DocumentCode :
884846
Title :
Grand challenges in information security: process and output
Author :
Smith, Sean W. ; Spafford, Eugene H.
Author_Institution :
Dartmouth Coll., Hanover, NH, USA
Volume :
2
Issue :
1
fYear :
2004
Firstpage :
69
Lastpage :
71
Abstract :
Even casual observers can see that our society´s computing infrastructure has significant security problems. Technical sources such as CERT, BugTraq, and the Risks Digest - not to mention the popular media - regularly catalog critical vulnerabilities in deployed software. Unless we figure out how to build trustworthy systems in the real world, we´re in trouble. Recognizing that fact, the Computing Research Association (CRA, www.cra.org), with support from the US National Science Foundation, recently drafted its Grand Research Challenges in security and assurance, intent on galvanizing the field by focusing attention and stimulating progress on these problems.
Keywords :
data privacy; government policies; risk management; security of data; Computing Research Association; US National Science Foundation; computing infrastructure; critical vulnerabilities; deployed software; grand challenges; information security; security problems; trustworthy systems; Board of Directors; Computer bugs; Computer security; Computer vision; Engineering profession; Information security; Organizing; Privacy; Proposals; Switches;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSECP.2004.1264859
Filename :
1264859
Link To Document :
بازگشت