Concluding discussion - When does confidentiality harm security?
Author
Christianson, B.
Aura, T
Wheeler, D
Harbison, W
Gligor, V
Paulson, L
Blaze, M
Ioannidis, J
Attention
2299/7806
Abstract
Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.