by Bernie Cohen A reaction of one reader to my pragmatics blog was that, pragmatically speaking, it was still possible for a shared EHR to add value, but that it was certainly important to down…
Category: Trust and Security
The means by which we both manage and limit semantic and truth uncertainty.
by Richard Veryard We can use the three asymmetries to appreciate different strategies for security and trust, such as deperimeterization. First we need some definitions: Boundary refers to a discontinuity in a physical system, Perimeter…
by Richard Veryard
In a symmetric world, there is a clear distinction between genuine customers and hostile attackers – and the task of security is to tell them apart and keep them apart.
In an asymmetric world, this distinction breaks down.
by Richard Veryard
Who is going to want the kind of user-defined policies I talked about in the podcast (see previous post)? What are the strategic implications for banks and other service providers?
by Richard Veryard
Transcript from podcast, in which Richard provides an example of user-defined policy in the context of banking services.