We always hear 'it's all or nothing.' We feel encryption coupled with XML controls might be a good manner for controlling who should see what and when. Most people think of encryption as making information unreadable, but with some special encryption key server techniques, you can use cryptography as a parsing mechanism.
Lenexa, KS (PRWEB) September 24, 2007
ERUCES' Vice President of Global Security Solutions & Sales, Jon-Michael C. Brook, will present at the 2008 DoD Cybercrime Conference in January. Giving a talk entitled "Information sharing through encryption?" Mr. Brook will discuss electronic distribution within the law enforcement communities and the role encryption may play in enabling better information sharing.
"Currently, organizations within the federal, intelligence, and law enforcement communities have difficulties controlling the dissemination of data," said Mr. Brook. "We always hear 'it's all or nothing.' We feel encryption coupled with XML controls might be a good manner for controlling who should see what and when. Most people think of encryption as making information unreadable, but with some special encryption key server techniques, you can use cryptography as a parsing mechanism."
XML controls such as tagging refers to the process of marking information with meta-data, or data about data. If you think in terms of a grocery store, each of the different stickers on a box of Wheaties could be characterized as meta-data. Companies utilize each of the stickers to divide information for the consumer, for the stocking shelf, for the checkout counter, etc… The circle around nutritional information really doesn't apply to the person scanning the bar code. This same idea may be applied to a terrorist warning. Some XML stickers show information destined for the state and local government, some for the FBI, and others still for the TSA. By encrypting the different XML marked pieces, only people within the appropriate group may read their part of the warning. The TSA might need access to the same info as the Law Enforcement Community, but not the warrant/search and seizure information that the FBI is looking for.
"The ERUCES' key server provides fast key access, and with the Tricryption technique of storing everything encrypted individually creates this XML opportunity," according to Mr. Oggy Vasic, Vice President of Software Development. "We expect this to be a welcome addition to the law enforcement communities."
The CyberCrime Conference purpose, as stated by the Futures Exploration Defense Cyber Crime Center Director, Special Agent (Retired) Jim Christy is "to bring together DoD forensic examiners, prosecutors, communication specialists, digital forensic research and development personnel, as well as Federal, State and local law enforcement personnel to address issues surrounding the proliferation of cyber crime. This is the only DoD/Federal/State Government event that brings all these personnel together in an open and interactive forum to explore ways to work together to ensure successful prosecutions through unbiased digital forensics media analysis, investigative support and counterintelligence operations."
ERUCES is redefining cryptographic security, providing encryption key server management and key distribution products that protect Databases, Workstations, Servers, Web Services/Application Servers and third-party applications. ERUCES Tricryption software utilizes standard encryption algorithms implemented in validated cryptographic modules. ERUCES is a privately held software company headquartered in Kansas City with offices in Tampa, Orlando, and Columbia, MD. For further information on ERUCES, visit http://www.eruces.com.