Workshop goal was to challenge, establish and debate a far-reaching discussion that broadly and comprehensively outlines a strategy for cyber security that is founded on sound technologies for better understanding of existing and emerging threats; advances in insider threat detection, deterrence, mitigation and threat elimination; ensuring security, survivability and dependability of critical infrastructures; guaranteeing availability of time-critical scalably secure systems; observable measurable certifiable security effects, rather than hypothesized causes; quantitative metrics that enable us to specify security requirements, formulate security claims, and certify security properties; solutions that provide a measure of assurance against known and unknown (though perhaps pre-modeled) threats; mission fulfillment, whether or not security violations have taken place rather than mitigating all violations indiscriminately.
- Publication Date
- Aug 21, 2007
- Computers & Technology
- All Rights Reserved - Standard Copyright License
- By (author): Frederick Sheldon, By (author): Seong-Moo Yoo, By (author): Ali Mili, By (author): Axel Krings