Information security is information risk management
Proceedings of the 2001 workshop on New security paradigms
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Hi-index | 0.00 |
Our thesis is that biometric and other intertwined technologies will be used to supplement the work of people in the security field. When these technologies are used, we fear that a high degree of misinterpretation and error is likely. Because of this, we need to identify the technical measures required for these systems. This thesis, along with a justification, and proof sketch, was given to the panelists.Five areas of the technology life-cycle were investigated: modeling, implementation, interpretation of results, database protection, and social issues.The format was simple. After the introduction, each panelist gave a brief presentation. Afterwards the workshop participated in a highly interactive and collegial way, with the panel chair keeping things orderly.A lively discussion resulted, with many good comments and questions from the NSPW attendees, some of which we report.