Filters
Results 1 - 1 of 1
Results 1 - 1 of 1.
Search took: 0.012 seconds
Tolk, K.M.; Rembold, R.K.
Sandia National Labs., Albuquerque, NM (United States). Funding organisation: USDOE Assistant Secretary for Nuclear Energy, Washington, DC (United States)1997
Sandia National Labs., Albuquerque, NM (United States). Funding organisation: USDOE Assistant Secretary for Nuclear Energy, Washington, DC (United States)1997
AbstractAbstract
[en] Monitoring agencies often use computer based equipment to control instruments and to collect data at sites that are being monitored under international safeguards or other cooperative monitoring agreements. In order for this data to be used as an independent verification of data supplied by the host at the facility, the software used must be trusted by the monitoring agency. The monitoring party must be sure that the software has not be altered to give results that could lead to erroneous conclusions about nuclear materials inventories or other operating conditions at the site. The host might also want to verify that the software being used is the software that has been previously inspected in order to be assured that only data that is allowed under the agreement is being collected. A description of a method to provide this verification using keyed has functions and how the proposed method overcomes possible vulnerabilities in methods currently in use such as loading the software from trusted disks is presented. The use of public key data authentication for this purpose is also discussed
Primary Subject
Secondary Subject
Source
1997; 6 p; 38. annual meeting of the Institute of Nuclear Materials management; Phoenix, AZ (United States); 20-24 Jul 1997; CONF-970744--12; CONTRACT AC04-94AL85000; Also available from OSTI as DE97007904; NTIS; US Govt. Printing Office Dep
Record Type
Report
Literature Type
Conference
Report Number
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue