Four Grand Challenges in Trustworthy Computing: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
==Full Citation==
==Full Citation==


National Cyber Security Summit Task Force : Information Security Governance. A Call to Action. (2004). [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf  ''Web'']
Computing Research Assoc. ''Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering'' (2003). [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf  ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX]
Line 17: Line 17:


==Synopsis==
==Synopsis==
 
The goal of the CRA Grand Research Challenges conferences is to encourage thinking beyond
incremental improvements. Some important problems simply cannot be solved by narrow investigation
aimed at short-term payoffs. Multiple approaches, carried out over a long period of time, will be required.
The community is, in effect, looking for big advances that require vision and cannot be achieved by
small evolutionary steps. The February 2005 report by the [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security:_A_Crisis_of_Prioritization President’s Information Technology Advisory
Committee (PITAC)] supported a long-term view of research by agencies such as DARPA and NSA, arguing
that the trends “favoring short-term research over long-term research. . . should concern policymakers
because they threaten to constrict the pipeline of fundamental cyber security research that. . .is vital to
securing the Nation’s IT infrastructure.”




==Additional Notes and Highlights==
==Additional Notes and Highlights==

Revision as of 14:39, 17 June 2010

Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering

Full Citation

Computing Research Assoc. Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering (2003). Web

BibTeX


Categorization

Overview: Government Reports

Key Words

Synopsis

The goal of the CRA Grand Research Challenges conferences is to encourage thinking beyond incremental improvements. Some important problems simply cannot be solved by narrow investigation aimed at short-term payoffs. Multiple approaches, carried out over a long period of time, will be required. The community is, in effect, looking for big advances that require vision and cannot be achieved by small evolutionary steps. The February 2005 report by the [http://cyber.law.harvard.edu/cybersecurity/Cyber_Security:_A_Crisis_of_Prioritization President’s Information Technology Advisory Committee (PITAC)] supported a long-term view of research by agencies such as DARPA and NSA, arguing that the trends “favoring short-term research over long-term research. . . should concern policymakers because they threaten to constrict the pipeline of fundamental cyber security research that. . .is vital to securing the Nation’s IT infrastructure.”


Additional Notes and Highlights