Concluding discussion - When does confidentiality harm security?

B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze, J Ioannidis

Research output: Contribution to journalArticlepeer-review

Abstract

Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.
Original languageEnglish
Pages (from-to)229-238
Number of pages10
JournalLecture Notes in Computer Science (LNCS)
Volume2467
DOIs
Publication statusPublished - 2002

Fingerprint

Dive into the research topics of 'Concluding discussion - When does confidentiality harm security?'. Together they form a unique fingerprint.

Cite this