Article ID Journal Published Year Pages File Type
10340801 Computers & Security 2005 14 Pages PDF
Abstract
This paper addresses the business needs for key recovery as a countermeasure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are identified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms to these two cases.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,