Access Restriction

Author Tygar, J. D. ♦ Bishop, M. ♦ Rosenberg, C. ♦ Fahmy, S. ♦ Joseph, A. ♦ Porras, P. ♦ Levitt, K. ♦ Bajcsy, R. ♦ Floyd, S. ♦ Brodley, C. ♦ Liu, P. ♦ Lindell, B. ♦ Benzel, T. ♦ Braden, B. ♦ Paxson, V. ♦ Miller, D. ♦ Mundy, R. ♦ Sastry, S. ♦ Ostrenga, R. ♦ Kesidis, G. ♦ Wu, S. F. ♦ Hardaker, W. ♦ Neuman, C. ♦ Sterne, D.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Creating an experimental infrastructure for developing next-generation information security technologies.
Description Affiliation: Member of the DETER Projects and the EMIST Projects (Bajcsy, R.; Benzel, T.; Bishop, M.; Braden, B.; Brodley, C.; Fahmy, S.; Floyd, S.; Hardaker, W.; Joseph, A.; Kesidis, G.; Levitt, K.; Lindell, B.; Liu, P.; Miller, D.; Mundy, R.; Neuman, C.; Ostrenga, R.; Paxson, V.; Porras, P.; Rosenberg, C.; Tygar, J. D.; Sastry, S.; Sterne, D.; Wu, S. F.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 47
Issue Number 3
Page Count 4
Starting Page 58
Ending Page 61

Open content in new tab

   Open content in new tab
Source: ACM Digital Library