Four Grand Challenges in Trustworthy Computing: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering== ==Full Citation== National Cyber Se...) |
No edit summary |
||
Line 5: | Line 5: | ||
National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Web''] | National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Web''] | ||
[ | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX] | ||
Revision as of 10:57, 4 June 2010
Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering
Full Citation
National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. Web
Categorization
Overview: Government Reports