Back to Results
First PageMeta Content
National security / Computer crimes / Computer network security / Secure communication / Howard Schmidt / Trustworthy computing / International Multilateral Partnership Against Cyber Threats / Trusted computing base / Comprehensive National Cybersecurity Initiative / Cyberwarfare / Security / Computer security


C OV ER F E AT U RE MOVING TOWARD TRUSTWORTHY SYSTEMS: R&D ESSENTIALS
Add to Reading List

Document Date: 2012-12-19 11:35:47


Open Document

File Size: 1,63 MB

Share Result on Facebook

Company

National Laboratories / Information Assurance Research and Development / U RE MOVING TOWARD TRUSTWORTHY SYSTEMS / National Cyber Leap Year Summit (1) Hardware / DoD Software / N11 Trust / Google / USG / Inter-Agency Working Group / Intel / Secure Control Systems / /

Country

Estonia / United States / /

Currency

USD / pence / /

/

Facility

University of Texas / building TTSs / Oak Ridge National Laboratory / /

IndustryTerm

process control systems / software engineering / near real time / Secure systems / normal dynamic involving hardware / trustworthy computing / technology development / organized Internet / reason computing / verse systems / fundamental protocols / e-fraud / deployable technologies / online monitoring / trust management / security technologies / individual security technologies / generic security-assured commodity hardware solutions / energy consumption / Unreliable software / Economic tools / insecure communications / secure and assured software / computing / hardware-software solutions / Applicable technologies / software assurance activities / software architectures / technology potential / cause software life-cycle problems / immune systems / technology development cycles / attacking dynamic systems / identity management / secure server / security technology / Web application exploits / always-imperfect computing environment / potential solutions / foundations computing environments / software assurance / Web Privacy / economic solutions / context-specific trust services / dependable systems / trustworthy systems / greater scalability across all devices / disparate security tools / open source applications / game-change solutions / time-critical systems / game-changing technologies / composite systems / Internet modeling / methodologies and tools / privilege management / unreliable communications / vulnerable connected device / software testing / /

Organization

University of Texas at Austin / US Government / CYBERSECURITY IS VITAL TO MODERN SOCIETY / National Coordination Office for NITRD / Nuclear Regulatory Commission / Internet National Infrastructure Advisory Council / CSIS Commission on Cybersecurity / National Science and Technology Council / US Secret Service / NITRD subcommittee / Pentagon / University of Texas at Arlington / INFOSEC Research Council / Oak Ridge National Laboratory / Carnegie Mellon / IT Advisory Committee / Computational Intelligence / CERT Coordination Center / Congress / National Academy of Science / White House / Technology Council / Department of Defense / IEEE Computer Society / /

Person

M. Dacier / V / Susan Alexander / Frederick T. Sheldon / Prioritization / Dennis Blair / Claire Vishik / Aneesh Chopra / Cybersecurity Incidents / Tomas Vagoun / Howard Schmidt / /

Position

CTO / President / technology and policy manager / contractor / Major / research scientist / attack attribuboth feed-forward / Governor / Director / OpenNet Intitiative Director / /

ProgrammingLanguage

C / /

ProvinceOrState

Georgia / Texas / /

Technology

MT technologies / Information Technology / individual security technologies / game-changing technologies / html / encryption / security technologies / security technology / 10 technologies / operating systems / process control / pdf / DNS / http / simulation / /

URL

http /

SocialTag