You are here

NSPW 2010 Proceedings

Mohammed I. Al-Saleh, Jedidiah R. Crandall.
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?.

Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah Agarwal, Deborah Frincke, Michael Hogarth.
Relationships and data sanitization: a study in scarlet.

Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith.
VM-based security overkill: a lament for applied systems security research.

André van Cleeff.
A risk management process for consumers: the next step in information security.

Lizzie Coles-Kemp, Elahe Kani-Zabihi.
On-line privacy and consent: a dialogue, not a monologue.

Shamal Faily, Ivan Flechais.
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.

Michael Franz.
E unibus pluram: massive-scale software diversity as a defense mechanism.

Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane.
The pervasive trust foundation for security in next generation networks.

Roy A. Maxion, Thomas A. Longstaff, John McHugh.
Why is there no science in cyber science?: a panel discussion at NSPW 2010.

David Molnar, Serge Egelman, Nicolas Christin.
This is your data on drugs: lessons computer security can learn from the drug war.

Tyler Moore, Allan Friedman, Ariel D. Procaccia.
Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems.

Simon Parkin, Aad van Moorsel, Philip Inglesant, M. Angela Sasse.
A stealth approach to usable security: helping IT security managers to identify workable security solutions.

Victor Raskin, Julia M. Taylor, Christian F. Hempelmann.
Ontological semantic technology for detecting insider threat and social engineering.

San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov.
A billion keys, but few locks: the crisis of web single sign-on.