Secure personal computing in an insecure network
1979, Communications of the ACM
https://doi.org/10.1145/359138.359143Abstract
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.
References (19)
- National Bureau of Standards. Data Encryption Standard. FIPS PUB 46, Washington, D.C., Jan. 1977.
- Needham, R., and Schroeder, M. Security and authentication in large networks of computers. Comm. ACM 21, 12 (Dec. 1978), 993- 999.
- Popek, G.J., and Kline, C.S. Design issues for secure computer networks. In Operating Systems, an Advanced Course, R. Bayer, R.M. Graham, and G. SeegmuUer, Eds., Springer-Verlag, New York, 1978.
- Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.
- Rivest, R.L., Adleman, L., and Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R.L. Lipton, Eds., Academic Press, New York, 1978.
- Saltzer, J. On digital signatures. Operating Syst. Rev. 12, 2 (April 1978), 12-14.
- Simmons, G.J. Computational complexity and secure communications. Comptg. Surveys (to appear).
- Tanenbaum, A. A distributed interactive computing system. IR-20, Vrije Universiteit, The Netherlands, June 1977. References
- Diffie, W., and Hellman, M.E. New directions in cryptography. 1EEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.
- Flynn, R., and Campasano, A.S. Data dependent keys for a selective encryption terminal. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1127-1129.
- Hellman, M.E. Security in communication networks. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1131- 1134.
- Konfelder, L.M. A method for certification. Tech. Rep., Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., May 1978.
- Konheim, A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100), IBM Thomas J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1978.
- Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.
- Lempel, A. Cryptography in transition. Comptg. Surveys (to appear).
- $. Merkle, R.C. Secure communication over an insecure eliannel. Comm. ACM 21, 4 (April 1978), 294-299.
- Merkle, R.C., and Hellman, M.E. Hiding information and signatures in trap door knapsacks. IEEE Trans. Inform. Theory IT-24, 5 (Sept. 1978), 525-530.
- Montgomery, W.A. Measurements of sharing in MULTICS.
- Proc. 6th Symp. on Operating Syst. Principles, Spec. issue, Operating Syst. Rev. (ACM) 11, 5, Nov. 1977, pp. 85-90.