Matching key recovery mechanisms to business requirements

نویسندگان

  • Konstantinos Rantos
  • Chris J. Mitchell
چکیده

This paper addresses the business needs for key recovery as a countermeasure to the threat of losing potentially valuable information. Several requirements essential for a sound key recovery mechanism are described, and the applicability of two main classes of existing key recovery schemes to a corporate environment is examined. Different requirements are identified for key recovery mechanisms for communicated and archived data, and a further study is made of the applicability of existing mechanisms

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recovering Artifacts from Legacy Systems Using Pattern Matching

Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineer...

متن کامل

Goal-Oriented Requirement Engineering Support for Business Continuity Planning

Business continuity is a key management process that aims to maintain and rapidly recover an organizations key business functions in the face of serious incidents. The resulting business continuity plan must identify the key business functions that must be resilient, define recovery of critical business functions and define contingency measures when recovery is not possible. This paper argues t...

متن کامل

An Impact Estimator Using Propensity Score Matching: People’s Business Credit Program to Micro Entrepreneurs in Indonesia

P eople’s business credit program (KUR) has been launched to alleviate poverty through provision of micro financing to micro entrepreneurs in Indonesia This study aims to estimate the impact of KUR program using cross-sectional data and propensity score matching technique (PSM). The survey was conducted on 332 household entrepreneurs, consisting of 155 KUR receivers and 177 non-KUR r...

متن کامل

A family of case studies on business process mining using MARBLE

Business processes, most of which are automated by information systems, have become a key asset in organizations. Unfortunately, uncontrolled maintenance implies that information systems age overtime until they need to be modernized. During software modernization, ageing systems cannot be entirely discarded because they gradually embed meaningful business knowledge, which is not present in any ...

متن کامل

Query Record Blocking Many Possible Matches Scoring Match Probability Potential Match Record Matching

This paper seeks to describe the business requirements imposed on a record matching system along ten different dimensions. For each dimension, we present alternative requirements which different record matching clients might have. We seek to discuss the factors that might lead a client to determine that they have one requirement or another. The goal of the talk is to better prepare a client to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2005