Saikat Saha- Oracle Corp. 20th February, 2014

Slides:



Advertisements
Similar presentations
Escheat & Unclaimed Property
Advertisements

217. If each of the following loans would otherwise normally require compliance with the Federal Truth-in-Lending Act, which one would be exempt on the.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Parties to a Mortgage Loan of Funds Security Interest in Real Property Owner-Debtor Borrower (“Mortgagor”) Creditor-Lender (“Mortgagee”)
Personal Relationships…Professional Solutions Comprehensive Wealth Management Presented By Reliance Trust Company John A. Rodgers, III.
{ Chapter 12 Property: Real Property, Leases & Mortgages.
Key Escrow System “like leaving your key with a neighbour in case of an emergency” SSIN – MIEIC Micael Fernando Fonseca Oliveira.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
© 2013 All rights reserved. 1 Chapter 7.2 Title Closing New York Real Estate for Brokers, 5th e By Marcia Darvin Spada Cengage Learning.
Chapter 28 Real Property. What Is Real Property Land- Includes not only that surface of the earth, but also the airspace above it and whatever is beneath.
KMIP Cloud Use Case Kiran Thota – VMware Inc. Saikat Saha – Oracle Corp.
1 of 14 Real Estate Law, 8th Ed. by Marianne M. Jennings Chapter 16 Closing the Deal.
$1 Million $500,000 $250,000 $125,000 $64,000 $32,000 $16,000 $8,000 $4,000 $2,000 $1,000 $500 $300 $200 $100 Welcome.
SAFM 550 Loss Control and Recovery NOTE: On all parts of the insurance presentation you must click on the little speaker on each “slide” in order to hear.
Chapter 48 Real Property.  Property that is immovable or attached to immovable land or buildings  Types of real property:  Land and buildings  Subsurface.
Definitions of Business, E- Business, and Risk  Business: An organization involved in trade of goods and/or services to the consumers  E-Business: Application.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Intellectual Property Rights & Copyright Law By Rachel Kirkland & Shari Clayman.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
+ ESCROW 190 (Escrow I) Spring Term Meet Your Instructor Started in escrow in 1992 Commercial, Residential, Builder Independents, Law Firms and.
Security Issues in Information Technology
The New Loan Estimate & Closing Disclosure Explained
Dell Compellent and SafeNet KeySecure
Risk Management 101.
eSignature Today and in the Future
Copyright By Teresa Hudson
Commercial Law The contract of Sale.
The contract of sale.
Investment Management
COMPUTER SECURITY CONCEPTS
Privacy & Confidentiality
Handout 2: Data Protection and Copyright
Voluntary and non-voluntary euthanasia
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Real Estate For Newbie Real Estate For Newbie.
Ownership and Risk of Loss in Sales
Data Protection Legislation
BYU-IDAHO Contracts, Negotiations & Signing Authority
IS3230 Access Security Unit 9 PKI and Encryption
Chapter 48 Real Property.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Chapter 48 Real Property.
Disaster Recovery Plan
What is a RESPONSIBILITY?
4 Real Estate Transactions
TRUST.
You must MAKE something…You will use your item to barter
Fundamental principle of UNCAC
Database Security &Threats
What is a RESPONSIBILITY?
Think and Brainstorm What is a RIGHT?.
Think and Brainstorm What is a RIGHT?.
Fundamental principle of UNCAC
Environmental Safety Basic Emergency Response
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Implementation of security elements in database
Characteristics of Free Enterprise
Welcome to Financial Stewardship’s Who Wants to be a Millionaire
Commercial Law The contract of Sale.
Marco Casassa Mont Keith Harrison Martin Sadler
Addressing confidentiality issue in third party xml publication
Risk parameters (consequence)
Who was primarily responsible for the Cold War- the United States or the Soviet Union ? (Before Document Analysis) Individual Response Group Response.
CREDITOR’S AND DEBTOR’S RIGHTS
Introduction to Cryptography
Mitigation.
Presentation transcript:

Saikat Saha- Oracle Corp. 20th February, 2014 Key Escrow - KMIP Saikat Saha- Oracle Corp. 20th February, 2014

Agenda Definition of Key Escrow KMIP Implications & Next steps

Definitions Escrow - a deed, a bond, money, or a piece of property held in trust by a third party to be turned over to the grantee only upon fulfillment of a condition (Merriam-Webster) Key Escrow – An arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. (Wikipedia) - Businesses - Governments

Why Escrow? Legal Procedure - Primarily Surveillance (Covert ?) Recovery of Encrypted Media/Communication Note: Key Escrow is different from voluntary or involuntary key disclosure or key surrender

Implications Sharing Cryptographic Keys with Authorized Third Parties (a.k.a Escrow Agent) Access to keys can be provided by Manual: Controlled process when needed Automatic: Provide key access to Escrow agent and Backup of keys to the third party to prevent loss of keys

Next Step Question Addition to Use Case Document Do we want to do something about Key Escrow? Addition to Use Case Document Authorization: Allow “Trusted Third Party” a.k.a “Escrow Agent” as another ‘legitimate’ owner of managed objects Automatically backup keys to the authorized third party location Does it suffice with minimal impact?