NSPW 2008 Proceedings

Front Matter

We have met the enemy and he is us (DOI)
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates

Localization of credential information to address increasingly inevitable data breaches (DOI)
Mohammad Mannan, P. C. van Oorschot

ROFL: routing as the firewall layer (DOI)
Hang Zhao, Chi-Kin Chau, Steven M. Bellovin

The user is not the enemy: fighting malware by tracking user intentions (DOI)
Jeffrey Shirley, David Evans

The compliance budget: managing security behaviour in organisations (DOI)
Adam Beautement, M. Angela Sasse, Mike Wonham

A profitless endeavor: phishing as tragedy of the commons (DOI)
Cormac Herley, Dinei FlorĂȘncio

Security compliance: the next frontier in security research (DOI)
Klaus Julisch

Towards an ethical code for information security? (DOI)
Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme

The developer is the enemy (DOI)
Glenn Wurster, P. C. van Oorschot

The ecology of Malware (DOI)
Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro

Trading in risk: using markets to improve access control (DOI)
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi

Choose the red pill and the blue pill: a position paper (DOI)
Ben Laurie, Abe Singer