Reference Citations - HerongYang.com - v2.94, by Herong Yang
Distributed Key Systems: Enhancing Security...
'Cryptography Tutorials - Herong's Tutorial Examples' tutorials were cited in an 'Issues in Information Systems' paper in 2013.
The Cryptography Tutorials - Herong's Tutorial Examples tutorials were cited in an "Issues in Information Systems" paper in 2013.
Subject: DISTRIBUTED KEY SYSTEMS: ENHANCING SECURITY, FAULT TOLERANCE AND DISASTER RECOVERY IN CLOUD COMPUTING Date: Aug 31, 2013 Author: Erich Rice, Paul Safonov, and Dennis Guster from Saint Cloud State University Source: http://www.iacis.org/iis/2013/320_iis_2013_444-451.pdf ABSTRACT Cloud computing has increased the need for sound and sophisticated security strategies. Although encryption is the primary mechanism to provide security in data transmission, cloud computing offers both advantages and disadvantages to enhancing the encryption process. Encryption algorithms currently available are robust, but are well known and require a “key” to make a session unique. Therefore, if the key is compromised the encryption can be unlocked no matter how robust the algorithm. In the classical model, a node in a network contains the entire key, and if compromised, then potentially the entire cloud’s security could be breached. Also, if the key were destroyed then all the data it protects could be lost, because the data couldn’t be unencrypted. Therefore, splitting the key and storing portions on multiple nodes within a cloud would make it more difficult to compromise or lose the key. Further, the key could be striped (like a RAID, Redundant Array of Independent Disks) so if distributed across multiple nodes some could fail and the key could still be recovered. This methodology could create greater security, while providing greater fault tolerance by allowing retrieval of the entire key even if some nodes were compromised or destroyed. ... REFERENCES 1. Abdalla, M., Bellare, M., & Neven, G. (2008). Robust Encryption, Cryptology ePrint Archive, 2008/440. Retrieved from http://eprint.iacr.org/2008/440.pdf. 2. Barker, E., & Roginsky, A. (2012). Recommendation for Cryptographic Key Generation, NIST Special Publication 800-133. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133.pdf. ... 11. Herong, Y. (2013). Cryptography Tutorials – Herong’s Tutorial Examples. Retrieved from https://www.herongyang.com/Cryptography/. ...
Table of Contents
(Android) Getting Current Date and Time
Deatil View with other language
Web-palveluiden koostaminen: web- ja RESTful-palvelut
Corso di Architetture Orientate ai Servizi
Hardening a SAS Installation on a multi tier installation on Linux
[scala-user] for-loops still not optimized in 2.10?
.bin/.cue - the purpose of .cue?
(horror movie) com.hellogood.eCalendar
Using keytool to convert bks file to p12
Error while using LWP::Socket to send XML Data
Distributed Key System Broken Up Over Multiple Nodes
Cant receive MMS with wifi turned on
Including and using the MySql.Data.dll on your web host server
►Distributed Key Systems: Enhancing Security...
WP Spreadplugin Basket not shown
How do you get multiple resultset from a single CallableStatement?
Blowfish Cipher Algorithm in Java