Laissez-faire file sharing: access control designed for individuals at the endpoints (DOI)
Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter
Server-side detection of malware infection (DOI)
Markus Jakobsson, Ari Juels
What is the shape of your security policy?: security as a classification problem (DOI)
Sven Türpe
Quantified security is a weak hypothesis: a critical survey of results and assumptions (DOI)
Vilhelm Verendel
Generative usability: security and user centered design beyond the appliance (DOI)
Luke Church, Alma Whitten
The sisterhood of the traveling packets (DOI)
Matt Bishop, Carrie Gates, Jeffrey Hunker
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal (DOI)
Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald
Musipass: authenticating me softly with "my" song (DOI)
Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple
A reinforcement model for collaborative security and Its formal analysis (DOI)
Janardan Misra, Indranil Saha
Securing data through avoidance routing (DOI)
Erik Kline, Peter Reiher
Fluid information systems (DOI)
Christian W. Probst, René Rydhof Hansen
So long, and no thanks for the externalities: the rational rejection of security advice by users (DOI)
Cormac Herley