Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.
This solution discusses point-to-point and end-to-end security models from the following aspects:
- Problems they address