NSPW 2012, September 18-21, 2012, Bertinoro, Italy


Main Page

Table of Contents

Author Index

Sponsor & Supporters

Author Index


Applebaum, Andrew

Argumentation Logic to Assist in Security Administration (Page 43)


Bishop, Matt

Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems (Page 15)


(Return to Top)

Burden, Robert

Video-Passwords: Advertising While Authenticating (Page 127)


Camp, L. Jean

Pools, Clubs and Security: Designing for a Party Not a Person (Page 77)


Crandall, Jedidiah R.

Holographic Vulnerability Studies: Vulnerabilities as Fractures in Interpretation as Information Flows Across Abstraction Boundaries (Page 141)


Dong, Zheng

Pools, Clubs and Security: Designing for a Party Not a Person (Page 77)


Edwards, Benjamin

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions (Page 53)


(Return to Top)

Ford, Richard

All Your Base are Belong to US (Page 105)

General Chairs' Welcome


Forrest, Stephanie

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions (Page 53)


Garg, Vaibhav

Pools, Clubs and Security: Designing for a Party Not a Person (Page 77)


Garrison, III, William C.

The Need for Application-Aware Access Control Evaluation (Page 115)


Herley, Cormac

Program Committee Chairs' Letter


Hinrichs, Timothy L.

The Need for Application-Aware Access Control Evaluation (Page 115)


Hofmeyr, Steven

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions (Page 53)


(Return to Top)

Jalal, Sharmin

Argumentation Logic to Assist in Security Administration (Page 43)


Kapadia, Apu

Pools, Clubs and Security: Designing for a Party Not a Person (Page 77)


Lee, Adam J.

The Need for Application-Aware Access Control Evaluation (Page 115)


Levitt, Karl

Argumentation Logic to Assist in Security Administration (Page 43)


Lipford, Heather Richter

Someone to Watch Over Me (Page 67)


Mayron, Liam M.

All Your Base are Belong to US (Page 105)


Moore, Tyler

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions (Page 53)


Morton, Anthony

Privacy Is a Process, not a PET: A Theory for Effective Privacy Practice (Page 87)


Oliveira, Daniela

Holographic Vulnerability Studies: Vulnerabilities as Fractures in Interpretation as Information Flows Across Abstraction Boundaries (Page 141)


(Return to Top)

Parsons, Simon

Argumentation Logic to Assist in Security Administration (Page 43)


Peisert, Sean

Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems (Page 15)


Pieters, Wolter

A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability (Page 1)


Probst, Christian W.

A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability (Page 1)


Rowe, Jeff

Argumentation Logic to Assist in Security Administration (Page 43)


Salehi-Abari, Amirali

Video-Passwords: Advertising While Authenticating (Page 127)


Sasse, M. Angela

Privacy Is a Process, not a PET: A Theory for Effective Privacy Practice (Page 87)


Sklar, Elizabeth

Argumentation Logic to Assist in Security Administration (Page 43)


(Return to Top)

Stelle, George

Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions (Page 53)


Talbot, Ed

Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems (Page 15)


Thorpe, Julie

Video-Passwords: Advertising While Authenticating (Page 127)


Türpe, Sven

Point-and-Shoot Security Design: Can We Build Better Tools for Developers? (Page 27)


van der Ven, Sanne H. G.

A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability (Page 1)


Whalen, Tara

Program Committee Chairs' Letter


Zurko, Mary Ellen

General Chairs' Welcome

Someone to Watch Over Me (Page 67)