Abstract | ||
---|---|---|
“Commercial Key Escrow (CKE)”, and an earlier “Software Key Escrow (SKE) scheme, have been proposed by Trusted Information Systems Inc. (TIS) in the USA as a possible compromise scheme to meet the demands of commerce and industry for new levels of information security, particularly transaction and message confidentiality in an international and national networked environment, while meeting law enforcement demands for continued effectiveness of telecommunications line-tapping ability. These latter requirements relate to the perceived need by law enforcement agencies to make use of legitimate authorised linetapping capabilities for the gathering of appropriate intelligence and/or evidence for the purpose of fulfilling perceived roles in the protection of society from criminal activity against the potential case where such line-taps produce intercepts that are encrypted. CKE, involving the incorporation of software based cryptography in computer and network systems with associated key recovery data transmitted during data network activity and provision of “Data Recovery Centres (DRC)”, is seen as presenting a new solution to the problems encountered in the USA with the “Clipper” initiative in that country announced in 1993. |
Year | DOI | Venue |
---|---|---|
1995 | 10.1007/BFb0032345 | Cryptography: Policy and Algorithms |
Keywords | Field | DocType |
commercial key escrow,australian perspective,information security,information system | Information system,Internet privacy,Confidentiality,Computer security,Cryptography,Information security,Encryption,Database transaction,Law enforcement,Key escrow,Business | Conference |
Volume | ISSN | ISBN |
1029 | 0302-9743 | 3-540-60759-5 |
Citations | PageRank | References |
1 | 0.39 | 1 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
William J. Caelli | 1 | 113 | 58.16 |