January/February 2018 issue of acmqueue

The January/February issue of acmqueue is out now

Kode Vicious


  Download PDF version of this article PDF

ITEM not available


Originally published in Queue vol. 9, no. 8
see this item in the ACM Digital Library


Follow Kode Vicious on Twitter
and Facebook

Have a question for Kode Vicious? E-mail him at [email protected]. If your question appears in his column, we'll send you a rare piece of authentic Queue memorabilia. We edit e-mails for style, length, and clarity.


Arvind Narayanan, Jeremy Clark - Bitcoin's Academic Pedigree
The concept of cryptocurrencies is built from forgotten ideas in research literature.

Geetanjali Sampemane - Internal Access Controls
Trust, but Verify

Thomas Wadlow - Who Must You Trust?
You must have some trust if you want to get anything done.

Mike Bland - Finding More Than One Worm in the Apple
If you see something, say something.


(newest first)

Ed K | Fri, 19 Aug 2011 16:00:55 UTC

Good article. However, I think KV overlooked other definitions of the word compromise: as a verb "To expose or make liable to danger, suspicion, or disrepute"; as a noun "A concession to something detrimental or pejorative". This is the sense of the word in the phrase "security compromise".

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.