Security SIG: Part 2 of Crypto Key Management



  • The Monthly Meeting of the Security SIG


    Main Presentation

    Part 2 of Crypto Key Management

    As the internet becomes increasingly hostile, companies are forced to review their need for data-encryption for protecting customer information, as never before.

    However, given the highly distributed nature of applications, confidential data is spread across many applications in the enterprise, and encrypting all of them consistently, while ensuring a low TCO is challenging.

    Because of the many point-solutions on the market, IT Operations is typically saddled with managing multiple key-management infrastructures with unique OA&M (Operations, Administration & Maintenance) and increased TCO. What is needed is a consistent way of managing symmetric encryption keys across operating systems, applications, databases and devices to simplify the process and to reduce costs.

    To enable this, OASIS has created an Enterprise Key Management Infrastructure Technical Committee (EKMI-TC). This TC is focused on the standardization of an XML-based client-server protocol - Symmetric Key Services Markup Language (SKSML) - for how a client may request symmetric key-management services securely, from a centralized Symmetric Key Services (SKS) server. The protocol will enable application developers to use a consistent and standards-based communication method for generating, escrowing and recovering symmetric keys from the SKS server.


    Event Logistics


    Cubberley Community Center

    4000 Middlefield Road, Room H-1

    Palo Alto, CA


    6:30 - 7:00 p.m. Registration / Networking / Refreshments / Pizza

    7:00 - 9:00 p.m. Presentation and Discussion



    $15 at the door for non-SDForum members

    No charge for SDForum members

    No registration required