Now showing items 141-144 of 144

    • Where have all the protocols gone? 

      Christianson, B. (2005)
      There was a time when security protocols lived mainly in the network and transport layers. Where are they now? Some have moved downstairs, towards the physical layer. What used to be a wide-area authentication or session ...
    • Why is software development so difficult to manage? 

      Barrett, R.; Christianson, B. (University of Hertfordshire, 1992)
      Software is extremely complex, invisible and easy to change. Because it's so plastic, it's tempting to make lots of changes. Software is also an amazingly unforgiving medium with which to work. Changes to software frequently ...
    • Why isn't trust transitive? 

      Christianson, B.; Harbison, W.S. (1997)
      One of the great strengths of public-key cryptography is its potential to allow the localization of trust. This potential is greatest when cryptography is present to guarantee data integrity rather than secrecy, and where ...