Key management in a non-trusted distributed environment

被引:6
|
作者
Dawson, E [1 ]
Clark, A [1 ]
Looi, M [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
关键词
key management; key distribution; key storage; random number generator; World Wide Web;
D O I
10.1016/S0167-739X(99)00056-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made of this network (the Internet) in electronic commerce applications. To prevent attacks a strong security architecture is required. A fundamental part of such an architecture is a method for key management. This paper discusses the various components of cryptographic key management especially in relation to the World Wide Web environment. Issues and problems with key generation, key distribution and key storage are raised. An overview is presented of key management systems in several security architectures including SSL, Kerberos and Sesame. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:319 / 329
页数:11
相关论文
共 50 条
  • [1] GPShare: Grid Position Sharing in Non-trusted Environment
    Pramkaew, Chakan
    Ngamsuriyaroj, Sudsanguan
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 368 - 373
  • [2] Shielding Non-Trusted IPs in SoCs
    Hategekimana, Festus
    Whitaker, Taylor
    Pantho, Md Jubaer Hossain
    Bobda, Christophe
    2017 27TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2017,
  • [3] Secure Integration of Non-Trusted IPs in SoCs
    Hategekimana, Festus
    Whitaker, Taylor J. L.
    Pantho, Md Jubaer Hossain
    Bobda, Christophe
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 103 - 108
  • [4] WITDOM: Empowering Privacy and Security in Non-trusted Environments
    Ramon Troncoso-Pastoriza, Juan
    Prieto Perez, Elsa
    ERCIM NEWS, 2016, (104): : 42 - +
  • [5] Position Sharing for Location Privacy in Non-trusted Systems
    Duerr, Frank
    Skvortsov, Pavel
    Rothermel, Kurt
    2011 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2011), 2011, : 189 - 196
  • [6] Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays
    Waqas, Muhammad
    Ahmed, Manzoor
    Li, Yong
    Jin, Depeng
    Chen, Sheng
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) : 3918 - 3930
  • [7] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
  • [8] A NEW SESSION KEY AGREEMENT PROTOCOL IN DISTRIBUTED TRUSTED CENTERS ENVIRONMENT
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 271 - +
  • [9] Anonymization Scheme Using Non-Trusted Agent for Location Based Services
    Ko, Myungah
    Choi, Myungwhan
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 575 - 577
  • [10] An anonymous auction protocol with a single non-trusted center using binary trees
    Omote, K
    Miyaji, A
    INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 108 - 120