Loading...

F O U N D AT I O N S F O R A N A LY Z I N G S E C U R I T Y A P I S I N T H E S Y M B O L I C A N D C O M P U TAT I O N A L M O D E L

Tahun : 2013
Pengarang : robert künnemann
Penerbit : Foundations for analyzing security
Ket : Security critical applications often store keys on dedicated Hardware Security Modules (HSMs) or key-management servers to separate sensitive cryptographic operations from more vulnerable parts of the network. Access to such devices is given to protocol parties by the means of Security APIs, e.g., the RSA PKCS#11 standard, IBM’s CCA and the Trusted Platform Module (TPM) API, all of which protect keys by providing an API that allows to address keys only indirectly.
Ketegori : DATA SECURITY

Download