Abstract
What I wanted to spend a few minutes talking about is changes it the environment and purpose in which protocols are conducted. When Mike Schroder and I wrote our paper in 1977, published in 1978, one of the things we did was to be quite explicit about what we assumed to do with the environment. We assumed that we had principals, whether human or mechanical, that wanted to establish a secure connection, and the assumption was that the principals themselves worked in the way they were supposed to work. If they were people they were honest people, if they were programs they were correct programs. But the environment was thoroughly wicked and everything about the environment conducted itself so as to cause the whole procedure to fail if it possibly could.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Needham, R. (2000). Keynote Address: The Changing Environment. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_1
Download citation
DOI: https://doi.org/10.1007/10720107_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive