Concluding discussion - When does confidentiality harm security?

Christianson, B., Aura, T, Wheeler, D, Harbison, W, Gligor, V, Paulson, L, Blaze, M and Ioannidis, J (2002) Concluding discussion - When does confidentiality harm security? Lecture Notes in Computer Science (LNCS). pp. 229-238. ISSN 0302-9743
Copy

Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.

Full text not available from this repository.

EndNote BibTeX Reference Manager Refer Atom Dublin Core Data Cite XML METS MPEG-21 DIDL OpenURL ContextObject in Span OpenURL ContextObject ASCII Citation RIOXX2 XML HTML Citation MODS
Export

Downloads