build systems / inadequate products / detection systems / software flaws / software users / hierarchical infrastructure / insecure solutions / determined high-tech military / software vendors / purchase secure computer hardware / server software / present-day machinery / semantic web / public key infrastructure / wireless protocols / intrusion detection systems / formal software validation / web browsers / legacy systems / insecure semantic web analysis / information technology / security products / intrusion prevention systems / high tech / software industry / communication protocols / hostile network / actual applications / encryption technology salesmen / software exploiters / security software / semantic web analysis / secure and robust software / secure software / larger systems / be composed using communication protocols / /
OperatingSystem
UNIX / /
Organization
North Atlantic Treaty Organization / Freie University of Berlin / Harvard / Full Disclosure / /
Person
SANDRO GAYCKEN / Gerald M. Weinberg / /
Position
commander / critical guard / /
Product
products / markets / /
Technology
encryption / public key infrastructure / public key / encryption technology / using communication protocols / flow control / UNIX / information technology / PKI / wireless protocols / operating system / operating systems / anti-virus software / /