Concluding discussion - When does confidentiality harm security?
Christianson, B., Aura, T, Wheeler, D, Harbison, W, Gligor, V, Paulson, L, Blaze, M and Ioannidis, J
(2002)
Concluding discussion - When does confidentiality harm security?
pp. 229-238.
ISSN 0302-9743
Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.
Item Type | Article |
---|---|
Divisions |
?? sbu_scs ?? ?? ri_st ?? |
Date Deposited | 18 Nov 2024 12:21 |
Last Modified | 18 Nov 2024 12:21 |