Issue No. 01 - January-February (2004 vol. 2)
Sean W. Smith , Dartmouth College
Eugene H. Spafford , Purdue University
<p>Deployed technology thus illustrates, by example, that we haven?t learned how to build systems that we can reasonably trust to work correctly despite adversarial action. Nevertheless, we rush headlong to move even more important processes into computing systems, and to make commodity computing systems more ubiquitous.</p>
S. W. Smith and E. H. Spafford, "Grand Challenges in Information Security: Process and Output," in IEEE Security & Privacy, vol. 2, no. , pp. 69-71, 2004.