Publication | Closed Access
Interpretative Key Management (IKM), A Novel Framework
11
Citations
3
References
2010
Year
Unknown Venue
EngineeringBusiness IntelligenceInformation SecurityCryptographic TechnologyInterpretative Key ManagementPublic Key AlgorithmData ScienceManagementKeyvalue DatabaseData ManagementAuthentication ProtocolCryptography KeysData PrivacyComputer ScienceInformation ManagementKey ManagementData SecurityCryptographyCryptographic ProtectionKey Management MethodData Modeling
Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Today's practices for managing keys face many issues in key generation, distribution, and revocation. In this paper we propose interpretative key management method which is simpler than the current practices. Eliminating the need for key storage, the need for key distribution, automatic key revocation, and unique key per session are the main features of the new proposed key management method. Deletion of some steps and replacing some others with new ones helped us to dominate many issues faced with common practices of key management.
| Year | Citations | |
|---|---|---|
Page 1
Page 1