ABSTRACT

The academic community regularly provides novel and cle-

ver techniques that can be used to secure information flows.

Security practitioners, system managers, and product devel-

opers are encouraged to review regularly peer-reviewed

literature, such as journals and academic-focusedmagazines,

to learn about emerging techniques that might be useful.