{"title":"Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management","authors":"Luther Martin","doi":"10.1080/10658980601051268","DOIUrl":null,"url":null,"abstract":"ates is difficult to understand. It is a bewildering array of legislation that requires the protection of many types of data, or limits access to this data to only authorized personnel. Managing the identities and roles of personnel who can access sensitive data can be accomplished using existing Identity and Access Management (IAM) technologies and Identity-based Encryption (IBE). IBE, a new encryption technology that uses such identity information as an encryption key, promises to provide a way to use an IAM infrastructure to address the challenges of maintaining the privacy of sensitive corporate data.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10658980601051268","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/10658980601051268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 5
Abstract
ates is difficult to understand. It is a bewildering array of legislation that requires the protection of many types of data, or limits access to this data to only authorized personnel. Managing the identities and roles of personnel who can access sensitive data can be accomplished using existing Identity and Access Management (IAM) technologies and Identity-based Encryption (IBE). IBE, a new encryption technology that uses such identity information as an encryption key, promises to provide a way to use an IAM infrastructure to address the challenges of maintaining the privacy of sensitive corporate data.