January/February 2018 issue of acmqueue


The January/February issue of acmqueue is out now


Security

  Download PDF version of this article PDF

ITEM not available

acmqueue

Originally published in Queue vol. 15, no. 4
see this item in the ACM Digital Library


Tweet



Related:

Geetanjali Sampemane - Internal Access Controls
Trust, but Verify


Thomas Wadlow - Who Must You Trust?
You must have some trust if you want to get anything done.


Mike Bland - Finding More Than One Worm in the Apple
If you see something, say something.


Bob Toxen - The NSA and Snowden: Securing the All-Seeing Eye
How good security at the NSA could have stopped him



Comments

(newest first)

Marcelo | Fri, 27 Oct 2017 14:38:10 UTC

GREAT piece! Do you allow me to translate it to portughese and publish?

Thank you


Monique B | Wed, 06 Sep 2017 07:49:20 UTC

Great work. I really enjoyed reading this.


Dan | Thu, 31 Aug 2017 21:15:35 UTC

Great work


Xavi | Thu, 31 Aug 2017 10:20:38 UTC

Arvind, Jeremy, Thanks for the post. I'm interested in the impact that has for governments and institutions as from my understanding you can easily secure transactions but not being able to identify where the operation had taken place or which are the parties (identified as legal entities). I wonder if there's any bibliography that you can recommend that address this challenges.

Best regards


Roger Ver | Thu, 31 Aug 2017 08:13:15 UTC

Thank you for this read!


Leave this field empty

Post a Comment:







© 2018 ACM, Inc. All Rights Reserved.