ABSTRACT
The academic community regularly provides novel and cle-
ver techniques that can be used to secure information flows.
Security practitioners, system managers, and product devel-
opers are encouraged to review regularly peer-reviewed
literature, such as journals and academic-focusedmagazines,
to learn about emerging techniques that might be useful.