Improving Information Flow in the Information Security Market

DoD Experience and Future Directions
  • Carl E. Landwehr
Part of the Advances in Information Security book series (ADIS, volume 12)

Keywords

Information Security Security Property Computer Security Product Security Caveat Emptor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Research Council, System Security Study Committee, CSTB, Computers at Risk, National Academy Press, 1991. Chapter 6, “Why the Security Market Has Not Worked Well”, pp. 143–178. Also available at http://www.nap.edu.
  2. B. Witten., C. Landwehr, and M. Caloyannides. Does open source improve security? IEEE Software 18,5, Sept. 2001, 57–61. Sardonix website:http://www.sardonix.orgCrossRefGoogle Scholar
  3. D. Geer. Information security: why the future belongs to the quants. IEEE Security & Privacy July/August 2003, 24–32.Google Scholar

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Carl E. Landwehr
    • 1
  1. 1.University of MarylandUSA

Personalised recommendations