Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this

Table Of Contents

1. Scalable Trustworthy Systems
2. Enterprise-Level Metrics (ELMs)
3. System Evaluation Life Cycle
4. Combatting Insider Threats
5. Combatting Malware and Botnets
6. Global-Scale Identity Management
7. Survivability of Time-Critical Systems
8. Situational Understanding and Attack Attribution
9. Provenance
10. Privacy-Aware Security
11. Usable Security
Appendix A. Interdependencies Among Topics
Appendix B. Technology Transfer
Appendix C. List of Participants in the Roadmap Development
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 5 |Likes:
Published by ObeyYourMaster

More info:

Published by: ObeyYourMaster on Aug 18, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 23 are not shown in this preview.
You're Reading a Free Preview
Pages 27 to 126 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->