Security research aims at reducing the risk and consequences of attacks on information technology. Based on the projection of current trends, this vision paper makes an attempt at identifying potential security research challenges for the next 10 years. Examples of identified challenges are the trend to have pervasive computing in tiny devices, to collect and analyze data from these devices and other sources, and to increase the connection between IT and physical systems. © 2014 Springer International Publishing.
CITATION STYLE
Schunter, M. (2014). Data security and privacy in 2025? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8425 LNCS, pp. 37–41). Springer Verlag. https://doi.org/10.1007/978-3-319-06811-4_8
Mendeley helps you to discover research relevant for your work.