Reflecting on 20 SEC conferences

被引:8
作者
Botha, Reinhardt A. [1 ]
Gaadingwe, Tshepo G. [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Ctr Informat Secur Studies, ZA-6031 Port Elizabeth, South Africa
基金
新加坡国家研究基金会;
关键词
computer security; information security; security history; SEC conference series; TC-11;
D O I
10.1016/j.cose.2006.04.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ever-increasing use of information technology in business and everyday life led to a raised awareness of security issues. The last three decades spawned a large amount of research literature on security. The belief that the future can only be realized if the past is well understood has motivated an investigation into the history of information security. This report therefore focuses on analyzing the work reported in the past 20 SEC conferences, the flagship conference series of the IFIP Technical Committee 11 (TC-11). The study indicates that the focus of papers increased over time and that the output of papers became more technical. Certain topics such as auditing and business continuity have largely disappeared as a topic. The study confirmed an expected increase in the prominence of papers dealing with network related research. Surprisingly, information security management showed no upward trend; instead a slight decrease could be seen. In contrast, crypto-like topics showed a strong growth. Finally the paper reflects on the significance of the observations made, specifically with respect to future research considerations by the TC-11 community. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 28 条
[1]  
*ACM, 1998, ACM COMP CLASS SYST
[2]  
[Anonymous], 2000, INFORM MANAGEMENT CO
[3]  
Barber R., 2001, Network Security, P9
[4]   A KEYWORD CLASSIFICATION SCHEME FOR IS RESEARCH LITERATURE - AN UPDATE [J].
BARKI, H ;
RIVARD, S ;
TALBOT, J .
MIS QUARTERLY, 1993, 17 (02) :209-226
[5]   AN INFORMATION-SYSTEMS KEYWORD CLASSIFICATION SCHEME [J].
BARKI, H ;
RIVARD, S ;
TALBOT, J .
MIS QUARTERLY, 1988, 12 (02) :299-322
[6]  
Barrett N., 2003, Information Security Technical Report, V4, P56
[7]  
BJORCK F, 2001, P IFIP TC1 WG 11 8 2, P209
[8]  
BONIFACIO J, 1998, GLOBAL IT SECURITY S, V116, P418
[9]  
CARROLL JM, 1986, INFORM SECURITY CHAL, P90
[10]   Towards a theory of insider threat assessment [J].
Chinchani, R ;
Iyer, A ;
Ngo, HQ ;
Upadhyaya, S .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :108-117