Search For:

Displaying 1-4 out of 4 total
Information Assurance Technology Forecast 2008
Found in: IEEE Security and Privacy
By Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo
Issue Date:January 2008
pp. 16-23
A virtual roundtable (featuring panelists Steven Bellovin, Terry Benzel, Bob Blakely, Dorothy Denning, Whitfield Diffie, Jeremy Epstein, and Paulo Verissimo) discussing the next 15 years in computer security.
Are You Smarter than the TSA? (Hint: No)
Found in: IEEE Security & Privacy Magazine
By Daniel E. Geer,Bob Blakley
Issue Date:July 2012
pp. 94-95
An asymmetric enemy makes us spend a dollar on every single thing that might happen while he spends money on the one thing that will. We can't win the enemy's spending game, so we need to focus on spending money on a smaller number of things.
Information security is information risk management
Found in: Proceedings of the 2001 workshop on New security paradigms (NSPW '01)
By Bob Blakley, Dan Geer, Ellen McDermott
Issue Date:September 2001
pp. 97-104
Information security is important in proportion to an organization's dependence on information technology. When an organization's information is exposed to risk, the use of information security technology is obviously appropriate. Current information secur...
The Emperor's old armor
Found in: Proceedings of the 1996 workshop on New security paradigms (NSPW '96)
By Bob Blakley
Issue Date:September 1996
pp. 2-16
Virtual Environments (VEs) have the potential to revolutionize traditional product design by enabling the transition from conventional CAD to fully digital product development The presented prototype system targets closing the **digital gap” as intro...