Issue No. 04 - July-Aug. (2013 vol. 11)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2013.92
Daniel E. Geer , In-Q-Tel
If seizing an abandoned code base is too big a stretch for you before breakfast, then start with a certifying authority that goes bankrupt: Who gets the keys?
Encoding, Codes, keys, ownership, identity
D. E. Geer, "On Abandonment," in IEEE Security & Privacy, vol. 11, no. , pp. 96, 2013.