Re: Use case classification, and associated security models

On 6/13/2012 10:00 AM, Vijay Bharadwaj wrote:
>
> Yes, this (i.e. isolated decryption output) seems a little bit out of 
> scope.
>
I wonder if it would be possible to have isolated decryption by 
leveraging a new 'origin' for the decrypted output. Obviously this would 
limit the sort of operation that you could do with it but it might be 
able to solve the 'decrypt the bank statement' use case.

Philip

-- 
Philip Gladstone
Distinguished Engineer
Product Development
pgladstone@cisco.com
Phone: +1 978-ZEN-TOAD (+1 978 936 8623)
Google: +1 978 800 1010
Ham radio: N1DQ

Received on Wednesday, 13 June 2012 15:11:12 UTC