Improving Information Flow in the Information Security Market
DoD Experience and Future Directions
Part of the Advances in Information Security book series (ADIS, volume 12)
KeywordsInformation Security Security Property Computer Security Product Security Caveat Emptor
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- National Research Council, System Security Study Committee, CSTB, Computers at Risk, National Academy Press, 1991. Chapter 6, “Why the Security Market Has Not Worked Well”, pp. 143–178. Also available at http://www.nap.edu.
- D. Geer. Information security: why the future belongs to the quants. IEEE Security & Privacy July/August 2003, 24–32.Google Scholar
© Springer Science + Business Media, Inc. 2004