Learn More
IBM made a business decision to promote an open, secure, interoperable and integrateable environment by embracing the IETF's Public Key Infrastructure (X.509) standards, developing a reference implementation of the core set, and giving it away as freeware. We discuss the architecture of this reference code, emphasizing lessons learned from implementing the(More)
#RSAC Introduction ► Deploying cryptographic keys to end points such as smart phones, virtual machines in The Public Cloud, and smart grid equipment is risky. ► This presentation proposes a Cryptography as a Service (CaaS) model which allows operations to be performed without exposing cryptographic keys and recommends how to overcome the pitfalls associated(More)
  • 1