Comparative analysis of cryptographic key management systems

I Kuzminykh, B Ghita, S Shiaeles - International Conference on Next …, 2020 - Springer
Managing cryptographic keys can be a complex task for an enterprise and particularly
difficult to scale when an increasing number of users and applications need to be managed …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats

I Kuzminykh, M Yevdokymenko… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
As more and more enterprises encrypt data in order to adhere to information security
policies and compliance rules, centralized key management is becoming increasingly …

Principles of key management

W Fumy, P Landrock - IEEE Journal on selected areas in …, 1993 - ieeexplore.ieee.org
Security services based on cryptographic mechanisms assume keys to be distributed prior to
secure communications. The secure management of these keys is one of the most critical …

[图书][B] Framework for Designing Cryptographic Key Management Systems

E Barker - 2011 - books.google.com
This Framework was initiated as a part of the NIST Cryptographic Key Management
Workshop. The goal was to define and develop technologies and standards that provide …

Dynamic key management schemes: a survey

CG Vinoth, P Ambiga - Advances in Natural and Applied Sciences, 2014 - go.gale.com
Over the last few years, as the requirements for data confidentiality and privacy have been
magnified, encryption of stored data has become a much more compelling value …

Key management in a non-trusted distributed environment

E Dawson, A Clark, M Looi - Future Generation Computer Systems, 2000 - Elsevier
Despite the fact that the World Wide Web is an untrusted environment, increasing use is
being made of this network (the Internet) in electronic commerce applications. To prevent …

Key Management for Enterprise Data Encryption

UT Mattsson - Available at SSRN 1051481, 2007 - papers.ssrn.com
One of the essential components of encryption that is often overlooked is key management-
the way cryptographic keys are generated and managed throughout their life. Since …

Design and implementation of a key-lifecycle management system

M Björkqvist, C Cachin, R Haas, XY Hu… - … Conference on Financial …, 2010 - Springer
Key management is the Achilles' heel of cryptography. This work presents a novel Key-
Lifecycle Management System (KLMS), which addresses two issues that have not been …

Key management standards hit the fast track

G Goth - IEEE Distributed Systems Online, 2007 - ieeexplore.ieee.org
As enterprises increasingly turn to encryption to meet data-security demands, they need
open standards for encryption key management. Three standards bodies--the IEEE, the …