Trust models: “hop-by-hop” vs “end-to-end”
“Channel security” vs “Object security”
- e.g. IP Sec, GSSAPI vs S/MIME
Which one?
- Degree of control by intermediaries
- Routing information
- Granularity of control
- Content-based filtering
- Speed tradeoffs
- Available infrastructure
- User convenience
- e.g. poor portability of certificates
-
-
-