Concluding discussion - When does confidentiality harm security?

Christianson, B., Aura, T, Wheeler, D, Harbison, W, Gligor, V, Paulson, L, Blaze, M and Ioannidis, J (2002) Concluding discussion - When does confidentiality harm security? Lecture Notes in Computer Science (LNCS). pp. 229-238. ISSN 0302-9743
Copy

Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.

Full text not available from this repository.

EndNote BibTeX Reference Manager Refer Atom Dublin Core RIOXX2 XML MODS OPENAIRE ASCII Citation METS Data Cite XML OpenURL ContextObject in Span HTML Citation OpenURL ContextObject MPEG-21 DIDL
Export

Downloads