default search action
NSPW 2008: Lake Tahoe, CA, USA
- Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji:
Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9
Session 1
- Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates:
We have met the enemy and he is us. 1-12
Session 2
- Mohammad Mannan, Paul C. van Oorschot:
Localization of credential information to address increasingly inevitable data breaches. 13-21 - Hang Zhao, Chi-Kin Chau, Steven M. Bellovin:
ROFL: routing as the firewall layer. 23-31
Session 3
- Jeff Shirley, David Evans:
The user is not the enemy: fighting malware by tracking user intentions. 33-45 - Adam Beautement, Martina Angela Sasse, Mike Wonham:
The compliance budget: managing security behaviour in organisations. 47-58
Session 4
- Cormac Herley, Dinei A. F. Florêncio:
A profitless endeavor: phishing as tragedy of the commons. 59-70 - Klaus Julisch:
Security compliance: the next frontier in security research. 71-74
Panel discussion
- Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme:
Towards an ethical code for information security? 75-87
Session 6
- Glenn Wurster, Paul C. van Oorschot:
The developer is the enemy. 89-97 - Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro:
The ecology of Malware. 99-106
Session 7
- Ian M. Molloy, Pau-Chen Cheng, Pankaj Rohatgi:
Trading in risk: using markets to improve access control. 107-125 - Ben Laurie, Abe Singer:
Choose the red pill and the blue pill: a position paper. 127-133
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.