Secure Personal Computing in an Insecure Network A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network. CACM August, 1979 Denning, D. Personal computing, security, privacy, networks, public-key encryption 2.12 6.20 CA790804 DB January 14, 1980 9:26 AM 2840 4 3158 2869 4 3158 3021 4 3158 3128 4 3158 3158 4 3158 3158 4 3158 3158 4 3158 2436 5 3158 3038 5 3158 3111 5 3158 3158 5 3158 3158 5 3158 3158 5 3158