Arată înregistrarea sumară a articolului
A Study of Key Management for Encrypted Storage in Storage Area Network
dc.contributor.author | Lu, Hai Xin | |
dc.date.accessioned | 2012-06-11T10:16:15Z | |
dc.date.available | 2012-06-11T10:16:15Z | |
dc.date.issued | 2009-01 | |
dc.identifier.issn | 1584-0409 | |
dc.identifier.uri | http://10.11.10.50/xmlui/handle/123456789/864 | |
dc.description | Articolul face parte din Analele Universitatii "Dunarea de Jos" din Galati, Fascicola de Economie si Informatica Aplicata, An XV, nr.1, vol.1/2009 | en_US |
dc.description.abstract | As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies. Without the proper key generation, distribution, storage, and recovery, valuable data will be eventually compromised [9]. Although a considerable amount of research has been dedicated to encryption algorithms in the past decades, key management becomes an issue due to the quantity of data. For example, with millions of data you will need million set of keys. To manage and keep track of these keys, complexity and operational inefficiency becomes an issue. How to manage keys becomes a challenging task. Adequate understanding of these new challenges is essential to effectively devise new key management policies and mechanisms to guard against them. We discuss many of these methods in this new context to fill this gap. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Universitas Galatiensis | en_US |
dc.subject | managementul cheilor de criptare | en_US |
dc.subject | informatică aplicată | en_US |
dc.subject | rețea | en_US |
dc.subject | stocare criptată | |
dc.title | A Study of Key Management for Encrypted Storage in Storage Area Network | en_US |
dc.type | Article | en_US |
Fișiere la acest articol
Acest articol apare în următoarele colecții(s)
-
2009 fascicula1 nr1 [29]