NSPW Rabbit

New Security Paradigms Workshop 2008

September 22-25, 2008

Plumpjack Squaw Valley Inn
Lake Tahoe, California, USA

Accepted Papers

  • Title: Trading in Risk: Using Markets to Improve Access Control
    Authors: Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
  • Title: Security Compliance: The Next Frontier in Security Research
    Authors: Klaus Julisch
  • Title: The Ecology of Malware
    Authors: Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladua, Bilal Shebaro
  • Title: The User is Not the Enemy: Fighting Malware by Tracking User Intentions
    Authors: Jeffrey Shirley, David Evans
  • Title: Panel: Towards Information Security Ethics
    Authors: Steven Greenwald, Brian Snow, Richard Ford, Richard Thieme
  • Title: Large-Scale Data Breaches: A Consequence of Occupation
    Authors: Mohammad Mannan, Paul Van Oorschot
  • Title: Phishing as a Tragedy of the Commons
    Authors: Cormac Herley, Dinei Florencio
  • Title: We Have Met the Enemy and He Is Us
    Authors: Matt Bishop, Sophie Engle, Carrie Gates, Sean Peisert, Sean Whalen
  • Title: The Compliance Budget: Managing Security Behaviour in Organisations
    Authors: Angela Sasse, Mike Wonham
  • Title: ROFL: Routing as the Firewall Layer
    Authors: Hang Zhao, Chi-Kin Chau, Steven M. Bellovin
  • Title: Choose the Red Pill and the Blue Pill
    Authors: Ben Laurie, Abe Singer
  • Title: Position: The Developer is the Enemy
    Authors: Glenn Wurster, Paul Van Oorschot

An 
ACSA
Conference
Web Site Courtesy of

SDSC
the San Diego Supercomputer Center


Sponsored by

Online Information Security Masters Program, James Madison University


Sponsored by

CA Labs

 

Sponsored by

Zakon Group