CISAC - Publications Page

Publications

Filter:

Filter results Close
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
David Elliott
Journal Articles

Deterring Strategic Cyberattack

David Elliott
IEEE Security & Privacy , 2011
Show body
Journal Articles

Weighing the Case For a Convention to Limit Cyberwarfare

David Elliott
Arms Control Today , 2009

The United States must take steps to protect its critical national infrastructure against serious cyberattack. One step might be to negotiate a multilateral convention to limit such attacks by states, which are the most likely source of an attack at the level of greatest concern.

Show body
Working Papers

Regional Interest Group on Information Security: Sharing Information and Exploring Collaborative Opportunities

Kevin J. Soo Hoo, Gregory D. Grove, Ekaterina Drozdova, Stephen J. Lukasik, David Elliott, Seymour E. Goodman
CISAC , 1998

On December 7, 1998, a cross-industry group of professionals interested in information security met to discuss perspectives on information security and prospects for multilateral cooperative activity to advance information and infrastructure security. Participants reviewed the information-security activities of their respective organizations, identified areas of mutual concern, and generated ideas for future group efforts.

Show body
Working Papers

Workshop on Protecting and Assuring Critical National Infrastructure: Next Steps

David Alderson, David Elliott, Gregory D. Grove, Timothy Holliday, Stephen J. Lukasik, Seymour E. Goodman
CISAC , 1998

The third Stanford-Livermore workshop in the series examining the protection of critical national infrastructures against cyber attack was held at Lawrence Livermore National Laboratory on February 26-27, 1998.

Show body
Working Papers

Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda

Kevin J. Soo Hoo, Kenneth B Malpass, Kevin Harrington, David Elliott, Seymour E. Goodman
CISAC , 1997

The July Workshop on Protecting and Assuring Critical National Infrastructure focused on three specific areas: international and legal issues relating to the control of network misuse and government roles for securing the infrastructure; economic factors, including market responses to the threat and to protection measures; and directions for future tools research in forensics, modeling, and simulation that will enhance understanding of system robustness, vulnerabilities, and security.

Show body
Working Papers

Workshop on Protecting and Assuring Critical National Infrastructure

Kenneth B. Malpass, Kevin J. Harrington, David Elliott, Kevin J. Soo Hoo, Seymour E. Goodman
CISAC , 1997

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend a comprehensive national policy and implementation strategy for protecting those infrastructures from physical and cyber threats, and to propose statutory or regulatory actions to effect the recommended remedies.

Show body
Working Papers

Strategic Information Warfare - A New Arena for Arms Control?

Kevin J. Soo Hoo, Lawrence Greenberg, David Elliott
CISAC , 1996

Information warfare is a relatively new rubric, which is receiving increasing attention within the United States from both the government and the general population. Recent studies and Congressional hearings have discussed the vulnerability of the U.S. civil infrastructure to information sabotage, perpetrated by both state and non-state actors. Most recently, President Clinton established the President's Commission on Critical Infrastructure Protection to identify vulnerabilities in the nation's overall infrastructure and to recommend policy actions to reduce them.

Show body