Difference between revisions of "Four Grand Challenges in Trustworthy Computing"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering== ==Full Citation== National Cyber Se...)
 
Line 5: Line 5:
 
National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf  ''Web'']
 
National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf  ''Web'']
  
[Computing Research Association (2003): Four Grand Challenges in Trustworthy Computing. Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering. U.S. Government. Online Paper. BibTeX]
+
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX]
  
  

Revision as of 15:57, 4 June 2010

Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering

Full Citation

National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. Web

BibTeX


Categorization

Overview: Government Reports

Key Words

Synopsis

Additional Notes and Highlights