| 2009 | A reinforcement model for collaborative security and Its formal analysis. Janardan Misra, Indranil Saha |
| 2009 | Fluid information systems. Christian W. Probst, René Rydhof Hansen |
| 2009 | Generative usability: security and user centered design beyond the appliance. Luke Church, Alma Whitten |
| 2009 | Laissez-faire file sharing: access control designed for individuals at the endpoints. Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter |
| 2009 | Musipass: authenticating me softly with "my" song. Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple |
| 2009 | Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009 Anil Somayaji, Richard Ford |
| 2009 | Quantified security is a weak hypothesis: a critical survey of results and assumptions. Vilhelm Verendel |
| 2009 | Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal. Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald |
| 2009 | Securing data through avoidance routing. Erik Kline, Peter L. Reiher |
| 2009 | Server-side detection of malware infection. Markus Jakobsson, Ari Juels |
| 2009 | So long, and no thanks for the externalities: the rational rejection of security advice by users. Cormac Herley |
| 2009 | The sisterhood of the traveling packets. Matt Bishop, Carrie Gates, Jeffrey Hunker |
| 2009 | What is the shape of your security policy?: security as a classification problem. Sven Türpe |