Abstract
Business organizations are dynamic, thus they must have sufficient flexibility in expectation of future structural changes (change in personnel, policies, internal reorganizations, external restructuring, etc.). This issue is becoming increasingly important in recent years since nowadays firms operate in a more dynamic and flexible business environ- ment. As automation progresses, it is expected that cryptography will become a major control tool in organizations. Here we discuss what cryp- tography can provide to enable and manage this business environment of mutating organizations. The main thesis we put forth is the following: “Cryptographic designs traditionally concerned with mechanistic fault tolerance, in which faults are dynamic can, in turn, be the base for a ‘flexible design for control functions' in today's business environment.”
We show how combining various key management techniques which are robust against “dynamic faults” with proper semantically rich “enter- prise view management techniques” - provides a flexible enterprise cryp- tographic control. Such control can anticipate dynamic changes of the business entity. We demonstrate how to manage group entities which are either visible externally (using modified certification technology) as well as entities whose internal workings are hidden (using certification tech- nology and proactive protocol technology when extended to withstand failing and rejoining elements).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Blaze, J. Feigenbaum and J. Lacey, Decentralized Trust Management, IEEE Security and Privacy, 1996.
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94, pp. 522–533.
Y. Desmedt and Y. Frankel, Shared Generation of Authenticators and Signatures Crypto 91, pp. 457–469.
L. Downes and C. Mui, unleashing the Killer App: digital strategies for market dominance, Harvard Business School Press, 1998.
C.M. Ellison, SPKI Certificate Document. 1998. (Document available also in URL http://ftp.clark.net/pub/cme/html/spki.html)
B. Fox and B. LaMacchia, Certificate Revocation: Mechanisms and Meaning, Financial Cryptography 98, pp. 158–164.
Y. Frankel, A practical protocol for large group oriented networks, In J.J. Quisquater and J. Vandewalle, editor, Advances in Cryptology Proc. of Eurocrypt’ 89, pp. 56–61.
Y.Y. Frankel, P. Gemmel, P. MacKenzie and M. Yung Optimal Resilience Proactive Public Key Systems, FOCS 97.
Z. Galil, S. Haber and M. Yung, Cryptographic Computations: Secure Fault Tolerant Protocols in the Public Key Model, Crypto 87, pp. 135–155.
S. Haber and W.S. Stornetta, How to Time-Stamp a Digital Document, Journal of Cryptography, v. 3 n. 2, 1991, Springer International, pp. 99–112.
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive Public-Key and Signature Schemes, ACM CCS 97.
R.J. Hayton, J.M. Bacon and K. Moody, Access Control in an Open Distributed Environment, IEEE Security and Privacy, 98, pp. 3–14.
B. Lampson, Protection, 5-th Princeton Symp. on Information Sciences 71, (Published 74 in ACM’s Operating Systems Review)
H. Lehti and P. Nikander, Certifying Trust, PKC 98, LNCS Springer 1431, pp. 83–98.
R. Ostrovsky and M. Yung, How to withstand mobile virus attacks, Proc. of the 10th ACM Symposium on the Principles of Distributed Computing, 1991, pp. 51–61.
R. Rivest and B. Lampson, SDSI-A simple distributed security infrastructure, (See also, http://theory.lcs.mit.edu/ cis/sdsi.html)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Frankel, Y., Yung, M. (1999). Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control”. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_18
Download citation
DOI: https://doi.org/10.1007/3-540-48390-X_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66362-1
Online ISBN: 978-3-540-48390-8
eBook Packages: Springer Book Archive