Potential Impacts of a Growing Gap Between Theory and Practice in Information Security
We have seen an explosion in the number of: conferences and workshops on all aspects of information security, topics studied in this field, and papers published. At the same time we have only seen a few widely deployed applications of this research. Meanwhile, computers are becoming less secure and criminals are exploiting new tricks. So, there is clearly a gap between theory and practice in information security. In this paper we analyze it and discuss the potential impacts of this gap.
KeywordsInformation Security Computer Security Address Privacy Security Expert Electronic Vote
Unable to display preview. Download preview PDF.
- 1.Knuth, D.E.: The Art of Computer Programming. Fundamental Algorithms, vol. 1. Addison-Wesley, Reading (1973)Google Scholar
- 3.Assessment of department of defense basic research. National Research Council (2005), http://www.nap.edu/openbook.php?record_id=11177&page=R1
- 4.Report of the national workshop on internet voting (March 2001), news.findlaw.com/cnn/docs/voting/nsfe-voterprt.pdf
- 5.Schneier, B.: Applied Cryptography, 1st edn., J. Wiley, New York (1994)Google Scholar