The review process is an important part of many everyday activities. We introduce the concept of trusted review for electronic data. The review process is performed using an insertable security device called a Trusted Reviewer. The Trusted Reviewer can be designed to satisfy high assurance evaluation requirements. We show how the Trusted Reviewer can offer increased security in messaging, certification authorities, funds transfer, witnessing, and information downgrade.
CITATION STYLE
Yesberg, J., & Henderson, M. (2001). Applications of trusted review to information security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2119, pp. 305–319). Springer Verlag. https://doi.org/10.1007/3-540-47719-5_25
Mendeley helps you to discover research relevant for your work.