Table 1 - uploaded by Alexander Wiesmaier
Content may be subject to copyright.
The classification of surveyed solutions in regard to achieved security goals and required trust assumptions

The classification of surveyed solutions in regard to achieved security goals and required trust assumptions

Source publication
Article
Full-text available
Electronic archives are increasingly being used to store in-formation that needs to be available for a long time such as land register information and medical records. In order for the data in such archives to remain useful, their integrity and authenticity must be protected over their entire life span. Also, in many cases it must be possible to pr...

Context in source publication

Context 1
... this section we compare the surveyed solutions in regard to three aspects: a) the security goals that they achieve, b) the assumptions that need to be made in order to achieve such goals, and c) their support for format migration. Table 1 summarizes the security goals and assumptions. ...

Similar publications

Book
Full-text available
https://hal.archives-ouvertes.fr/hal-01683842
Article
Full-text available
Automated methods are important for the identification of mesoscale eddies in the large volume of oceanic data provided by altimetric measurements and numerical simulations. This paper presents an optimized algorithm for detecting and tracking eddies from two-dimensional velocity fields. This eddy identification uses a hybrid methodology based on p...

Citations

... Vigil et al. [5] provide an overview of trust assumptions for long-term protection schemes. The overview is intended to analyse the assumptions individually, without comparisons. ...
Conference Paper
Full-text available
Digital archives rely on trusted parties, such as certification authorities, to ensure authenticity, integrity and proof of existence protection for documents. In this paper, we analyse the trust assumptions that a verifier has to make in order to trust in the protection of a document. We show that trust fades out in the long term due to the ever-growing number of trusted parties. Despite such a dire prospect, current technologies such as X.509 PKI do not assess trust, thereby leaving verifiers in the dark. We present a certification scheme for documents that provides verifiers with a better assessment of trust than in X.509 PKI. In the proposed scheme, trusted parties are rated based on the correctness of their performance. From the ratings, verifiers can assess quantitatively the trust in the trusted parties for the short term, and in the protection of documents for the long term. The proposed scheme encourages trusted parties to work properly.
Chapter
The periodical re-encryption-based archival systems have many specific characteristics such as actively re-encrypting the stored data objects periodically with or without conscious to the owner. For such a system, traditional techniques cannot be applied to check the integrity and proof of existence of a data object. For example, most traditional systems check integrity and proof of existence by comparing hash value of a data object stored in the archival system to the corresponding hash value with the owner. It may not be realistic solution due to continuous change in the bit patterns of the archivals due to periodical re-encryption. Therefore, we present a solution that is not only suitable to a specific periodical re-encryption-based archival system but also to any existing storage systems from long-term point of view.
Conference Paper
We observe that current mainstream digital signature schemes are complex and inconvenient for end users. We group the main problems related to these schemes and propose a new approach, centered on the needs of the end user. The new model is a redesign of the overall signature process, discarding certificates and the X509 PKI in favor of simple structures and natural trust relationships modeled on conventional handwritten signatures.