Cryptographic Key Management Policy: a layered approach

Cryptographic Key Management Policy: a layered approach

 

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy layers interact.

Key Management Considerations For Creating a Domain Security Policy

Key Management Considerations For Creating a Domain Security Policy

This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security domain, including recommendations to regulate and secure this flow through the Domain Security Policy.

3rd Party TSM Management of SIM Cards

3rd Party TSM Management of SIM Cards

Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted Service Manager offers, are the secure management and provisioning of the applications issued by service providers, such as banks, transport / ticketing authorities, merchants, or other application issuers. Provisioning performed over the air (OTA) includes, for example, the download, installation, personalization and life-cycle management of th