F O U N D AT I O N S F O R A N A LY Z I N G S E C U R I T Y A P I S I N T H E S Y M B O L I C A N D C O M P U TAT I O N A L M O D E L
Tahun : 2013 Pengarang : robert künnemann Penerbit : Foundations for analyzing security Ket : Security critical applications often store keys on dedicated Hardware
Security Modules (HSMs) or key-management servers to separate sensitive cryptographic operations from more vulnerable parts of the
network. Access to such devices is given to protocol parties by the
means of Security APIs, e.g., the RSA PKCS#11 standard, IBM’s CCA
and the Trusted Platform Module (TPM) API, all of which protect keys
by providing an API that allows to address keys only indirectly. Ketegori : DATA SECURITY