Back to Results
First PageMeta Content
Computer network security / Information technology management / Trustworthy computing / Vulnerability / Attack / Cyber security and countermeasure / Institute for Information Infrastructure Protection / Computer security / Cyberwarfare / Security


Four Grand Challenges in TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003
Add to Reading List

Document Date: 2012-12-19 11:01:32


Open Document

File Size: 213,11 KB

Share Result on Facebook

Company

IBM / Sun Microsystems / Shinkuro Inc. / DARPA / Intel / NSA / Microsoft / Forrester Research / /

Country

United States / /

Currency

USD / /

Facility

National Institute of Standards and Technology / Carnegie Mellon University / University of Maryland Sy Goodman / Georgia Institute of Technology / University of Virginia Acknowledgments Funding / National Threat Assessment Center / TRUSTWORTHY COMPUTING The Computer Emergency Response Team Coordination Center / Georgia Institute of Technology Anita Jones / University of California / NIST SPEC PUB / /

IndustryTerm

transportation / ubiquitous computing / trustworthy computing / information technology infrastructure / technology curve / mature trust-enhancing technologies / e-commerce / Internet-based systems Daily E-Commerce Revenues / Software developers / communications technology / trustworthy computing infrastructure / energy / gross domestic product / portable systems / software / massive computing resources / communications systems / communications capabilities / information technology / commodity hardware / e - commerce / computing systems / Internet age / Internet communications / /

OperatingSystem

Microsoft Windows / /

Organization

National Research Council / Information Technology Advisory Committee / University of Virginia Acknowledgments Funding / National Science Foundation / University of Maryland Sy Goodman / Computer Emergency Response Team Coordination Center / National Threat Assessment Center / Government Accountability Office / University of California / Berkeley / Computing Research Association / National Academy of Sciences / Purdue University / United States Secret Service / Cornell University / National Institute of Standards and Technology / Research Association / National Academy of Engineering / Georgia Institute of Technology / Carnegie Mellon University / Department of Defense / National Computer Security Association / /

Person

William Wulf / Steve Crocker / Michael Cherry / Richard A. DeMillo / Fred Schneider / David Farber / Douglas Tygar / Gordon Moore / Virginia Susan Landau / Andrew Bernat / Peter Neumann / David Patterson / Virgil Gligor / Thomas J. Watson / /

Position

President / co-founder / Co-Chair Committee / /

ProvinceOrState

California / Georgia / /

Region

Northern Virginia / /

Technology

mature trust-enhancing technologies / information technology / communications technology / operating systems / Cryptography / Nearly fifty technology / Trustworthy Computing Information technologies / underlying technology / /

URL

http /

SocialTag