Secure Personal Computing in an Insecure Network

A method for implementing secure personal computing in a network
with one or more central facilities is proposed.  The method employs a
public-key encryption device and hardware keys.  Each user is responsible 
for his own security and need not rely on the security of
the central facility or the communication links.  A user can safely
store confidential files in the central facility or transmit confidential 
data to other users on the network. 

CACM August, 1979

Denning, D.

Personal computing, security, privacy, networks, public-key encryption

2.12 6.20

CA790804 DB January 14, 1980  9:26 AM

2840	4	3158
2869	4	3158
3021	4	3158
3128	4	3158
3158	4	3158
3158	4	3158
3158	4	3158
2436	5	3158
3038	5	3158
3111	5	3158
3158	5	3158
3158	5	3158
3158	5	3158