TY - GEN
T1 - Building technologies that help cyber-defense
T2 - 14th Information Security Solutions Europe Conference, ISSE 2012
AU - Vishik, Claire
AU - Lee, Ruby B.
AU - Chong, Fred
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - The paper focuses on hardware enabled trust as an example of building security-Aware technologies that can bring an advantage to the defenders and make attacks more difficult. The paper grew out of a report that the authors produced as part of the Cyber Leap Year Summit in late 2009. The authors suggest research directions in the area of hardware-enahled trust. both shorter and longer term, that can help overcome the attackers' advantage and produce positive changes in cybersecurity technologies.
AB - The paper focuses on hardware enabled trust as an example of building security-Aware technologies that can bring an advantage to the defenders and make attacks more difficult. The paper grew out of a report that the authors produced as part of the Cyber Leap Year Summit in late 2009. The authors suggest research directions in the area of hardware-enahled trust. both shorter and longer term, that can help overcome the attackers' advantage and produce positive changes in cybersecurity technologies.
UR - http://www.scopus.com/inward/record.url?scp=84882935800&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84882935800&partnerID=8YFLogxK
U2 - 10.1007/978-3-658-00333-3_30
DO - 10.1007/978-3-658-00333-3_30
M3 - Conference contribution
AN - SCOPUS:84882935800
SN - 9783658003326
T3 - ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference
SP - 316
EP - 325
BT - ISSE 2012 Securing Electronic Business Processes
Y2 - 23 October 2012 through 24 October 2012
ER -