2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T) 2020
DOI: 10.1109/picst51311.2020.9467909
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Encryption Key Management Systems: Strengths, Weaknesses, Opportunities, Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In the second part, the results were aggregated into groups based on the attributes, to rank issues and measures, and to calculate percentages, which gives a clear image of how the users view the issues, the results of the measures, and if there is a difference between the groups that need to be considered. In the third part, the SWOT analysis framework was used as an analytical lens to obtain a clear view of the strengths, weaknesses, opportunities, and threats of IoT adoption with regard to security, privacy, and trust (Kuzminykh et al, 2020) (Figure 2).…”
Section: Methodsmentioning
confidence: 99%
“…In the second part, the results were aggregated into groups based on the attributes, to rank issues and measures, and to calculate percentages, which gives a clear image of how the users view the issues, the results of the measures, and if there is a difference between the groups that need to be considered. In the third part, the SWOT analysis framework was used as an analytical lens to obtain a clear view of the strengths, weaknesses, opportunities, and threats of IoT adoption with regard to security, privacy, and trust (Kuzminykh et al, 2020) (Figure 2).…”
Section: Methodsmentioning
confidence: 99%
“…• Unauthorized disclosure prevention: An EKM must prevent unauthorized disclosure of key material or metadata [20], [21], [22]. It must implement authentication and authorization mechanisms to control access to key material.…”
Section: B Overview Of Encryption Key Managementmentioning
confidence: 99%
“…• Secure destruction of key material: An EKM must facilitate secure destruction of key material when a key is no longer required [20]. This can arise in various circumstances: a key can be rotated (based on a time-based or usage-based trigger) as part of normal operations, a key can be discovered to be compromised and rotated out, or the cryptosystem as a whole could require zeroization (e.g., if it is about to fall into unfriendly hands).…”
Section: B Overview Of Encryption Key Managementmentioning
confidence: 99%