Title :
Grand challenges in information security: process and output
Author :
Smith, Sean W. ; Spafford, Eugene H.
Author_Institution :
Dartmouth Coll., Hanover, NH, USA
Abstract :
Even casual observers can see that our society´s computing infrastructure has significant security problems. Technical sources such as CERT, BugTraq, and the Risks Digest - not to mention the popular media - regularly catalog critical vulnerabilities in deployed software. Unless we figure out how to build trustworthy systems in the real world, we´re in trouble. Recognizing that fact, the Computing Research Association (CRA, www.cra.org), with support from the US National Science Foundation, recently drafted its Grand Research Challenges in security and assurance, intent on galvanizing the field by focusing attention and stimulating progress on these problems.
Keywords :
data privacy; government policies; risk management; security of data; Computing Research Association; US National Science Foundation; computing infrastructure; critical vulnerabilities; deployed software; grand challenges; information security; security problems; trustworthy systems; Board of Directors; Computer bugs; Computer security; Computer vision; Engineering profession; Information security; Organizing; Privacy; Proposals; Switches;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSECP.2004.1264859