نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Despite a renewed focus in the field of global health on strengthening health systems, inadequate attention has been directed to a key ingredient of high-performing health systems: management. We aimed to develop the argument that management – defined here as the process of achieving predetermined objectives through human, financial, and technical resources – is a cross-cutting function necessa...

2005
Wesley Willett Jyh-How Huang Shivakant Mishra

This paper describes support for batch rekeying in Mykil, a key management system for supporting secure group multicast. Batch rekeying in Mykil allows for substantial reductions in the cost and complexity of rekeying operations, arguably the expensive portion of the system. By accumulating join and leave operations and utilizing an algorithmic approach to minimize the number of necessary rekey...

1995
Ashar Aziz

We present a key-distribution scheme that is particularly well suited for use in conjunction with a session-less datagram protocol such as IP or IPv6. We describe how this scheme can be used for both IP unicast and multicast applications, providing an approach for scalable multicast key distribution. We also describe an implementation of this scheme on the Solaris operating system, and present ...

1994
Matt Blaze

As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. Cryptographic techniques can play an important role in protecting communication links and file data, since access to data can be limited to those who hold the proper key. In the case of file data...

Journal: :CoRR 2017
Michael Egorov MacLane Wilkison

NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data [1]. It provides encryption and cryptographic access control, performed by a decentralized network, leveraging proxy re-encryption [2]. Unlike centralized KMS as a service solutions, it doesn’t require trusting a service ...

2000
Michael Herz

Agilent Technologies Boeblingen Verification Solutions is offering a variety of remote system management products. This paper will summarize the key technologies on which Agilents remote system management solutions are based. This includes the underlying standards, knowledge in remote management and diagnostics, as well as IP-based design of highly integrated systems on chip.

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

2010
K. Johnston

ABSTRACS: ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in ...

Journal: :Journal of information and communication convergence engineering 2014

Journal: :Procedia - Social and Behavioral Sciences 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید