Results 261 to 270 of about 1,483,664 (290)
Some of the next articles are maybe not open access.

Management's Key Responsibility

Journal of Applied Corporate Finance, 2018
Bartley Madden, a leading management consultant and author, follows up after Edmund Phelps' leading article on innovation and mass flourishing with specific recommendations for business managers.Madden identifies a firm's knowledgebuilding proficiency as its most important capability in order to survive and prosper over the long term.
openaire   +3 more sources

Cryptographic key management for the masses

Network Security, 2006
Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided.
openaire   +2 more sources

Key Management

2012
Abstract This chapter focuses on the fundamental principles and techniques relating to key management. Since key management needs to be tailored to the environment within which cryptography is being used, this chapters discusses the pros and cons of different approaches to the management of cryptographic keys.
openaire   +1 more source

Principles of key management

IEEE Journal on Selected Areas in Communications, 1993
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept will be ineffective if the key management is weak.
W. Fumy, Peter Landrock
openaire   +2 more sources

Key Management

2015
This chapter is all about encryption keys in the SQL Server database and how to setup and secure those keys.
openaire   +2 more sources

The management of symmetric keys

Information Security Technical Report, 1997
Abstract This paper defines three classes of key management protocol that can be used to establish symmetric cryptographic keys. It explores the relationship between the classes and the communications techniques used to carry data protected by the symmetric keys.
openaire   +2 more sources

Authentication and Key Management

1999
In this Chapter the issues concerning user/entity authentication and the problem of key management are discussed in depth. In Section 1.2.1 the user/data authentication paradigm was introduced. In order to be able to enforce any security scheme it is necessary that every entity in the network is always convinced of the identity of the other parties it ...
Paul Ashley, Mark Vandenwauver
openaire   +2 more sources

Extensible Key Management

2009
In very high security situations laws, regulations and IT policies impose very strict prohibitions againststoring encryption keys in the same database (or even on the same physical device) as the datawhich it protects. To address this need, SQL Server 2008 provides an option known as extensible keymanagement (EKM).
Michael Coles, Rodney Landrum
openaire   +2 more sources

Key network management

Industrial Marketing Management, 2004
Abstract Despite the rapid growth of business network research, effective approaches for systematic network management are still in their infancy. This article introduces a systematic approach for managing networks—key network management (KNM). This emerges by expanding the ideas of key account management (KAM) into the network context. A key network
openaire   +2 more sources

Key Management Techniques

1998
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use.
openaire   +2 more sources

Home - About - Disclaimer - Privacy