{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:23:59Z","timestamp":1757312639708,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030657284"},{"type":"electronic","value":"9783030657291"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65729-1_8","type":"book-chapter","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T16:03:13Z","timestamp":1608652993000},"page":"80-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Comparative Analysis of Cryptographic Key Management Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6917-4234","authenticated-orcid":false,"given":"Ievgeniia","family":"Kuzminykh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1788-547X","authenticated-orcid":false,"given":"Bogdan","family":"Ghita","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3866-0672","authenticated-orcid":false,"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"8_CR1","unstructured":"Global Encryption Trends Study. Ponemon Institute Research Report (2020)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Sinha, V.S., et al.: Detecting and mitigating secret-key leaks in source code repositories. In: 12th Working Conference on Mining Software Repositories (MSR), Florence, pp. 396\u2013400. IEEE\/ACM (2015)","DOI":"10.1109\/MSR.2015.48"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-14577-3_14","volume-title":"Financial Cryptography and Data Security","author":"M Bj\u00f6rkqvist","year":"2010","unstructured":"Bj\u00f6rkqvist, M., et al.: Design and implementation of a key-lifecycle management system. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 160\u2013174. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_14"},{"key":"8_CR4","unstructured":"Selecting the right key management system. Cryptomathic White Paper (2019)"},{"key":"8_CR5","unstructured":"Attridge, J.: An Overview of Hardware Security Modules. SANS Institute. Information Security Reading Room (2002)"},{"key":"8_CR6","unstructured":"Biggs, A., Cooley, S.: Management Service Architecture, IETF Internet draft (2015)"},{"key":"8_CR7","unstructured":"Mogull, R: Understanding and Selecting a Key Management Solution. Securosis LLC. (2013)"},{"key":"8_CR8","unstructured":"Allen, C.: Exploring the Lifecycle of a Cryptographic Key (2018). https:\/\/www.cryptomathic.com\/news-events\/blog\/exploring-the-lifecycle-of-a-cryptographic-key-. Accessed 17 Jun 2020"},{"key":"8_CR9","unstructured":"Cryptera. Understanding Remote Key Loading. https:\/\/www.cryptera.com\/wp-content\/uploads\/2014\/07\/Cryptera_WP_Understanding-RKL_To-Launch.pdf. Accessed 10 Jun 2020"},{"key":"8_CR10","unstructured":"EMV Key Management. Cryptomathic White Paper (2017)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, V., Sharma, I.: Bring-your-own-encryption: how far are we? In: 11th International Conference on Industrial and Information Systems (ICIIS), Roorkee, pp. 672\u2013677 (2016)","DOI":"10.1109\/ICIINFS.2016.8263023"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCC.2016.89","volume":"3","author":"B AlBelooshi","year":"2016","unstructured":"AlBelooshi, B., Damiani, E., Salah, K., Martin, T.: Securing cryptographic keys in the cloud: a survey. IEEE Cloud Comput. 3(4), 42\u201356 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"8_CR13","volume-title":"Pragmatic Key Management for Data Encryption","author":"R Mogull","year":"2012","unstructured":"Mogull, R.: Pragmatic Key Management for Data Encryption. Securosis LLC., Phoenix (2012)"},{"issue":"25","key":"8_CR14","first-page":"78","volume":"2","author":"I Kuzminykh","year":"2019","unstructured":"Kuzminykh, I., Fliustikova, M.: Mechanisms of ensuring security in Keystone service. Probl. Telecommun. 2(25), 78\u201396 (2019)","journal-title":"Probl. Telecommun."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Sitaram, D., Harwalkar, S., Simha, U., Iyer, S., Jha, S.: Standards based integration of advanced key management capabilities with openstack. In: IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 98\u2013103. IEEE, Bangalore (2015)","DOI":"10.1109\/CCEM.2015.27"},{"key":"8_CR16","unstructured":"White, C., Edwards, S.: Server-client PKI for applied key management system and process. US Patent US10560440B2 (2020)"},{"key":"8_CR17","unstructured":"Kuzminykh, I., Yevdokymenko, M., Sokolov, V.: Encryption Algorithms in IoT: Security vs Lifetime. Data-Centric Business and Applications. LNDECT. Springer, Cham (2021, in press)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-01168-0_6","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems","author":"I Kuzminykh","year":"2018","unstructured":"Kuzminykh, I., Carlsson, A.: Analysis of assets for threat risk model in avatar-oriented IoT architecture. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART -2018. LNCS, vol. 11118, pp. 52\u201363. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01168-0_6"},{"key":"8_CR19","unstructured":"BenchmarkDotNet. Frequently asked questions. https:\/\/benchmarkdotnet.org\/articles\/faq.html. Accessed 10 Jun 2020"},{"key":"8_CR20","unstructured":"Dooley, R., Edmonds, A., Hancock, D.Y., et al.: Security best practices for academic cloud service providers. Technical report (2018)"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(18)30022-8","volume":"2018","author":"J Topper","year":"2018","unstructured":"Topper, J.: Compliance is not security. Comput. Fraud Secur. 2018(3), 5\u20138 (2018)","journal-title":"Comput. Fraud Secur."},{"key":"8_CR22","unstructured":"Hashicorp. High Availability. https:\/\/www.vaultproject.io\/docs\/internals\/high-availability.html. Accessed 17 Jun 2020"},{"key":"8_CR23","unstructured":"Hashicorp. Production hardening. https:\/\/learn.hashicorp.com\/vault\/operations\/production-hardening. Accessed 17 Jun 2020"},{"key":"8_CR24","unstructured":"Openstack. Barbican Documentation. https:\/\/docs.openstack.org\/barbican\/latest\/. Accessed 17 Jun 2020"},{"key":"8_CR25","unstructured":"Pinterest. Knox Wiki. https:\/\/github.com\/pinterest\/knox\/wiki\/. Accessed 17 Jun 2020"},{"key":"8_CR26","unstructured":"Square. Keywhiz. https:\/\/github.com\/square\/keywhiz. Accessed 17 Jun 2020"},{"key":"8_CR27","unstructured":"Cyberark conjur automatically secures secrets used by privileged users and machine identities. https:\/\/github.com\/cyberark\/conjur. Accessed 17 Jun 2020"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65729-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:37:42Z","timestamp":1710250662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65729-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030657284","9783030657291"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65729-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.new2an.org\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"225","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}