Abstract
Some of the distinguished information assurance experts have provided insights into how the evolving nature of threats, the current information technology environment, and various market forces are combining to yield new security challenges and new technology paths for the future. Terry V. Benzel has expressed that the future will see the commoditization of ubiquitous computing. Computing will move from a stand-alone conscious activity to a fully integrated aspect of daily life. Technically, it will move from workstations and laptops connected to networks and servers to embedded computational nodes and wide-spread sensor-based systems. Jeremy Epstein believes that availability of low-cost hardware in future will make feasible information assurance technologies. With the feasible networks of dedicated processors in a single computer of device, computing will see partitioning of applications with well-defined boundaries that will help to gain information assurance.
Original language | English (US) |
---|---|
Pages (from-to) | 16-23 |
Number of pages | 8 |
Journal | IEEE Security and Privacy |
Volume | 6 |
Issue number | 1 |
DOIs | |
State | Published - Jan 1 2008 |
Externally published | Yes |
Bibliographical note
Generated from Scopus record by KAUST IRTS on 2021-03-16ASJC Scopus subject areas
- Computer Networks and Communications
- Law
- Electrical and Electronic Engineering