3,718,480 research outputs found

    The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures

    Full text link
    We model a private key`s life cycle as a finite state machine. The states are the key`s phases of life and the transition functions describe tasks to be done with the key. Based on this we define and describe the key authority, a trust center module, which potentiates the easy enforcement of secure management of private keys in hierarchical public key infrastructures. This is done by assembling all trust center tasks concerning the crucial handling of private keys within one centralized module. As this module resides under full control of the trust center`s carrier it can easily be protected by well-known organizational and technical measures.Comment: 5 pages, 2 figure

    The Key to Risk Management: Management

    Get PDF
    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

    A Framework for Key Account Management and Revenue Management Integration

    Get PDF
    This is an Open Access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0) license.Key Account Management (KAM) and Revenue Management (RevM) have been widely practiced in the service industries for more than three decades, but the effects of RevM on KAM remain largely unknown. This paper addresses this neglected area of study in the marketing field by presenting a framework for KAM and RevM integration that aligns the potentially conflicting management priorities of the two. The study uses an international hotel company as a research context to investigate, first, how a long-term relational approach to KAM may have been affected by RevM short-term revenue maximization goals, and, second, how KAM could be facilitated by RevM through an integrated approach to yield optimization from perishable products and from key accounts. The proposed framework is the first attempt of its kind to amalgamate KAM and RevM, involving critical analysis to assess comprehensively the revenue and the relationship value of a key accountPeer reviewedFinal Published versio

    Group key management based on semigroup actions

    Full text link
    In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigroup action problem in any particular scenario.Comment: accepted for publication in Journal of algebra and its application

    Key knowledge management variables for facilities management organisational effectiveness

    Get PDF
    Although knowledge management concept has grown noticeably during last few years, management of facilities knowledge has been little studies. Facilities knowledge is of crucial importance for organisational effectiveness and makes a proactive contribution to business to achieve competitive advantage. The research addresses the importance of managing facilities knowledge and to reveal the key knowledge variables by examining the current practice and gaps in application of knowledge management techniques in facilities management context. The intellectual capital framework is introduced as a conceptual model with which facilities users can identify and organise facilities knowledge in a purposeful way

    Key issues in participatory irrigation management

    Get PDF
    The recent developments in irrigation sector in the developing world are dominated by PIM/IMT concept. Although the conditions of success and the impediments discussed in this paper concerning the concept are in the context of India, the same are applicable to all countries that are aspiring to achieve success in this respect. Therefore, the aspiring countries, including India must be cautious of the financial allurements of donor agencies because PIM seems to suffer from a number of infirmities that cannot be overridden but in exceptional cases. This is borne out of the fact that although the concept of PIM is being tried in India for over last thirty years, it has yet to achieve even a semblance of acceptability and replicability, not to talk of scaling up. Large canal systems in India contain nearly 40 percent of country’s total irrigation potential of 94 million ha, a substantial part of which, remains unutilised. The main reason behind the lack of utilisation is the ill maintenance of irrigation systems, particularly micro systems at lower levels and those at the farm level. Faced on the one hand, by the near collapse of such irrigation systems and on the other, utter financial crunch, administrators are susceptible to donors like World Bank and Asian Development Bank, who are currently coming forward with funds with the conditionality of PIM. Coupled with this alluring prospect is India’s experience of the last three decades with the concept of PIM. The scenario that exists in India provides both an opportunity and challenge. The paper based on the author’s experience as a researcher/consultant cutting across country’s cultural and geographical boundaries, short lists conditions of success of PIM/IMT along with a close scrutiny and analysis of the impediments that impinge on its path.Length: pp.541-557Irrigation managementParticipatory managementWater users associationsFarmer-agency interactions

    Risk Management in Public Key Infrastructure

    Get PDF
    Nowadays it is almost impossible not to hear or read about the risks of using computer systems. Top management is becoming more interested in risk management process and their analysis regarding the use of information technologies within their organization. This is due primarily to the Internet boom and high level of dependence of their business to information systems. Risk management is the process that allows IT managers to balance the operational and economic costs of protective measures and obtain assets in mission capability by securing the IT systems and data that help their organizations performances. In this paper we present the risk management processes, the main services offered by the Public Key Infrastructure and security risks that may arise in implementing Public Key Infrastructure.risk management; public key infrastructure; PKI services; PKI risks.
    corecore