Results 261 to 270 of about 1,483,664 (290)
Some of the next articles are maybe not open access.
Management's Key Responsibility
Journal of Applied Corporate Finance, 2018Bartley Madden, a leading management consultant and author, follows up after Edmund Phelps' leading article on innovation and mass flourishing with specific recommendations for business managers.Madden identifies a firm's knowledgebuilding proficiency as its most important capability in order to survive and prosper over the long term.
openaire +3 more sources
Cryptographic key management for the masses
Network Security, 2006Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided.
openaire +2 more sources
2012
Abstract This chapter focuses on the fundamental principles and techniques relating to key management. Since key management needs to be tailored to the environment within which cryptography is being used, this chapters discusses the pros and cons of different approaches to the management of cryptographic keys.
openaire +1 more source
Abstract This chapter focuses on the fundamental principles and techniques relating to key management. Since key management needs to be tailored to the environment within which cryptography is being used, this chapters discusses the pros and cons of different approaches to the management of cryptographic keys.
openaire +1 more source
IEEE Journal on Selected Areas in Communications, 1993
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept will be ineffective if the key management is weak.
W. Fumy, Peter Landrock
openaire +2 more sources
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept will be ineffective if the key management is weak.
W. Fumy, Peter Landrock
openaire +2 more sources
2015
This chapter is all about encryption keys in the SQL Server database and how to setup and secure those keys.
openaire +2 more sources
This chapter is all about encryption keys in the SQL Server database and how to setup and secure those keys.
openaire +2 more sources
The management of symmetric keys
Information Security Technical Report, 1997Abstract This paper defines three classes of key management protocol that can be used to establish symmetric cryptographic keys. It explores the relationship between the classes and the communications techniques used to carry data protected by the symmetric keys.
openaire +2 more sources
Authentication and Key Management
1999In this Chapter the issues concerning user/entity authentication and the problem of key management are discussed in depth. In Section 1.2.1 the user/data authentication paradigm was introduced. In order to be able to enforce any security scheme it is necessary that every entity in the network is always convinced of the identity of the other parties it ...
Paul Ashley, Mark Vandenwauver
openaire +2 more sources
2009
In very high security situations laws, regulations and IT policies impose very strict prohibitions againststoring encryption keys in the same database (or even on the same physical device) as the datawhich it protects. To address this need, SQL Server 2008 provides an option known as extensible keymanagement (EKM).
Michael Coles, Rodney Landrum
openaire +2 more sources
In very high security situations laws, regulations and IT policies impose very strict prohibitions againststoring encryption keys in the same database (or even on the same physical device) as the datawhich it protects. To address this need, SQL Server 2008 provides an option known as extensible keymanagement (EKM).
Michael Coles, Rodney Landrum
openaire +2 more sources
Industrial Marketing Management, 2004
Abstract Despite the rapid growth of business network research, effective approaches for systematic network management are still in their infancy. This article introduces a systematic approach for managing networks—key network management (KNM). This emerges by expanding the ideas of key account management (KAM) into the network context. A key network
openaire +2 more sources
Abstract Despite the rapid growth of business network research, effective approaches for systematic network management are still in their infancy. This article introduces a systematic approach for managing networks—key network management (KNM). This emerges by expanding the ideas of key account management (KAM) into the network context. A key network
openaire +2 more sources
1998
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use.
openaire +2 more sources
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use.
openaire +2 more sources

