LU, Hai Xin - In: Economics and Applied Informatics (2009) 1, pp. 93-100
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies. Without the proper key generation, distribution, storage, and recovery, valuable data will be...