Grand Challenges in Information Security: Process and Output

  • Authors:
  • Sean W. Smith;Eugene H. Spafford

  • Affiliations:
  • Dartmouth College;Purdue University

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Deployed technology thus illustrates, by example, that we haven't learned how to build systems that we can reasonably trust to work correctly despite adversarial action. Nevertheless, we rush headlong to move even more important processes into computing systems, and to make commodity computing systems more ubiquitous.