DocumentCode :
3141622
Title :
Considerations for applying disk encryptors to environments subject to hostile overrun
Author :
Mallet, P.W.
Author_Institution :
Mitre Corp., McLean, VA
fYear :
1991
fDate :
2-6 Dec 1991
Firstpage :
218
Lastpage :
222
Abstract :
The paper presents a list of considerations for applying a commercial off-the-shelf disk encryptor to an environment where hostile overrun is a significant threat. The considerations include: how the encryption device is configured and interfaced to the workstation, host, or server; encryption key management including key entry, changeover, and quick destruct; and long term off-line storage
Keywords :
cryptography; file organisation; military computing; disk encryptors; encryption key management; hostile overrun; key entry; military environment; off-line storage; off-the-shelf disk encryptor; quick destruct; Cryptography; Drives; Environmental management; File servers; Hard disks; Information security; Operating systems; Packaging; Secure storage; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1991. Proceedings., Seventh Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-2280-6
Type :
conf
DOI :
10.1109/CSAC.1991.213003
Filename :
213003
Link To Document :
بازگشت