Access Restriction

Author Denning, Dorothy E.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Public-key encryption ♦ Networks ♦ Privacy ♦ Personal computing ♦ Security
Abstract A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.
Description Affiliation: Purdue Univ., West Lafayette, IN (Denning, Dorothy E.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 22
Issue Number 8
Page Count 7
Starting Page 476
Ending Page 482

Open content in new tab

   Open content in new tab
Source: ACM Digital Library