This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Grand Challenges in Information Security: Process and Output
January-February 2004 (vol. 2 no. 1)
pp. 69-71
Sean W. Smith, Dartmouth College
Eugene H. Spafford, Purdue University

Deployed technology thus illustrates, by example, that we haven?t learned how to build systems that we can reasonably trust to work correctly despite adversarial action. Nevertheless, we rush headlong to move even more important processes into computing systems, and to make commodity computing systems more ubiquitous.

Citation:
Sean W. Smith, Eugene H. Spafford, "Grand Challenges in Information Security: Process and Output," IEEE Security & Privacy, vol. 2, no. 1, pp. 69-71, Jan.-Feb. 2004, doi:10.1109/MSECP.2004.1264859
Usage of this product signifies your acceptance of the Terms of Use.