NSPW C

13 papers

YearTitle / Authors
2009A reinforcement model for collaborative security and Its formal analysis.
Janardan Misra, Indranil Saha
2009Fluid information systems.
Christian W. Probst, René Rydhof Hansen
2009Generative usability: security and user centered design beyond the appliance.
Luke Church, Alma Whitten
2009Laissez-faire file sharing: access control designed for individuals at the endpoints.
Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter
2009Musipass: authenticating me softly with "my" song.
Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple
2009Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009
Anil Somayaji, Richard Ford
2009Quantified security is a weak hypothesis: a critical survey of results and assumptions.
Vilhelm Verendel
2009Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal.
Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald
2009Securing data through avoidance routing.
Erik Kline, Peter L. Reiher
2009Server-side detection of malware infection.
Markus Jakobsson, Ari Juels
2009So long, and no thanks for the externalities: the rational rejection of security advice by users.
Cormac Herley
2009The sisterhood of the traveling packets.
Matt Bishop, Carrie Gates, Jeffrey Hunker
2009What is the shape of your security policy?: security as a classification problem.
Sven Türpe