O'Reilly logo

Software Fortresses: Modeling Enterprise Architectures by Janet Van Sickler, Roger Sessions

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7.5. Privacy

Privacy refers to the ability to send information in such a way that it cannot be read by unauthorized users. When privacy is implemented, Bart can still read the infograms, but they will all appear as garbled, unintelligible text, much like the user manuals you get with your operating system.

Privacy is usually accomplished with secret-key encryption. Ed and Gwen share a secret key that only they know about. Ed uses this key to encrypt data before he sends it. Gwen uses the same key to decrypt data after she receives it. To anybody in the middle, the data appears as garbled text.

This secret key is not either of their private keys. That would be a violation of the fortress trust rule. Instead, they share a temporary session key, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required