Piece about our paper in the International Journal of Information and Computer Security which surveyed security mechanisms and their shortcomings