Abstract
We have seen an explosion in the number of: conferences and workshops on all aspects of information security, topics studied in this field, and papers published. At the same time we have only seen a few widely deployed applications of this research. Meanwhile, computers are becoming less secure and criminals are exploiting new tricks. So, there is clearly a gap between theory and practice in information security. In this paper we analyze it and discuss the potential impacts of this gap.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Knuth, D.E.: The Art of Computer Programming. Fundamental Algorithms, vol. 1. Addison-Wesley, Reading (1973)
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.: Analysis of an electronic voting system. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, California, May 2004, pp. 27–42. IEEE Computer Society, Los Alamitos (2004)
Assessment of department of defense basic research. National Research Council (2005), http://www.nap.edu/openbook.php?record_id=11177&page=R1
Report of the national workshop on internet voting (March 2001), news.findlaw.com/cnn/docs/voting/nsfe-voterprt.pdf
Schneier, B.: Applied Cryptography, 1st edn., J. Wiley, New York (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y. (2005). Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_44
Download citation
DOI: https://doi.org/10.1007/11506157_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)