Cryptography as a Service

  • Thursday, October 31, 2013 | 10:00 – 10:50 | Room: G107
View all Sessions

Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when keys are deployed to end points such as electricity meters and mobile phones. This presentation proposes a Cryptography as a service model which allows operations to be performed without exposing cryptographic keys, recommending how to overcome the many pitfalls associated with this technology.

Participants

This document was retrieved from http://www.rsaconference.com/events/eu13/agenda/sessions/547/cryptography-as-a-service on Sat, 25 Oct 2014 21:53:00 -0400.
© 2014 EMC Corporation. All rights reserved.