Title :
Examining the technologies and processes for key management in the enterprise and the way forward into the virtualized environment
Author :
Farroha, Bassam ; Farroha, Deborah ; Cohen, Andy
Author_Institution :
Dept. of Defense, Ft Meade, MD, USA
Abstract :
This investigation into cryptographic key management highlights the methods and rationale for the Department of Defense´s approach in developing a national strategy for generating and managing crypto keys to protect sensitive data being processed on the various information systems. The study provides a way forward into how the systems would work and interoperate under the new architecture utilizing the cloud-based infrastructure for storage and services to the enterprise. This effort is part of the department´s comprehensive Enterprise Security Management (ESM) program. The focus here is on the use of encryption techniques for protection and the crypto key management support they require. The paper also presents alternatives and tradeoffs for their realization.
Keywords :
information systems; military computing; private key cryptography; public key cryptography; Department of Defense approach; cloud- based infrastructure; cryptographic key management; encryption techniques; enterprise security management program; information systems; key management process; national strategy; virtualized environment; Digital signatures; Encryption; Personnel; Process control; Public key;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4673-0079-7
DOI :
10.1109/MILCOM.2011.6127511