State Security Breach Notification Laws
A few resources that may be of interest to others working on similar efforts:
PCI Quick Reference Guide
http://www-03.ibm.com/security/cryptocards/
http://domino.research.ibm.com/comm/research_projects.nsf/pages/security.index.html
http://www-03.ibm.com/security/products/cryptotools.shtml
2010-06-12 Update:
I came across this link today (via Slashdot):
Computing with Secrets, but Keeping them Safe
In 2009 Craig Gentry of IBM published a cryptographic proof that was that rare thing: a true breakthrough. He showed that it was possible to add and multiply encrypted data to produce a result that--when decrypted--reveals the result of performing the same operations on the original, unencrypted data. It's like being able to answer a question without knowing what the question is.
Called "fully homomorphic encryption," it has been dubbed the holy grail of cryptography.
No comments:
Post a Comment