Information assurance technology forecast 2008

Steven M. Bellovin, Terry V. Benzel, B. O.B. Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Some of the distinguished information assurance experts have provided insights into how the evolving nature of threats, the current information technology environment, and various market forces are combining to yield new security challenges and new technology paths for the future. Terry V. Benzel has expressed that the future will see the commoditization of ubiquitous computing. Computing will move from a stand-alone conscious activity to a fully integrated aspect of daily life. Technically, it will move from workstations and laptops connected to networks and servers to embedded computational nodes and wide-spread sensor-based systems. Jeremy Epstein believes that availability of low-cost hardware in future will make feasible information assurance technologies. With the feasible networks of dedicated processors in a single computer of device, computing will see partitioning of applications with well-defined boundaries that will help to gain information assurance.
Original languageEnglish (US)
Pages (from-to)16-23
Number of pages8
JournalIEEE Security and Privacy
Volume6
Issue number1
DOIs
StatePublished - Jan 1 2008
Externally publishedYes

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Law
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Information assurance technology forecast 2008'. Together they form a unique fingerprint.

Cite this