Difference between revisions of "Identity Management"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 12: Line 12:
 
|-
 
|-
 
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
 
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
 +
|-
 +
|Networking and Information Technology Research and Development||||''2009''||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
 
|-
 
|-
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']

Revision as of 14:46, 9 September 2010

TOC-> Issues->Identity Management

Author 1 Author 2 Year Title Source Expertise Full Text
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Report None Pdf
Networking and Information Technology Research and Development 2009 National Cyber Leap Year Summit 2009, Co-Chairs' Report Government Report None Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents