Title
|
Author(s)
|
|
A Collaborative Approach to Autonomic Security Protocols
|
Hongbin Zhou and Simon Foley
|
|
A Qualitative Framework for Shannon Communication Theories
|
Gerard Allwein
|
|
Support for Multi-Level Security Policies in DRM Architectures
|
Bogdan Popescu, Bruno Crispo, and Andrew Tanenbaum
|
|
Omnivore: Risk Management through Bidirectional Transparency
|
Scott Flinn and Steve Stoyles
|
|
Information Exposure Control through Data Manipulation for Ubiquitous Computing
|
Boris Dragovic and Jon Crowcroft
|
|
Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms
|
Ahmad-Reza Sadeghi and Christian Stueble
|
|
Profiling the Defenders
|
Carrie Gates and Tara Whalen
|
|
Symmetric Behavior-Based Trust: A New Paradigm for Internet Computing
|
Vivek Haldar and Michael Franz
|
|
Testing the Effectiveness of Cyber Defense Technologies (discussion)
|
James Just, Karl Levitt, George Kesidis, Jeff Rowe, Felix Wu, and Phil Porras
|
|
The Role of Suspicion in Model-based Intrusion Detection
|
Timothy Hollebeek and Rand Waltzman
|
|
Towards Agile Security Assurance
|
Konstantin Beznosov and Philippe Kruchten
|
|
The user non-acceptance paradigm
|
(panel discussion)
|