This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


92 Despite informing clients of best practice other measures, the measures that are in place to protect e-
Government services must be designed on the assumption that not all clients wil adopt the guidance given and that some client machines wil have been compromised. 93 This might, for example, involve use of SSL/TLS and registering the service provider's public key with a trusted third-party certification authority such as Verisign.

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site