Skip to main content

Search results for "security policies"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 50 results by relevance
Consensus Study Report

Trust in Cyberspace  (1999)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Proceedings

The Gates Are Open: Control System Cyber-Physical Security for Facilities: Proceedings of a Federal Facilities Council Workshop—in Brief  (2021)

Computing and Communications in the Extreme: Research for Crisis Management and Other Applications  (1996)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Consensus Study Report

Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers  (2001)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Cryptography's Role in Securing the Information Society  (1996)

Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Proceedings

Cryptographic Agility and Interoperability: Proceedings of a Workshop  (2017)

Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)

Consensus Study Report

Protecting Data Privacy in Health Services Research  (2000)