NSPW C

15 papers

YearTitle / Authors
2010A billion keys, but few locks: the crisis of web single sign-on.
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov
2010A risk management process for consumers: the next step in information security.
André van Cleeff
2010A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse
2010E unibus pluram: massive-scale software diversity as a defense mechanism.
Michael Franz
2010On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Mohammed I. Al-Saleh, Jedidiah R. Crandall
2010On-line privacy and consent: a dialogue, not a monologue.
Lizzie Coles-Kemp, Elahe Kani-Zabihi
2010Ontological semantic technology for detecting insider threat and social engineering.
Victor Raskin, Julia M. Taylor, Christian Hempelmann
2010Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010
Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates
2010Relationships and data sanitization: a study in scarlet.
Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael A. Hogarth
2010The pervasive trust foundation for security in next generation networks.
Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane
2010This is your data on drugs: lessons computer security can learn from the drug war.
David Molnar, Serge Egelman, Nicolas Christin
2010To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Shamal Faily, Ivan Flechais
2010VM-based security overkill: a lament for applied systems security research.
Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith
2010Why is there no science in cyber science?: a panel discussion at NSPW 2010.
Roy A. Maxion, Thomas A. Longstaff, John McHugh
2010Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems.
Tyler Moore, Allan Friedman, Ariel D. Procaccia