Secure personal computing in an insecure network
- 1 August 1979
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 22 (8) , 476-482
- https://doi.org/10.1145/359138.359143
Abstract
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.Keywords
This publication has 8 references indexed in Scilit:
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- Secure communications over insecure channelsCommunications of the ACM, 1978
- On digital signaturesACM SIGOPS Operating Systems Review, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Measurements of sharing in MulticsPublished by Association for Computing Machinery (ACM) ,1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A note on the confinement problemCommunications of the ACM, 1973