pretty much everyone in the tech industry agrees it's the future-including Microsoft, which last week devoted much of its annual conference for developers to a rollout of new cloud technologies and a pep  ...  Luckily, even with the widespread use of encryption, there is still a way for government agents to get access to data: the black bag job, a search method already in widespread use. 115 s noted earlier  ...  Posting of Saul Hansell to New York Times Bits blog, Google Fights for the Right to Hide Its Privacy Policy, http://bits.blogs.nytimes.com/2008/05/27/google-fights-for-theright-to-hide-its-privacy-policy  ... 
dblp:journals/jthtl/Soghoian10 fatcat:ugbafmlppbgpvnpv7adegknmhi

Strengthening Authentication within OpenStack Cloud Computing System through Federation with ADDS System

Trinath Basu M
2020 International Journal of Emerging Trends in Engineering Research  
The proposed method implemented within the Open Stack through making changes to the source code, addition of independent components, and customization of the configuration files.  ...  Open source cloud computing systems are frequently being used for the development of private cloud so that the cloud computing system can be updated and customized to meet the needs of the business establishments  ...  Active Directory Rights Management Services controls encryption and access control for email, documents, and web content.  ... 
doi:10.30534/ijeter/2020/29812020 fatcat:yl5ycqsbujh45ln5gkxjjq66oi

The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution

A. Michael Froomkin
1995 University of Pennsylvania law review  
Electrons have size, form, and mass, as do digitized and encrypted messages.  ...  the key for which the serial number was submitted.  ...  Using the first method, Alice generates the session key, encrypts it with Bob's public key, and sends it to him.  ... 
doi:10.2307/3312529 fatcat:2lx6judk65b2flyzwpnkcusj4e

Introduction from the editors [chapter]

Peter H. Cole, Damith C. Ranasinghe
2008 Networked RFID Systems and Lightweight Cryptography  
the enforcement of pedigree legislation and introduction of mass-serialization, which are being introduced imminently in order to make the pharmaceutical supply chain safer and more secure.  ...  Enforcing a change of serial ID and labeller code on repackaging is seen as essential.  ... 
doi:10.1007/978-3-540-71641-9_1 fatcat:mwdkaywdnbbh7hke2cehb6n57m

Kells

Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
These experiments indicate nominal overheads associated with host validation , showing a worst case throughput overhead of 1.22% for read operations and 2.78% for writes.  ...  B Policy Extensions for MLS The concept of multiple partitions used with Kells, along with a processor capable of enforcing policy, allows for interesting methods for enforcing more complex policies.  ...  Additionally, Sion [39] has explored methods of ensuring policy enforcement at the storage level while considering the limitations of trusted hardware.  ... 
doi:10.1145/1920261.1920296 dblp:conf/acsac/ButlerMM10 fatcat:r5gpe6uoxvhb3dknwamdatxjtu

Improving the Open Stack Authentication system through federation with JASON Tokens

M Trinath Basu
2019 International Journal of Advanced Trends in Computer Science and Engineering  
the Vulnerabilities existing in the open stack for enforcing security within the Keystone module of Open stack.  ...  In this paper, a review of the Open stack presented, bringing out different kinds of vulnerabilities that exist in authenticating the users and a federation method using JSON tokens showed that help eliminating  ...  policy-based security enforcement.  ... 
doi:10.30534/ijatcse/2019/143862019 fatcat:njkikbraxrdz7b74663catp55y

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
Unlike in the US however, freeware and mass market encryption software is excluded from export controls in Germany.  ...  for Implementing Adaptive Security Policies' M Carney, B Loe, Usenix Security 98 pp 1 14 Four methods for implementing adaptive security policies in a separated security server database and kernel environment  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

Software engineering for security

Premkumar T. Devanbu, Stuart Stubblebine
2000 Proceedings of the conference on The future of Software engineering - ICSE '00  
Policy languages are implemented by enforcement mechanisms. There are a wide range of approaches [55, 34, 72] for policy enforcement.  ...  The PDCM system must be flexible in this regard, but must take responsibility for enforcing such policies.  ... 
doi:10.1145/336512.336559 dblp:conf/icse/DevanbuS00 fatcat:o4pwgaalcjbt5nipfgzqkyhck4
« Previous Showing results 1 — 15 out of 1,148 results