May/June 2018 issue of acmqueue The May/June issue of acmqueue is out now


  Download PDF version of this article PDF

ITEM not available


Originally published in Queue vol. 15, no. 4
see this item in the ACM Digital Library



Geetanjali Sampemane - Internal Access Controls
Trust, but Verify

Thomas Wadlow - Who Must You Trust?
You must have some trust if you want to get anything done.

Mike Bland - Finding More Than One Worm in the Apple
If you see something, say something.

Bob Toxen - The NSA and Snowden: Securing the All-Seeing Eye
How good security at the NSA could have stopped him


(newest first)

Marcelo | Fri, 27 Oct 2017 14:38:10 UTC

GREAT piece! Do you allow me to translate it to portughese and publish?

Thank you

Monique B | Wed, 06 Sep 2017 07:49:20 UTC

Great work. I really enjoyed reading this.

Dan | Thu, 31 Aug 2017 21:15:35 UTC

Great work

Xavi | Thu, 31 Aug 2017 10:20:38 UTC

Arvind, Jeremy, Thanks for the post. I'm interested in the impact that has for governments and institutions as from my understanding you can easily secure transactions but not being able to identify where the operation had taken place or which are the parties (identified as legal entities). I wonder if there's any bibliography that you can recommend that address this challenges.

Best regards

Roger Ver | Thu, 31 Aug 2017 08:13:15 UTC

Thank you for this read!

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.