Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Diversity: the biological perspective position statement
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
A security-centric ring-based software architecture
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Proceedings of the 2011 workshop on New security paradigms workshop
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
The state of the science of information security isastonishingly rich with solutions and tools toincrementally and selectively solve the hard problems. Incontrast, the state of the actual application of science,and the general knowledge and understanding of theexisting science, is lamentably poor. Still we face adramatically growing dependence on informationtechnology, e.g., the Internet, that attracts a steadilyemerging threat of well-planned, coordinated hostileattacks. A series of hard-won scientific advances givesus the ability to field systems having verifiable protection,and an understanding of how to powerfully leverageverifiable protection to meet pressing system securityneeds. Yet, we as a community lack the discipline,tenacity and will to do the hard work to effectively deploysuch systems. Instead, we pursue pseudoscience andflying pigs. In summary, the state of the science incomputer and network security is strong, but it suffersunconscionable neglect.