The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2013 vol.11)
pp: 96
Daniel E. Geer , In-Q-Tel
ABSTRACT
If seizing an abandoned code base is too big a stretch for you before breakfast, then start with a certifying authority that goes bankrupt: Who gets the keys?
INDEX TERMS
Encoding, Codes, keys, ownership, identity
CITATION
Daniel E. Geer, "On Abandonment", IEEE Security & Privacy, vol.11, no. 4, pp. 96, July-Aug. 2013, doi:10.1109/MSP.2013.92
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool