James H. Reinholm (guest)

James H. Reinholm (guest)

James H. Reinholm is an American scientist and author in the fields of Information Technology. In recent time he has been focusing on miniaturized devices with wireless capability. James holds a Masters Degree in Electrical Engineering by the University of Michigan.
Maximizing the Payment Card Industry (PCI) and Cryptographic System Security

Maximizing the Payment Card Industry (PCI) and Cryptographic System Security

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives particular consideration to the requirements of the Payment Card Industry (PCI).

Encryption Key Management Challenges for IaaS in the Cloud

Encryption Key Management Challenges for IaaS in the Cloud


This article discusses key management methods for the IaaS Cloud model, and security problems to be dealt with because of its virtualization structure.

Simplifying the Complex Process of Auditing a Key Management System for Compliance

Simplifying the Complex Process of Auditing a Key Management System for Compliance

This article explains some of the cryptographic key management tasks involved in demonstrating and proving compliance to acceptable standards, and how this process can be simplified by centralization, automation, and adequate preparation.

Cryptographic Key Management Policy: a layered approach

Cryptographic Key Management Policy: a layered approach

 

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy layers interact.

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection in credit card transactions. It presents and discusses legal incentives for migration, security benefits, a detailed view of the sequence of steps in a transaction and a concluding discussion.

Enhancing Payment Card Security By Integrating PCI with EMV Technology

Enhancing Payment Card Security By Integrating PCI with EMV Technology

This article discusses how the security protection of payment card data used in a transaction can be maximized by integrating PCI DSS with EMV technology. 

Ensuring the Survivability of a Cryptographic System

Ensuring the Survivability of a Cryptographic System

This article discusses methods of restoring secure systems, such as payment card processing, to normal cryptographic operation after an attack or adverse event is detected and recovering access to critical information.

Key Management Considerations For Creating a Domain Security Policy

Key Management Considerations For Creating a Domain Security Policy

This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security domain, including recommendations to regulate and secure this flow through the Domain Security Policy.

Key Management: Explaining the Life Cycles of a Cryptographic Key

Key Management: Explaining the Life Cycles of a Cryptographic Key

This paper discusses the various phases in the life cycle of a cryptographic key, and how the operational life-time and key strength can be determined.