“…For now we just note that some of ICING's components are reminiscent of or inspired by prior mechanisms [7, 10, 11, 13, 17, 19, 24, 28-31, 49, 51, 57, 58, 65, 69], and ICING can enforce many previously proposed policies. However, we know of only one proposal that offers both Path Consent and Path Compliance [18] and none that offers these two properties in an environment that is adversarial, high-speed, and federated. More specifically, this paper's contributions are:…”