The list of accepted papers is:
- gridWord: Leveraging An Early-Stage Prototype to Explore Questions about Science in Security Research and Usable Security Evaluation
Kemal Bicakci, TOBB University of Economics and Technology
Paul Van Oorschot, Carleton University - Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy
Gerald Friedland, ICSI
Gregor Maier, ICSI
Robin Sommer, ICSI/LBNL
Nicholas Weaver, ICSI - Applying Problem-Structuring Methods to Problems in Computer Security
Peter Gutmann, University of Auckland - Towards a Formal Model of Accountability
Joan Feigenbaum, Yale University
Aaron D. Jaggard, Colgate University and Rutgers University
Rebecca Wright, Rutgers University - Influencing Mental Models of Security: A Research Agenda
Rick Wash, Michigan State University
Emilee Rader, Northwestern University - Position Paper: Why Are There So Many Vulnerabilities in Web Applications?
Wenliang Du, Syracuse University
Karthick Jayaraman, Syracuse University
Xi Tan, Syracuse University
Tongbo Luo, Syracuse University
Steve Chapin, Syracuse University - If the enemy knows the system, then the system should learn from the enemy
Dusko Pavlovic, Royal Holoway - Security and Privacy Considerations in Digital Death
Michael Locasto, University of Calgary
Michael Massimi, University of Toronto
Peter Depasquale, The College of New Jersey - The Security Cost of Cheap User Interaction
Rainer Boehme, University of Münster / ERCIS
Jens Grossklags, Penn State University - Resilience is More than Availability
Matt Bishop, University of California at Davis
Marco Carvalho, IHMC
Richard Ford, Florida Tech
Liam Mayron, Harris Corportation - Reducing normative conflicts in information security
Wolter Pieters, EEMCS, University of Twente
Lizzie Coles-Kemp, Royal Holloway, University of London - Public Security: simulations need to replace conventional wisdom
Kay Hamacher, TU Darmstadt
Stefan Katzenbeisser, TU Darmstadt