Recovery access to secure data

作者: Calum Murray , Jeff Mendonca

DOI:

关键词:

摘要: A security mechanism affords data recovery engineers the ability to access and recover secure from user files without knowledge of user's password. The uses a launcher application database by establishing temporary, restricted session. also passes handle an industry standard tool, allowing engineer file data. recovered then can be accessed software application.

参考文章(11)
Sydney George Chapman, Michael George Taylor, Control of access to a networked system ,(1994)
Christopher T. Brook, Steven R. Wright, Russell F. Loane, Leroy K. Stanton, Session key recovery system and method ,(1997)
Kannan Alagappan, Morrie Gasser, Charles W. Kaufman, Joseph J. Tardo, Butler W. Lampson, Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system ,(1992)
Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber, Authentication in distributed systems: theory and practice symposium on operating systems principles. ,vol. 25, pp. 165- 182 ,(1991) , 10.1145/121132.121160
Richard Henry Guski, Stephen Michael Matyas, Don Coppersmith, Donald Byron Johnson, Raymond Craig Larson, Authentication system using one-time passwords ,(1994)
Hiroshi Miyauchi, Kazue Sako, Masashi Yamazaki, Hiroyoshi Tsuchiya, Seiko Kanno, o Fujitsu Limited Torii, Naoya c, Hiroyuki c, Ichirou c, o Fujitsu Limited Ando, o Fujitsu Limited Kuroda, Yasutsugu c, o Fujitsu Limited Morita, Seiichi Domyo, Key recovery system ,(1998)
Hemlata S. Prafullchandra, NIS+ password update protocol ,(1996)