Applications of trusted review to information security

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The review process is an important part of many everyday activities. We introduce the concept of trusted review for electronic data. The review process is performed using an insertable security device called a Trusted Reviewer. The Trusted Reviewer can be designed to satisfy high assurance evaluation requirements. We show how the Trusted Reviewer can offer increased security in messaging, certification authorities, funds transfer, witnessing, and information downgrade.

Cite

CITATION STYLE

APA

Yesberg, J., & Henderson, M. (2001). Applications of trusted review to information security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2119, pp. 305–319). Springer Verlag. https://doi.org/10.1007/3-540-47719-5_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free