default search action
NSPW 2010: Concord, MA, USA
- Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates:
Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3
Panel
- Roy A. Maxion, Thomas A. Longstaff, John McHugh:
Why is there no science in cyber science?: a panel discussion at NSPW 2010. 1-6
Session 1
- Michael Franz:
E unibus pluram: massive-scale software diversity as a defense mechanism. 7-16 - Mohammed I. Al-Saleh, Jedidiah R. Crandall:
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible? 17-32
Session 2
- Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse:
A stealth approach to usable security: helping IT security managers to identify workable security solutions. 33-50 - Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
VM-based security overkill: a lament for applied systems security research. 51-60
Session 3
- San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov:
A billion keys, but few locks: the crisis of web single sign-on. 61-72 - Shamal Faily, Ivan Flechais:
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. 73-84
Session 4
- Tyler Moore, Allan Friedman, Ariel D. Procaccia:
Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems. 85-94 - Lizzie Coles-Kemp, Elahe Kani-Zabihi:
On-line privacy and consent: a dialogue, not a monologue. 95-106 - André van Cleeff:
A risk management process for consumers: the next step in information security. 107-114
Session 5
- Victor Raskin, Julia M. Taylor, Christian Hempelmann:
Ontological semantic technology for detecting insider threat and social engineering. 115-128 - Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane:
The pervasive trust foundation for security in next generation networks. 129-142
Session 6
- David Molnar, Serge Egelman, Nicolas Christin:
This is your data on drugs: lessons computer security can learn from the drug war. 143-149 - Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael A. Hogarth:
Relationships and data sanitization: a study in scarlet. 151-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.