Identity Management: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |- | ||
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent | |Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf''] | ||
|- | |- | ||
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | |Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] |
Revision as of 15:45, 20 August 2010
TOC-> Issues->Identity Management
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Report | None | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None