Abstract
I wanted to hammer on one point that Joan made, brought up in Larry’s talk this morning and I borrowed a slide from him. When he was talking about verifying the certificate, assuming the certificate is verified correctly, then he has established that the client is present, and I think he was quite right not to delve into the process of verifying certificate change. That’s gotten needlessly complex, in fact I personally believe it’s a case of taking a simple job and assigning too many people to it until you end up with something that is blown up entirely out of proportion.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ellison, C. (1998). The Trust Shell Game. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_6
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive