Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
We argue that the disruption associated with war can help develop a deeper theoretical and practical understanding of how Information and Communication Technologies (ICTs) enable ...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...