Mungamuru, Bob and Garcia-Molina, Hector and Olston, Christopher (2005) Configurations: Understanding Alternatives for Safeguarding Data. Technical Report. Stanford.
Configurations are introduced as a new model for the description and analysis of secure data systems. Both the longevity and privacy of sensitive data are considered. The model uses two basic operators: copy, which replicates data for longevity, and split, which decomposes data (e.g., into ciphertext and a key) for privacy. The operators can be recursively composed to describe how data and their associated ``keys'' are managed. Various classes of configurations are defined that have desirable properties with respect to physical realizability and semantic correctness. Formal techniques are provided to verify these properties for a given configuration.
|Item Type:||Techreport (Technical Report)|
|Related URLs:||Project Homepage||http://crypto.stanford.edu/portia/|
|Deposited By:||Import Account|
|Deposited On:||24 Jan 2006 16:00|
|Last Modified:||22 Dec 2008 18:23|
Repository Staff Only: item control page