Affiliation:
1. Purdue Univ., West Lafayette, IN
Abstract
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.
Publisher
Association for Computing Machinery (ACM)
Reference17 articles.
1. New directions in cryptography
2. Konheim A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100) IBM Thomas J. Watson Res. Ctr. Yorktown Heights N.Y. March 1978.]] Konheim A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100) IBM Thomas J. Watson Res. Ctr. Yorktown Heights N.Y. March 1978.]]
3. A note on the confinement problem
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. References;Applied Cryptography, Second Edition;2015-10-09
2. ES-MPICH2: A Message Passing Interface with Enhanced Security;IEEE Transactions on Dependable and Secure Computing;2012-05
3. Biometric Authentication in the Digital Age;Advances in Human and Social Aspects of Technology;2012
4. Run-time label propagation for forensic audit data;Computers & Security;2007-12
5. Key references in distributed computer systems 1959–1989;Distributed Computer Systems;1990