Team for Research in
Ubiquitous Secure Technology

Workshop on Future Directions for NSF's Cyber Trust Program
Karl Levitt, David Du, Lee Gruenwald, Steve Mahaney, Ralph Wachter, Mike Reiter, Helen Conti

Citation
Karl Levitt, David Du, Lee Gruenwald, Steve Mahaney, Ralph Wachter, Mike Reiter, Helen Conti. "Workshop on Future Directions for NSF's Cyber Trust Program". Talk or presentation, 8, October, 2006.

Abstract
Presented at the TRUST Fall 2007 Meeting, Pittsburgh, PA.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Karl Levitt, David Du, Lee Gruenwald, Steve Mahaney, Ralph
    Wachter, Mike Reiter, Helen Conti. <a
    href="http://www.truststc.org/pubs/128.html"
    ><i>Workshop on Future Directions for NSF's Cyber
    Trust Program</i></a>, Talk or presentation,  8,
    October, 2006.
  • Plain text
    Karl Levitt, David Du, Lee Gruenwald, Steve Mahaney, Ralph
    Wachter, Mike Reiter, Helen Conti. "Workshop on Future
    Directions for NSF's Cyber Trust Program". Talk or
    presentation,  8, October, 2006.
  • BibTeX
    @presentation{LevittDuGruenwaldMahaneyWachterReiterConti06_WorkshopOnFutureDirectionsForNSFsCyberTrustProgram,
        author = {Karl Levitt, David Du, Lee Gruenwald, Steve
                  Mahaney, Ralph Wachter, Mike Reiter, Helen Conti},
        title = {Workshop on Future Directions for NSF's Cyber
                  Trust Program},
        day = {8},
        month = {October},
        year = {2006},
        abstract = {Presented at the TRUST Fall 2007 Meeting,
                  Pittsburgh, PA.},
        URL = {http://www.truststc.org/pubs/128.html}
    }
    

Posted by Christopher Brooks on 11 Oct 2006.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.