Team for Research in
Ubiquitous Secure Technology

Realizing intrinsically cyber secure large systems
Massimo Scipioni

Citation
Massimo Scipioni. "Realizing intrinsically cyber secure large systems". Talk or presentation, 2, November, 2011; Talk or presentation, 2, November, 2011; Presented at the TRUST Autumn 2011 Conference.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Massimo Scipioni. <a
    href="http://www.truststc.org/pubs/795.html"><i>Realizing
    intrinsically cyber secure large
    systems</i></a>, Talk or presentation,  2,
    November, 2011; Talk or presentation,  2, November, 2011;
    Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • Plain text
    Massimo Scipioni. "Realizing intrinsically cyber secure
    large systems". Talk or presentation,  2, November,
    2011; Talk or presentation,  2, November, 2011; Presented at
    the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • BibTeX
    @presentation{Scipioni11_RealizingIntrinsicallyCyberSecureLargeSystems,
        author = {Massimo Scipioni},
        title = {Realizing intrinsically cyber secure large systems},
        day = {2},
        month = {November},
        year = {2011},
        note = {Talk or presentation,  2, November, 2011;
                  Presented at the <a
                  href="http://www.truststc.org/conferences/11/FallConference"
                  >TRUST Autumn 2011 Conference</a>},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/795.html}
    }
    

Posted by Christopher Brooks on 3 Nov 2011.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.