Application Model and Implementation about Team Secrecy Encryption

Article Preview

Abstract:

Personal and network encryption application models nowadays are analyzed in this paper, then a team secrecy encryption application model is proposed based on practical applications. In this model, members of one team have same access authority for electronic documents, and team is the smallest unit of key distribution. Procedures of distribution, transmission and updating key are offline. This model is suitable for co-confidential application among many departments which are loose coupling. An encryption system is implemented based on this model aimed at protecting Microsoft office document.

You have full access to the following eBook

Info:

Periodical:

Pages:

339-342

Citation:

Online since:

September 2012

Authors:

Export:

Share:

Citation:

[1] M. Blaze. A cryptographic file system for Unix. In Proceedings of the First ACM Conference on Computer and Communication Security, pages 9–15, Nov. (1993).

DOI: 10.1145/168588.168590

Google Scholar

[2] Wei pei-hui, Qing si-han, Liu hai-feng. Design and Implementation of a Transparent Cryptographic File System Based on Secure Operating System. Computer science, 2003, 30(7): 132-135.

Google Scholar

[3] D. Mazi`eres, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP '99), pages 124–139, Dec. (1999).

DOI: 10.1145/319151.319160

Google Scholar

[4] Zhao ming-wei, Mao rui, Jiang rong-an. Transparent Encryption File System Model Based on Filter Driver. Computer Engineering, 2009, 35(1): 150-152.

Google Scholar

[5] Li qing-jun, Gan Meng. File Encryption Approach Based on Virtual Disk. Computer Engineering and Design, 2006, 27(15): 2835-2838.

Google Scholar

[6] E. L. Miller, D. D. E. Long, W. E. Freeman, and B. C. Reed. Strong security for network-attached storage. In Proceedings of the FAST 2002 Conference on File and Storage Technologies, Monterey, CA, Jan. (2002).

Google Scholar

[7] Lopez J, Oppliger R, Pernul G. Why public key infrastructures have failed so far-[J] . Internet Research, Emerald, 2005, 15 (5) : 544-556.

DOI: 10.1108/10662240510629475

Google Scholar