This Article 
 Bibliographic References 
 Add to: 
Security and Privacy Landscape in Emerging Technologies
July/August 2008 (vol. 6 no. 4)
pp. 74-77
Susan Landau, Sun Microsystems
Recent events spawned a need for better communications of security systems, including industrial control systems and emergency management systems. This work is in initial phases and the author reports it here. In this final column for emerging standards and technologies, she also discusses the privacy and security challenges of Web 2.0 and globalization.

1. E. Maler and D. Reed, "The Venn of Identity: Option and Issues in Federated Identity Management," IEEE Security &Privacy, vol. 6, no. 2, 2008, pp. 16–23.
2. W.E. Burr, "Selecting the Advanced Encryption Standard," IEEE Security &Privacy, vol. 1, no. 2, pp. 43–52.
3. M. Clendenin, "WAPI Battle Exposes Technology Rifts with China," EETimes,17 Mar. 2006; .
4. W. Diffie and G. Ledin, translators, "SMS4 Encryption Algorithm for WirelesNetworks," version 1.02, 8 May 2008.

Index Terms:
industrial control systems, emergency management systems, Web 2.0, privacy, TPM, TCM, Trusted Platform Module , emerging standards
Susan Landau, "Security and Privacy Landscape in Emerging Technologies," IEEE Security & Privacy, vol. 6, no. 4, pp. 74-77, July-Aug. 2008, doi:10.1109/MSP.2008.95
Usage of this product signifies your acceptance of the Terms of Use.