Wikipedia:Articles for deletion/Zooko's triangle
Appearance
From Wikipedia, the free encyclopedia
- The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.
The result was Keep. Plaintive plaintiff (talk) 23:15, 13 December 2012 (UTC)[reply]
- Zooko's triangle (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
- (Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL)
Notability not established. I have searched for sources, and there is nothing RS. Lots of hits, yes, but I would expect hits to well-known security or tech sites, but everything is self-published blogs.. MSJapan (talk) 01:12, 7 December 2012 (UTC) (talk) 12:37, 7 December 2012 (UTC)[reply]
- Keep. I found the following RS references:
- Ross J Anderson: *Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition*, page in Google Books - a reference in a book that weight alone should suffice
- Franz, Elke, Katrin Borcea-Pfitzmann, and Andreas Pfitzmann. "Revisiting the Naming Problem from a Privacy Perspective." Communications in Information Science and Management Engineering.
- Ferdous, Md. Identity Management with Petname Systems. Diss. Norwegian University of Science and Technology, 2009.
- Yao, Guang, et al. "A pull model IPv6 Duplicate Address Detection." Local Computer Networks (LCN), 2010 IEEE 35th Conference on. IEEE, 2010.
- Detti, Andrea, and Nicola Blefari-Melazzi. "Network layer solutions for a content-centric Internet." Trustworthy Internet (2011): 359-369.
- There are many more - I don't have time to go through them all. ciphergoth (talk) 13:08, 7 December 2012 (UTC)[reply]
- Keep - The set of references provided above looks reliable, and can be incorporated into the article. Pseudomonas(talk) 13:50, 7 December 2012 (UTC)[reply]
- Keep: Another reference:
- "Design and Implementation of a Censorship Resistant and Fully Decentralized Name System", Martin Schanzenbach, dissertation for Masterarbeit in Informatik, der Technoschen Universität München.
- Tony Finch (talk) 13:51, 7 December 2012 (UTC)[reply]
- Keep: I used and referenced Zooko's Triangle in my PhD thesis:
- "Building a Better Grid Authentication System with Kerberos", David McBride, Computing PhD thesis, Imperial College of Science, Technology, and Medicine, July 2011.
- Zooko is also the lead developer of Tahoe-LAFS which makes practical use of concepts in this area, and thus could be argued to have credibility as a result. David McBride (talk) 14:29, 7 December 2012 (UTC)[reply]
- Note: This debate has been included in the list of Computing-related deletion discussions. • Gene93k (talk) 22:08, 11 December 2012 (UTC)[reply]
- Note: This debate has been included in the list of Internet-related deletion discussions. • Gene93k (talk) 22:08, 11 December 2012 (UTC)[reply]
- Keep, sufficient amount of secondary sourcing including those mentioned directly, above. Cheers, — Cirt (talk) 02:25, 12 December 2012 (UTC)[reply]
- The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.