Four Grand Challenges in Trustworthy Computing

From Cybersecurity Wiki
Revision as of 15:56, 4 June 2010 by <bdi>Shane</bdi> (talk | contribs) (New page: ==Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering== ==Full Citation== National Cyber Se...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering

Full Citation

National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Government. Online Paper. Web

[Computing Research Association (2003): Four Grand Challenges in Trustworthy Computing. Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering. U.S. Government. Online Paper. BibTeX]


Categorization

Overview: Government Reports

Key Words

Synopsis

Additional Notes and Highlights