The management of private and confidential information is
a major problem for dynamic organizations. Secure systems
are needed to exchange confidential documents, protect them
against unauthorized access and copy with chnages in people's
roles and permissions. This paper describes an innovative
technical solution with several advantages over approaches
based on traditional cryptography and Public Key Infrastructure.
by Marco Casassa Mont, Pete Bramhall and Keith Harrison, Trusted Systems Laboratory
presented at the 14th International Workshop on IEEE DEXA (TrustBus 03) 1-5 September 2003, Prague, Czech Republic
Read the paper. (requires Adobe Acrobat)
About the authors
Pete Bramhall is a project manager in the Trusted
Systems Laboratory in Hewlett-Packard's corporate research
laboratories in Bristol, England. His group's main activities
are Identifier-Based Encryption and the application of trust
technology to enhance privacy. During his 18 years at HP,
Pete has worked as a technical contributor and a manager in
a variety of research and development programs, many of which
have been focused on data protection products and solutions,
and has represented HP in a number of standardization forums.
Marco Casassa Mont is a researcher in the Trusted
Systems Laboratory in Hewlett-Packard's corporate research
laboratories in Bristol, England. His interests include researching
and developing secure and trusted technologies, systems and
solutions for people, enterprises and the Internet. His current
focus is on identity and privacy management. Recently he technically
led a technology trial with NHS (UK Health Care Service) involving
the exploitation of the Identifier-based Encryption (IBE)
technology.
Keith Harrison joined HP in 1980 and HP Labs in 1988.
Since then, he's worked on a variety of research topics, including
database queries, logic/knowledge databases, management of
telecom networks, event correlation, time stamping, and most
recently, on cryptography. Keith's current focus is on alternatives
to public key infrastructures, notably identifier-based cryptography.
IEEE copyright notice
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of HP Labs' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending a blank email message to
pubs-permissions@ieee.org.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
|