Four Grand Challenges in Trustworthy Computing: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
Computing Research Assoc. ''Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering'' (2003). [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Web''] | Computing Research Assoc. ''Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering'' (2003). [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed& | [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=CRA:2003 ''BibTeX''] | ||
==Categorization== | ==Categorization== | ||
Overview: [[Government Reports]] | * Overview: [[Government Reports]] | ||
==Key Words== | ==Key Words== | ||
Line 26: | Line 25: | ||
because they threaten to constrict the pipeline of fundamental cyber security research that. . .is vital to | because they threaten to constrict the pipeline of fundamental cyber security research that. . .is vital to | ||
securing the Nation’s IT infrastructure.” | securing the Nation’s IT infrastructure.” | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== |
Revision as of 09:50, 24 June 2010
Full Title of Reference
Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering
Full Citation
Computing Research Assoc. Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering (2003). Web
Categorization
- Overview: Government Reports
Key Words
Synopsis
The goal of the CRA Grand Research Challenges conferences is to encourage thinking beyond incremental improvements. Some important problems simply cannot be solved by narrow investigation aimed at short-term payoffs. Multiple approaches, carried out over a long period of time, will be required. The community is, in effect, looking for big advances that require vision and cannot be achieved by small evolutionary steps. The February 2005 report by the President’s Information Technology Advisory Committee (PITAC) supported a long-term view of research by agencies such as DARPA and NSA, arguing that the trends “favoring short-term research over long-term research. . . should concern policymakers because they threaten to constrict the pipeline of fundamental cyber security research that. . .is vital to securing the Nation’s IT infrastructure.”