منابع مشابه
Identity Escrow
We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity , one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number...
متن کاملDemocratic Key Escrow Scheme
Cryptography is a dual-edged sword. On the one hand, it allows secure electronic communications by legitimate users. On the other hand, it can be used by criminals to thwart law enforcement efforts and by foreign countries to prevent security agencies from gathering intelligence information about these countries. However, the widespread use of cryptography is critical to the establishment of th...
متن کاملTheory and Practice of Transactional Method Caching
Nowadays, tiered architectures are widely accepted for constructing large scale information systems. In this context application servers often form the bottleneck for a system’s efficiency. An application server exposes an object oriented interface consisting of set of methods which are accessed by potentially remote clients. The idea of method caching is to store results of read-only method in...
متن کاملOn the Difficulty of Software Key Escrow
At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to en-crypt in such a way that the receiver can be traced by an authority having additional information. This paper shows that the proposed scheme does not have the required properties, by devising three non-speciied protocols misleading the authority. We also discuss how to repair Desmedt's scheme, such that our attacks are n...
متن کاملConsent in escrow
Disasters such as flash flooding, mass shootings, and train and airplane accidents involving large numbers of victims produce significant opportunity for research in the biosciences. This opportunity exists in the extreme tails of life events, however, during which decisions about life and death, valuing and foregoing, speed and patience, trust and distrust, are tested simultaneously and abunda...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Database Systems
سال: 1986
ISSN: 0362-5915,1557-4644
DOI: 10.1145/7239.7265