NMA
Network Middleware Applications

 
The Fort Knox Syndrome
The conventional risk model used in IT security is that of a link chain. The system is seen as a chain of events, where the weakest link is found and made stronger. But this approach is bound to fail.

HIPAA-compliance is
NMA ZSentry»
NMA Tech
Contact us. We can provide a fresh exploration in various areas of current and emerging IT security technology and compliance.

Questions?
Please contact us using our Support Center

Technical Information and Papers

NMA
End-to-End IT Security and The Fort Knox Syndrome
The conventional risk model used in IT security is that of a link chain. The system is seen as a chain of events, where the weakest link is found and made stronger. But this approach, which we name "The Fort Knox Syndrome", is bound to fail. This paper, originally published in 2002, introduces and compares the NMA ZSentry solution.
NMA 2013, 2009, 2002

Telicom

The email security-usability dichotomy: Necessary antinomy or potential synergism?
Discussion of Usability and Security ratings of X.509/PKI, PGP, Voltage (IBE), and ZSentry Mail (Zmail), applied to secure email.
Telicom. 2008; 21: 3, May-June, I5-31
email-security.net
Secure Email Technologies X.509 / PKI, PGP, IBE, AND ZSENTRY (ZMAIL) - A Usability & Security Comparison
Includes and applies peer-reviewed Usability and Security metrics, to quantitatively evaluate and compare desirable features (33) and shortcomings (17) for main secure email technologies.
Chapter 12, Corporate Email Management, S. J. Krishna and Elizabeth Raju (Ed.), ICFAI University Press, 2007, pp. 171-196, ISBN 81-314-12797 (2007)

Virtual Goods 2003

Looking back at the First Virtual Payment System for Clues about the Virtual Goods Business Model and its Technical Requirements
International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22 - 24 2003 in Ilmenau, Germany.
Emerging Technologies and Associated Security Solutions in Financial Networks
Thai IT Security 2002, September 19, 2002, Bangkok, Thailand.
Trust as Qualified Reliance on Information, Part I
The COOK Report on Internet
Volume X, No. 10, January 2002, ISSN 1071 - 6327
Trust -- The foundation for value in B2B
Zero-Knowledge Privacy By Design Conference
Le Chateau Montebello, Quebec, November 19-21-2000.
The Role of Trust in Internet Security
http://www.opengroup.org/amsterdam2001/gerck.htm
MCG
Meta-Certificate Group
Overview of Certification Systems: X.509, CA, PGP and SKIP
A classic by Ed Gerck, versions 1997-2000. Published by the MCG.
Invited talk at the Black Hat Conference, Las Vegas, NV, 1999.

NEW MCG SITE: http://mcwg.org

MCG MIRROR: Local Mirror

Essay: Paradigms Lost; Connexions, 1994
Email World & Internet Expo Events, 1994-96
Softex Brazil: Campinas, SP, Brasil 1997
Softex Brazil: Brasilia, DF, Brasil 1997
US Army - SECC Reunion, September, 1999
What is the Internet Paradigm
A classic by Einar Stefferud, versions 1994-1999.
Micropayments with Controlled Privacy Using Existing Infrastructure
6th International Financial Cryptography Conference, Southampton, Bermuda, March 2002.
IT Security: Closing the Dollar Gap
NCR White Paper, July 2002.


Employment    Legal Statement    Privacy Statement
Contents of this entire site are © Copyright, NMA Inc., 2009. Titles and product names are trademarks of NMA, Inc. as described in our Legal Statement.