|  | 
				
					| 
							Accepted Papers
						 |  
					| 
Title: Trading in Risk: Using Markets to Improve Access ControlAuthors: Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Title: Security Compliance: The Next Frontier in Security ResearchAuthors: Klaus Julisch
Title: The Ecology of MalwareAuthors: Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladua, Bilal Shebaro
Title: The User is Not the Enemy: Fighting Malware by Tracking User IntentionsAuthors: Jeffrey Shirley, David Evans
Title: Panel: Towards Information Security EthicsAuthors: Steven Greenwald, Brian Snow, Richard Ford, Richard Thieme
Title: Large-Scale Data Breaches: A Consequence of OccupationAuthors: Mohammad Mannan, Paul Van Oorschot
Title: Phishing as a Tragedy of the CommonsAuthors: Cormac Herley, Dinei Florencio
Title: We Have Met the Enemy and He Is UsAuthors: Matt Bishop, Sophie Engle, Carrie Gates, Sean Peisert, Sean Whalen
Title: The Compliance Budget: Managing Security Behaviour in OrganisationsAuthors: Angela Sasse, Mike Wonham
Title: ROFL: Routing as the Firewall LayerAuthors: Hang Zhao, Chi-Kin Chau, Steven M. Bellovin
Title: Choose the Red Pill and the Blue PillAuthors: Ben Laurie, Abe Singer
Title: Position: The Developer is the EnemyAuthors: Glenn Wurster, Paul Van Oorschot
 
					 |  |