dependence on the network can be mitigated by exerting object level dynamic key encryption based on existing ANSI standards X9.69 and X9.73. Which use attribute taxonomy/naming conventions as combinatorial triggers for dynamic key (computed at time of need) supporting markup language and providing persistent protetion to data object. Otherwise no protection si provided beyond the immediate adccess. All data is repurposed at some point as such persistent protection must be provided. #20
Organization:
Type:
Reference (Include section and paragraph number):
Comment (Include rationale for comment):
Suggested Change:
Organization: 1 = Federal, 2 = Industry, 3 = Other