|
Accepted Papers
|
- Title: Trading in Risk: Using Markets to Improve Access Control
Authors: Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
- Title: Security Compliance: The Next Frontier in Security Research
Authors: Klaus Julisch
- Title: The Ecology of Malware
Authors: Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladua, Bilal Shebaro
- Title: The User is Not the Enemy: Fighting Malware by Tracking User Intentions
Authors: Jeffrey Shirley, David Evans
- Title: Panel: Towards Information Security Ethics
Authors: Steven Greenwald, Brian Snow, Richard Ford, Richard Thieme
- Title: Large-Scale Data Breaches: A Consequence of Occupation
Authors: Mohammad Mannan, Paul Van Oorschot
- Title: Phishing as a Tragedy of the Commons
Authors: Cormac Herley, Dinei Florencio
- Title: We Have Met the Enemy and He Is Us
Authors: Matt Bishop, Sophie Engle, Carrie Gates, Sean Peisert, Sean Whalen
- Title: The Compliance Budget: Managing Security Behaviour in Organisations
Authors: Angela Sasse, Mike Wonham
- Title: ROFL: Routing as the Firewall Layer
Authors: Hang Zhao, Chi-Kin Chau, Steven M. Bellovin
- Title: Choose the Red Pill and the Blue Pill
Authors: Ben Laurie, Abe Singer
- Title: Position: The Developer is the Enemy
Authors: Glenn Wurster, Paul Van Oorschot
|
|