Security of the gpg private keyring?
Grant Olson
kgo at grant-olson.net
Tue Mar 1 03:22:33 CET 2011
On 02/28/2011 09:08 PM, Robert J. Hansen wrote:
>> There are probably many more issues like that tucked away once you start
>> to think seriously about implementing the feature properly.
>
> There's a lot of stuff in the literature on this subject. This sort of behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring usually to intelligence so sensitive the source controls who sees the intel and how it is used.
>
> The first paper I can find on this subject belongs to Graubert, "On the Need for a Third Form of Access Control," _Proceedings of the 12th National Computer Security Conference_. It's worth reading.
>
Thanks for the heads up. Looks interesting.
--
-Grant
"Look around! Can you construct some sort of rudimentary lathe?"
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 565 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20110228/1ab38ac3/attachment.pgp>
More information about the Gnupg-users
mailing list