Concluding discussion - When does confidentiality harm security?

B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze, J Ioannidis

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.
    Original languageEnglish
    Pages (from-to)229-238
    Number of pages10
    JournalLecture Notes in Computer Science (LNCS)
    Volume2467
    DOIs
    Publication statusPublished - 2002

    Fingerprint

    Dive into the research topics of 'Concluding discussion - When does confidentiality harm security?'. Together they form a unique fingerprint.

    Cite this