Cyber Security Research and Development Agenda: Difference between revisions
Line 6: | Line 6: | ||
Inst. for Infor. Infrastructure Prot. ''Cyber Security Research and Development Agenda'' (2003). [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Web''] | Inst. for Infor. Infrastructure Prot. ''Cyber Security Research and Development Agenda'' (2003). [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed& | [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=I3P:2003 ''BibTeX''] | ||
==Categorization== | ==Categorization== |
Revision as of 11:09, 14 July 2010
Full Title of Reference
Cyber Security Research and Development Agenda
Full Citation
Inst. for Infor. Infrastructure Prot. Cyber Security Research and Development Agenda (2003). Web
Categorization
Overview: Independent Reports
Key Words
Synopsis
This initial Cyber Security Research and Development (R&D) Agenda identifies R&D topics of significant value to the security of the information infrastructure that are either not funded or under-funded by the collection of private sector and government-sponsored research activities in the United States. The Agenda is based on information gathered and analyzed during the 2002 calendar year and reflects the input of experts in industry, government, and academia. The Agenda, together with that supporting information, is intended to aid researchers in identifying problems and R&D program managers in defining program directions. Areas in which new or additional research is needed include:
• Enterprise Security Management
• Trust Among Distributed Autonomous Parties
• Discovery and Analysis of Security Properties and Vulnerabilities
• Secure System and Network Response and Recovery
• Traceback, Identification, and Forensics
• Wireless Security
• Metrics and Models
• Law, Policy, and Economic Issues