Glossary entry (derived from question below)
English term or phrase:
code escrow
Spanish translation:
custodia de códigos
Added to glossary by
Xenia Wong
Apr 17, 2005 20:26
19 yrs ago
5 viewers *
English term
code escrow
English to Spanish
Other
Computers: Software
"CODE ESCROW" - complete source code and build instructions of major versions of the program are escrowed with a third party
Proposed translations
(Spanish)
4 +3 | custodia de código(s) | Xenia Wong |
5 | ver explicación.. | Gabriela Rodriguez |
Proposed translations
+3
2 mins
Selected
custodia de código(s)
Me parece esto.
3 KudoZ points awarded for this answer.
Comment: "gracias"
5 hrs
ver explicación..
también conocida como Technology
key escrow
In cryptography, placing a secret key into the hands of a trusted third party. See key management.
key escrow
Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party, so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
This is controversial in many countries due to technical mistrust of the security of the escrow arrangement (due to a long history of less than adequate protection of others' information by assorted organizations, public and private, even when the information is held only under an affirmative legal obligation to protect it from unauthorized access), and to a mistrust of the entire system even if it functions as designed. Thus far, no key escrow system has been designed which meets both objections and nearly all have failed to meet even one.
The technical problem is a largely structural one since access must be provided to protected information only to the intended recipient and at least one third party. The third party should be permitted access only under carefully controlled conditions, as for instance, a court order. Thus far, no system design has been shown to meet this requirement fully on a technical basis alone. All proposed systems thus far also require correct functioning of some social linkage, as for instance the process of request for access, examination of request for 'legitimacy' (as by a court), and granting of access by technical personnel charged with access control. All such linkages / controls have serious problems from a system design security perspective.
key escrow
In cryptography, placing a secret key into the hands of a trusted third party. See key management.
key escrow
Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party, so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
This is controversial in many countries due to technical mistrust of the security of the escrow arrangement (due to a long history of less than adequate protection of others' information by assorted organizations, public and private, even when the information is held only under an affirmative legal obligation to protect it from unauthorized access), and to a mistrust of the entire system even if it functions as designed. Thus far, no key escrow system has been designed which meets both objections and nearly all have failed to meet even one.
The technical problem is a largely structural one since access must be provided to protected information only to the intended recipient and at least one third party. The third party should be permitted access only under carefully controlled conditions, as for instance, a court order. Thus far, no system design has been shown to meet this requirement fully on a technical basis alone. All proposed systems thus far also require correct functioning of some social linkage, as for instance the process of request for access, examination of request for 'legitimacy' (as by a court), and granting of access by technical personnel charged with access control. All such linkages / controls have serious problems from a system design security perspective.
Peer comment(s):
neutral |
Luisa Ramos, CT
: En este caso no habla del "key" sino de "complete source code and build instructions".
7 mins
|
Gracias Luisabel, lo voy a tener en cuenta, saludos!!!!!!!!!!!!
|
Something went wrong...