Title :
Considerations for applying disk encryptors to environments subject to hostile overrun
Author_Institution :
Mitre Corp., McLean, VA
Abstract :
The paper presents a list of considerations for applying a commercial off-the-shelf disk encryptor to an environment where hostile overrun is a significant threat. The considerations include: how the encryption device is configured and interfaced to the workstation, host, or server; encryption key management including key entry, changeover, and quick destruct; and long term off-line storage
Keywords :
cryptography; file organisation; military computing; disk encryptors; encryption key management; hostile overrun; key entry; military environment; off-line storage; off-the-shelf disk encryptor; quick destruct; Cryptography; Drives; Environmental management; File servers; Hard disks; Information security; Operating systems; Packaging; Secure storage; Workstations;
Conference_Titel :
Computer Security Applications Conference, 1991. Proceedings., Seventh Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-2280-6
DOI :
10.1109/CSAC.1991.213003