...
首页> 外文期刊>eWeek >The end-to-end encryption trend
【24h】

The end-to-end encryption trend

机译:端到端加密趋势

获取原文
获取原文并翻译 | 示例
           

摘要

Frustrated by the challenge of controlling access to enterprise assets, IT architects are embedding encryption at every layer of the stack. They're not just encrypting traffic between one perimeter and another but are also encrypting data repositories inside the perimeter―and even encrypting the flows of data between processors and other subsystems. While we applaud the principle of defense in depth, eWEEK Labs sees more than trace contaminants ofvendor self-interest in this trend. The resulting systems may be more secure―the devil, as always, is in the details of implementation―but they also tilt the balance of power from buyers toward closed-system suppliers and from con-tent users toward more powerful providers.
机译:对于控制对企业资产的访问的挑战感到沮丧,IT架构师正在将加密嵌入到堆栈的每一层。他们不仅在加密一个边界和另一个边界之间的流量,而且还在加密边界内部的数据存储库,甚至还加密处理器和其他子系统之间的数据流。尽管我们赞扬深入防御的原则,但eWEEK实验室发现,在这种趋势中,追踪到的污染物不仅仅局限于供应商自身利益。最终的系统可能会更安全-实施细节始终像魔鬼一样-但它们也会使力量的平衡从购买者转向封闭系统供应商,从内容用户转向功能更强大的提供商。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号