On Sat, 06 Jan 2007 13:13:32 -0800
Allen [EMAIL PROTECTED] wrote:
Hi everyone,
I'm Allen Schaaf and I'm primarily an information security analyst -
I try to look at things like a total stranger and ask all the dumb
questions hoping to stumble on one or two that hadn't been asked
before
Allen wrote:
One of the questions that I have been raising is trust and how to ensure
that that it is not misplaced or eroded over time. Which leads me to my
question for the list: I can see easily how to do split key for 2 out of
x for key recovery, but I can't seem to find a reference to the
I think you are looking for the m of n solution, or commonly known as
shared secret which can be implemented using shamir's or blakley's
scheme.
you can find a open source implementation of shamir's scheme @
http://point-at-infinity.org//
or more info check out the wikipedia entry:
On 1/6/07, Allen [EMAIL PROTECTED] wrote:
One of the questions that I have been raising is trust and how to
ensure that that it is not misplaced or eroded over time. Which
leads me to my question for the list: I can see easily how to do
split key for 2 out of x for key recovery, but I can't seem
Adam Back wrote:
About the criticisms of Common Critera evaluation in general, I think
why people complain it is a documentation exercise is because pretty
much all it does ensure that it does what it says it does. So
basically you have to enumerates threats, state what threats the
system is
From: Sven Dietrich [EMAIL PROTECTED]
Subject: [fc-announce] FC07: Preliminary program and call for participation
To: [EMAIL PROTECTED]
Date: Mon, 8 Jan 2007 08:08:09 -0500 (EST)
Dear Colleague,
Please see below for the preliminary program and call for participation for
Financial
From: Rachna Dhamija [EMAIL PROTECTED]
Subject: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline
To: [EMAIL PROTECTED]
Date: Fri, 5 Jan 2007 11:45:31 -0800
Below is the preliminary program for Usable Security, a workshop that
will be held in conjunction with FC07. Note that
... and has now made slashdot
Chip PIN Terminal Playing Tetris
http://hardware.slashdot.org/hardware/07/01/08/1355221.shtml
previous post
http://www.garlic.com/~lynn/aadsm26.htm#20 Tamperproof, yet playing Tetris
recent related comments
http://www.garlic.com/~lynn/aadsm26.htm#21 FC07