Search dblp for Publications

export results for "stream:streams/conf/nspw:"

 download as .bib file

@inproceedings{DBLP:conf/nspw/AltHD23,
  author       = {Florian Alt and
                  Mariam Hassib and
                  Verena Distler},
  title        = {Human-centered Behavioral and Physiological Security},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {48--61},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633504},
  doi          = {10.1145/3633500.3633504},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AltHD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Bradley023,
  author       = {Conner Bradley and
                  David Barrera},
  title        = {Escaping Vendor Mortality: {A} New Paradigm for Extending IoT Device
                  Longevity},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633501},
  doi          = {10.1145/3633500.3633501},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Bradley023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChowdhuryR23,
  author       = {Partha Das Chowdhury and
                  Karen Renaud},
  title        = {'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity
                  to Ground Sen's Capability Approach},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {76--91},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633506},
  doi          = {10.1145/3633500.3633506},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChowdhuryR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FlechaisC23,
  author       = {Ivan Flechais and
                  George Chalhoub},
  title        = {Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {62--75},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633505},
  doi          = {10.1145/3633500.3633505},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FlechaisC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KockschS23,
  author       = {Laura Anna Kocksch and
                  Estrid S{\o}rensen},
  title        = {Towards a Typology of Interdisciplinarity in Cybersecurity: Trade,
                  Choice, and Agnostic-Antagonist},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {116--129},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633510},
  doi          = {10.1145/3633500.3633510},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/KockschS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RamokapaneR23,
  author       = {Kopo Marvin Ramokapane and
                  Awais Rashid},
  title        = {ExD: Explainable Deletion},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {34--47},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633503},
  doi          = {10.1145/3633500.3633503},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RamokapaneR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SharevskiZ23,
  author       = {Filipo Sharevski and
                  Aziz N. Zeidieh},
  title        = {"I Just Didn't Notice It: " Experiences with Misinformation Warnings
                  on Social Media amongst Users Who Are Low Vision or Blind},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {17--33},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633502},
  doi          = {10.1145/3633500.3633502},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SharevskiZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SimHKR23,
  author       = {Mattea Sim and
                  Kurt Hugenberg and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {A Scalable Inclusive Security Intervention to Center Marginalized
                  {\&} Vulnerable Populations in Security {\&} Privacy Design},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {102--115},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633508},
  doi          = {10.1145/3633500.3633508},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SimHKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/YangHKVD23,
  author       = {Fangfei Yang and
                  Weijie Huang and
                  Kelly Kaoudis and
                  Anjo Vahldiek{-}Oberwagner and
                  Nathan Dautenhahn},
  title        = {Endoprocess: Programmable and Extensible Subprocess Isolation},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {92--101},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633507},
  doi          = {10.1145/3633500.3633507},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/YangHKVD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2023,
  title        = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500},
  doi          = {10.1145/3633500},
  timestamp    = {Wed, 27 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BuckleyCB22,
  author       = {Gerard Buckley and
                  Tristan Caulfield and
                  Ingolf Becker},
  title        = {"It may be a pain in the backside but..." Insights into the resilience
                  of business after {GDPR}},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {21--34},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584320},
  doi          = {10.1145/3584318.3584320},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BuckleyCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChowdhuryHRR22,
  author       = {Partha Das Chowdhury and
                  Andr{\'{e}}s Dom{\'{\i}}nguez Hern{\'{a}}ndez and
                  Kopo Marvin Ramokapane and
                  Awais Rashid},
  title        = {From Utility to Capability: {A} New Paradigm to Conceptualize and
                  Develop Inclusive PETs},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {60--74},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584323},
  doi          = {10.1145/3584318.3584323},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ChowdhuryHRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ClarkS22,
  author       = {Michael Clark and
                  Kent E. Seamons},
  title        = {Passwords and Cryptwords: The Final Limits on Lengths},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {75--89},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584324},
  doi          = {10.1145/3584318.3584324},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ClarkS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CliffordHLB22,
  author       = {Michael Clifford and
                  Miriam Heller and
                  Karl N. Levitt and
                  Matt Bishop},
  title        = {Autonomous Vehicle Security: Composing Attack, Defense, and Policy
                  Surfaces},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {90--103},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584325},
  doi          = {10.1145/3584318.3584325},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/CliffordHLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hicks22,
  author       = {Alexander Hicks},
  title        = {Transparency, Compliance, And Contestability When Code Is(n't) Law},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {130--142},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584854},
  doi          = {10.1145/3584318.3584854},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Hicks22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LongF22,
  author       = {Yan Long and
                  Kevin Fu},
  title        = {Side Auth: Synthesizing Virtual Sensors for Authentication},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584321},
  doi          = {10.1145/3584318.3584321},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LongF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MalchikF22,
  author       = {Caleb Malchik and
                  Joan Feigenbaum},
  title        = {Toward User Control over Information Access: {A} Sociotechnical Approach},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {117--129},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584327},
  doi          = {10.1145/3584318.3584327},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MalchikF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Malkin22,
  author       = {Nathan Malkin},
  title        = {Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication
                  Ceremony for End-to-End Encrypted Messaging},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {104--116},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584326},
  doi          = {10.1145/3584318.3584326},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Malkin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RenaudSD22,
  author       = {Karen Renaud and
                  Rosalind Searle and
                  Marc J. Dupuis},
  title        = {Cybersecurity Regrets: I've had a few.... Je Ne Regrette},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {1--20},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584319},
  doi          = {10.1145/3584318.3584319},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/RenaudSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlesingerCPH22,
  author       = {Ian Slesinger and
                  Lizzie Coles{-}Kemp and
                  Niki Panteli and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Designing Through The Stack: The Case for a Participatory Digital
                  Security By Design},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {45--59},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584322},
  doi          = {10.1145/3584318.3584322},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2022,
  title        = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318},
  doi          = {10.1145/3584318},
  isbn         = {978-1-4503-9866-4},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AranovichWYKABF21,
  author       = {Ra{\'{u}}l Aranovich and
                  Muting Wu and
                  Dian Yu and
                  Katya Katsy and
                  Benyamin Ahmadnia and
                  Matthew Bishop and
                  Vladimir Filkov and
                  Kenji Sagae},
  title        = {Beyond {NVD:} Cybersecurity meets the Semantic Web},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {59--69},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3501259},
  doi          = {10.1145/3498891.3501259},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/AranovichWYKABF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GallagherTMF21,
  author       = {Kevin Gallagher and
                  Santiago Torres{-}Arias and
                  Nasir D. Memon and
                  Jessica Feldman},
  title        = {{COLBAC:} Shifting Cybersecurity from Hierarchical to Horizontal Designs},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {13--27},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3498903},
  doi          = {10.1145/3498891.3498903},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GallagherTMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HielscherKMS21,
  author       = {Jonas Hielscher and
                  Annette Kluge and
                  Uta Menges and
                  M. Angela Sasse},
  title        = {"Taking out the Trash": Why Security Behavior Change requires Intentional
                  Forgetting},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {108--122},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3498902},
  doi          = {10.1145/3498891.3498902},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HielscherKMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LavrenovsLK21,
  author       = {Arturs Lavrenovs and
                  {\'{E}}ireann Leverett and
                  Aaron Kaplan},
  title        = {The tragedy of common bandwidth: rDDoS},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {43--58},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3500928},
  doi          = {10.1145/3498891.3500928},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LavrenovsLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ParkinAW21,
  author       = {Simon Parkin and
                  Simon Arnell and
                  Jeremy Ward},
  title        = {Change that Respects Business Expertise: Stories as Prompts for a
                  Conversation about Organisation Security},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {28--42},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3498895},
  doi          = {10.1145/3498891.3498895},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ParkinAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RenaudSD21,
  author       = {Karen Renaud and
                  Rosalind Searle and
                  Marc J. Dupuis},
  title        = {Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive
                  Foil?},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {70--87},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3498896},
  doi          = {10.1145/3498891.3498896},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/RenaudSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SharevskiJPJ21,
  author       = {Filipo Sharevski and
                  Peter Jachim and
                  Emma Pieroni and
                  Nate Jachim},
  title        = {VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information
                  Discourse},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {88--107},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3498893},
  doi          = {10.1145/3498891.3498893},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SharevskiJPJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WoodsC21,
  author       = {Daniel W. Woods and
                  Aaron Ceross},
  title        = {Blessed Are The Lawyers, For They Shall Inherit Cybersecurity},
  booktitle    = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891.3501257},
  doi          = {10.1145/3498891.3501257},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WoodsC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2021,
  title        = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October
                  25 - 28, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3498891},
  doi          = {10.1145/3498891},
  isbn         = {978-1-4503-8573-2},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/000120,
  author       = {Susan Landau},
  title        = {Categorizing Uses of Communications Metadata: Systematizing Knowledge
                  and Presenting a Path for Privacy},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {1--19},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442171},
  doi          = {10.1145/3442167.3442171},
  timestamp    = {Fri, 05 Feb 2021 14:28:57 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/000120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AshendenO20,
  author       = {Debi Ashenden and
                  Gail Ollis},
  title        = {Putting the Sec in DevSecOps: Using Social Practice Theory to Improve
                  Secure Software Development},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {34--44},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442178},
  doi          = {10.1145/3442167.3442178},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AshendenO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Brookes20,
  author       = {Scott Brookes},
  title        = {Transcending the Teetering Tower of Trust: Demonstrated with Virtual
                  Memory Fuses for Software Enclaves},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {90--98},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442168},
  doi          = {10.1145/3442167.3442168},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Brookes20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DabbourS20,
  author       = {Nour Dabbour and
                  Anil Somayaji},
  title        = {Towards In-Band Non-Cryptographic Authentication},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {20--33},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442180},
  doi          = {10.1145/3442167.3442180},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DabbourS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DistlerLLK20,
  author       = {Verena Distler and
                  Gabriele Lenzini and
                  Carine Lallemand and
                  Vincent Koenig},
  title        = {The Framework of Security-Enhancing Friction: How {UX} Can Help Users
                  Behave More Securely},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {45--58},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442173},
  doi          = {10.1145/3442167.3442173},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/DistlerLLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JachimST20,
  author       = {Peter Jachim and
                  Filipo Sharevski and
                  Paige Treebridge},
  title        = {TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls
                  During the {COVID-19} Pandemic},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {59--75},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442169},
  doi          = {10.1145/3442167.3442169},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/JachimST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JoqueH20,
  author       = {Justin Joque and
                  S. M. Taiabul Haque},
  title        = {Deconstructing Cybersecurity: From Ontological Security to Ontological
                  Insecurity},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442170},
  doi          = {10.1145/3442167.3442170},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JoqueH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SingerB20,
  author       = {Abe Singer and
                  Matt Bishop},
  title        = {Trust-Based Security; Or, Trust Considered Harmful},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {76--89},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442179},
  doi          = {10.1145/3442167.3442179},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SingerB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SperoB20,
  author       = {Eric Spero and
                  Robert Biddle},
  title        = {Out of Sight, Out of Mind: {UI} Design and the Inhibition of Mental
                  Models of Security},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {127--143},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442174},
  doi          = {10.1145/3442167.3442174},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SperoB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SpringGHV20,
  author       = {Jonathan M. Spring and
                  April Galyardt and
                  Allen D. Householder and
                  Nathan M. VanHoudnos},
  title        = {On managing vulnerabilities in {AI/ML} systems},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {111--126},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442177},
  doi          = {10.1145/3442167.3442177},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SpringGHV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2020,
  title        = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167},
  doi          = {10.1145/3442167},
  isbn         = {978-1-4503-8995-2},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AddasTS19,
  author       = {Alaadin Addas and
                  Julie Thorpe and
                  Amirali Salehi{-}Abari},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Towards models for quantifying the known adversary},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {103--117},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368869},
  doi          = {10.1145/3368860.3368869},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/AddasTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Ahmed-Rengers19,
  author       = {Mansoor Ahmed{-}Rengers},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {FrameProv: towards end-to-end video provenance},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368866},
  doi          = {10.1145/3368860.3368866},
  timestamp    = {Wed, 22 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Ahmed-Rengers19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CapobiancoGHJKQ19,
  author       = {Frank Capobianco and
                  Rahul George and
                  Kaiming Huang and
                  Trent Jaeger and
                  Srikanth V. Krishnamurthy and
                  Zhiyun Qian and
                  Mathias Payer and
                  Paul L. Yu},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Employing attack graphs for intrusion detection},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {16--30},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368862},
  doi          = {10.1145/3368860.3368862},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CapobiancoGHJKQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CaulfieldSS19,
  author       = {Tristan Caulfield and
                  Jonathan M. Spring and
                  M. Angela Sasse},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Why Jenny can't figure out which of these messages is a covert information
                  operation},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {118--128},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368870},
  doi          = {10.1145/3368860.3368870},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/CaulfieldSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MalkinEW19,
  author       = {Nathan Malkin and
                  Serge Egelman and
                  David A. Wagner},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Privacy controls for always-listening devices},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {78--91},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368867},
  doi          = {10.1145/3368860.3368867},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MalkinEW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ParkinPLT19,
  author       = {Simon Parkin and
                  Trupti Patel and
                  Isabel Lopez{-}Neira and
                  Leonie Maria Tanczer},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Usability analysis of shared device ecosystem security: informing
                  support for survivors of IoT-facilitated tech-abuse},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368861},
  doi          = {10.1145/3368860.3368861},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ParkinPLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Pieters19,
  author       = {Wolter Pieters},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Everything-as-a-hack: claims-making for access to digital and social
                  resources},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {92--102},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368868},
  doi          = {10.1145/3368860.3368868},
  timestamp    = {Wed, 22 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Pieters19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RenaudD19,
  author       = {Karen Renaud and
                  Marc J. Dupuis},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Cyber security fear appeals: unexpectedly complicated},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {42--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368864},
  doi          = {10.1145/3368860.3368864},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/RenaudD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SharevskiTW19,
  author       = {Filipo Sharevski and
                  Paige Treebridge and
                  Jessica Westbrook},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Manipulation of perceived politeness in a web-based email discourse
                  through a malicious browser extension},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {31--41},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368863},
  doi          = {10.1145/3368860.3368863},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SharevskiTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WestinC19,
  author       = {Fiona Westin and
                  Sonia Chiasson},
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {Opt out of privacy or "go home": understanding reluctant privacy behaviours
                  through the FoMO-centric design paradigm},
  booktitle    = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  pages        = {57--67},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860.3368865},
  doi          = {10.1145/3368860.3368865},
  timestamp    = {Wed, 22 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WestinC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2019,
  editor       = {Marco Carvalho and
                  Wolter Pieters and
                  Elizabeth Stobert},
  title        = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica,
                  September 23-26, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368860},
  doi          = {10.1145/3368860},
  isbn         = {978-1-4503-7647-1},
  timestamp    = {Wed, 22 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AnantharamanBFK18,
  author       = {Prashant Anantharaman and
                  J. Peter Brady and
                  Patrick Flathers and
                  Vijay H. Kothari and
                  Michael C. Millian and
                  Jason Reeves and
                  Nathan Reitinger and
                  William G. Nisen and
                  Sean W. Smith},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Going Dark: {A} Retrospective on the North American Blackout of 2038},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {52--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285011},
  doi          = {10.1145/3285002.3285011},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/AnantharamanBFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopGL18,
  author       = {Matt Bishop and
                  Carrie Gates and
                  Karl N. Levitt},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Augmenting Machine Learning with Argumentation},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285005},
  doi          = {10.1145/3285002.3285005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BurgessS18,
  author       = {Mark Burgess and
                  Anil Somayaji},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {After the BlockCLoud Apocalypse},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {103--109},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285012},
  doi          = {10.1145/3285002.3285012},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BurgessS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CerossS18,
  author       = {Aaron Ceross and
                  Andrew Simpson},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Rethinking the Proposition of Privacy Engineering},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {89--102},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285006},
  doi          = {10.1145/3285002.3285006},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/CerossS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DierkerR18,
  author       = {Steve Dierker and
                  Volker Roth},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Can Software Licenses Contribute to Cyberarms Control?},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {41--51},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285009},
  doi          = {10.1145/3285002.3285009},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/DierkerR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KarRGP18,
  author       = {Diptendu Mohan Kar and
                  Indrajit Ray and
                  Jenna Gallegos and
                  Jean Peccoud},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Digital Signatures to Ensure the Authenticity and Integrity of Synthetic
                  {DNA} Molecules},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {110--122},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285007},
  doi          = {10.1145/3285002.3285007},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/KarRGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Padmos18,
  author       = {Arne Padmos},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Against Mindset},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {12--27},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285004},
  doi          = {10.1145/3285002.3285004},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Padmos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Pieters18,
  author       = {Wolter Pieters},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {On Security Singularities},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {80--88},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285008},
  doi          = {10.1145/3285002.3285008},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Pieters18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RooneyF18,
  author       = {Vivien M. Rooney and
                  Simon N. Foley},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {An Online Consent Maturity Model: Moving from Acceptable Use Towards
                  Ethical Practice},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {64--79},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285003},
  doi          = {10.1145/3285002.3285003},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/RooneyF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/TrowbridgeSW18,
  author       = {Adam Trowbridge and
                  Filipo Sharevski and
                  Jessica Westbrook},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Malicious User Experience Design Research for Cybersecurity},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {123--130},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285010},
  doi          = {10.1145/3285002.3285010},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/TrowbridgeSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/VescentB18,
  author       = {Heather Vescent and
                  Bob Blakley},
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Shifting Paradigms: Using Strategic Foresight to Plan for Security
                  Evolution},
  booktitle    = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  pages        = {28--40},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002.3285013},
  doi          = {10.1145/3285002.3285013},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/VescentB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2018,
  editor       = {Marco Carvalho and
                  Matt Bishop and
                  Anil Somayaji and
                  Wolter Pieters and
                  Mohammad Mannan},
  title        = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor,
                  UK, August 28-31, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285002},
  doi          = {10.1145/3285002},
  isbn         = {978-1-4503-6597-0},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BissiasLK17,
  author       = {George Bissias and
                  Brian Neil Levine and
                  Nikunj Kapadia},
  title        = {Market-based Security for Distributed Applications},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {19--34},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171541},
  doi          = {10.1145/3171533.3171541},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BissiasLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GananCE17,
  author       = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Michael Ciere and
                  Michel van Eeten},
  title        = {Beyond the pretty penny: the Economic Impact of Cybercrime},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171535},
  doi          = {10.1145/3171533.3171535},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/GananCE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MerrillCC17,
  author       = {Nick Merrill and
                  Max T. Curran and
                  John Chuang},
  title        = {Is the Future of Authenticity All In Our Heads?: Moving Passthoughts
                  From the Lab to the World},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {70--79},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171537},
  doi          = {10.1145/3171533.3171537},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MerrillCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Obada-ObiehS17,
  author       = {Borke Obada{-}Obieh and
                  Anil Somayaji},
  title        = {Can {I} believe you?: Establishing Trust in Computer Mediated Introductions},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {94--106},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171544},
  doi          = {10.1145/3171533.3171544},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Obada-ObiehS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertBT17,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Edward B. Talbot},
  title        = {A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability
                  Information Sharing},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171536},
  doi          = {10.1145/3171533.3171536},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PieczulFZ17,
  author       = {Olgierd Pieczul and
                  Simon N. Foley and
                  Mary Ellen Zurko},
  title        = {Developer-centered security and the symmetry of ignorance},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {46--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171539},
  doi          = {10.1145/3171533.3171539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PieczulFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RenaudW17,
  author       = {Karen Renaud and
                  Merrill Warkentin},
  title        = {Risk Homeostasis in Information Security: Challenges in Confirming
                  Existence and Verifying Impact},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {57--69},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171534},
  doi          = {10.1145/3171533.3171534},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RenaudW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RuotiS17,
  author       = {Scott Ruoti and
                  Kent E. Seamons},
  title        = {End-to-End Passwords},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {107--121},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171542},
  doi          = {10.1145/3171533.3171542},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/RuotiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SpringMP17,
  author       = {Jonathan M. Spring and
                  Tyler Moore and
                  David J. Pym},
  title        = {Practicing a Science of Security: {A} Philosophy of Science Perspective},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {1--18},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171540},
  doi          = {10.1145/3171533.3171540},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SpringMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Wang17,
  author       = {Yang Wang},
  title        = {The Third Wave?: Inclusive Privacy and Security},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {122--130},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171538},
  doi          = {10.1145/3171533.3171538},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Wang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WeberSSZ17,
  author       = {Sam Weber and
                  Adam Shostack and
                  Jon A. Solworth and
                  Mary Ellen Zurko},
  title        = {Panel: Empirically-based Secure {OS} Design},
  booktitle    = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  pages        = {90--93},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533.3171543},
  doi          = {10.1145/3171533.3171543},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WeberSSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2017,
  title        = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
                  Santa Cruz, CA, USA, October 01-04, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171533},
  doi          = {10.1145/3171533},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AfanasyevHRSYZ016,
  author       = {Alexander Afanasyev and
                  J. Alex Halderman and
                  Scott Ruoti and
                  Kent E. Seamons and
                  Yingdi Yu and
                  Daniel Zappala and
                  Lixia Zhang},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Content-based security for the web},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011890},
  doi          = {10.1145/3011883.3011890},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/AfanasyevHRSYZ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BalisaneM16,
  author       = {Ranjbar A. Balisane and
                  Andrew C. Martin},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Trusted execution environment-based authentication gauge \emph{(TEEBAG)}},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {61--67},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011892},
  doi          = {10.1145/3011883.3011892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BalisaneM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BrookesT16,
  author       = {Scott Brookes and
                  Stephen Taylor},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Rethinking operating system design: asymmetric multiprocessing for
                  security and performance},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {68--79},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011886},
  doi          = {10.1145/3011883.3011886},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BrookesT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChenBWEMCWFO16,
  author       = {Aokun Chen and
                  Pratik Prabhanjan Brahma and
                  Dapeng Oliver Wu and
                  Natalie C. Ebner and
                  Brandon Matthews and
                  Jedidiah R. Crandall and
                  Xuetao Wei and
                  Michalis Faloutsos and
                  Daniela Oliveira},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Cross-layer personalization as a first-class citizen for situation
                  awareness and computer infrastructure security},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {23--35},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011888},
  doi          = {10.1145/3011883.3011888},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ChenBWEMCWFO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FichtnerPT16,
  author       = {Laura Fichtner and
                  Wolter Pieters and
                  Andr{\'{e}} Teixeira},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Cybersecurity as a \emph{Politikum}: implications of security discourses
                  for infrastructures},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {36--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011887},
  doi          = {10.1145/3011883.3011887},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/FichtnerPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FioravantiBF16,
  author       = {Mark E. Fioravanti II and
                  Matt Bishop and
                  Richard Ford},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {I'm not sure if we're okay: uncertainty for attackers and defenders},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011889},
  doi          = {10.1145/3011883.3011889},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/FioravantiBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HalawaBBCRS16,
  author       = {Hassan Halawa and
                  Konstantin Beznosov and
                  Yazan Boshmaf and
                  Baris Coskun and
                  Matei Ripeanu and
                  Elizeu Santos{-}Neto},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Harvesting the low-hanging fruits: defending against automated large-scale
                  cyber-intrusions by focusing on the vulnerable population},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011885},
  doi          = {10.1145/3011883.3011885},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HalawaBBCRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HeitzenraterS16,
  author       = {Chad Heitzenrater and
                  Andrew C. Simpson},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {A case for the economics of secure software development},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {92--105},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011884},
  doi          = {10.1145/3011883.3011884},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/HeitzenraterS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LundquistMH16,
  author       = {Gilmore R. Lundquist and
                  Vishwath Mohan and
                  Kevin W. Hamlen},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Searching for software diversity: attaining artificial diversity through
                  program synthesis},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {80--91},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011891},
  doi          = {10.1145/3011883.3011891},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LundquistMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2016,
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883},
  doi          = {10.1145/3011883},
  isbn         = {978-1-4503-4813-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BenensonLOPU15,
  author       = {Zinaida Benenson and
                  Gabriele Lenzini and
                  Daniela Oliveira and
                  Simon Parkin and
                  Sven Uebelacker},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity
                  Theory for Usable Security},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {85--99},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841120},
  doi          = {10.1145/2841113.2841120},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BenensonLOPU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BerisBS15,
  author       = {Odette Beris and
                  Adam Beautement and
                  M. Angela Sasse},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping
                  the risk perceptions and emotions that drive security behaviors},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841119},
  doi          = {10.1145/2841113.2841119},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BerisBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EgelmanP15,
  author       = {Serge Egelman and
                  Eyal P{\'{e}}er},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {The Myth of the Average User: Improving Privacy and Security Systems
                  through Individualization},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {16--28},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841115},
  doi          = {10.1145/2841113.2841115},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/EgelmanP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ElliottK15,
  author       = {Aaron Elliott and
                  Scott Knight},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Towards Managed Role Explosion},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {100--111},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841121},
  doi          = {10.1145/2841113.2841121},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ElliottK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ForgetCB15,
  author       = {Alain Forget and
                  Sonia Chiasson and
                  Robert Biddle},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Choose Your Own Authentication},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841114},
  doi          = {10.1145/2841113.2841114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ForgetCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HallHCT15,
  author       = {Peter Hall and
                  Claude Heath and
                  Lizzie Coles{-}Kemp and
                  Axel Tanner},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Examining the Contribution of Critical Visualisation to Information
                  Security},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {59--72},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841118},
  doi          = {10.1145/2841113.2841118},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/HallHCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HerleyP15,
  author       = {Cormac Herley and
                  Wolter Pieters},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {"If you were attacked, you'd be sorry": Counterfactuals as security
                  arguments},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {112--123},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841122},
  doi          = {10.1145/2841113.2841122},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HerleyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HerrA15,
  author       = {Trey Herr and
                  Eric Armbrust},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Milware: Identification and Implications of State Authored Malicious
                  Software},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {29--43},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841116},
  doi          = {10.1145/2841113.2841116},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HerrA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HillD15,
  author       = {Raquel Hill and
                  Devan Ray Donaldson},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Bridging the Trust Gap: Integrating Models of Behavior and Perception},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {148--155},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841125},
  doi          = {10.1145/2841113.2841125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HillD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MannanSPR15,
  author       = {Mohammad Mannan and
                  Arash Shahkar and
                  Atieh Saberi Pirouz and
                  Vladimir Rabotka},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email
                  Security},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {124--136},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841123},
  doi          = {10.1145/2841113.2841123},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MannanSPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PelizziS15,
  author       = {Riccardo Pelizzi and
                  R. Sekar},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {WebSheets: Web Applications for Non-Programmers},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {137--147},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841124},
  doi          = {10.1145/2841113.2841124},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PelizziS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZengerZPPP15,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Mario Pietersz and
                  Jan{-}Felix Posielek and
                  Christof Paar},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Exploiting the Physical Environment for Securing the Internet of Things},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {44--58},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841117},
  doi          = {10.1145/2841113.2841117},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZengerZPPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2015,
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113},
  doi          = {10.1145/2841113},
  isbn         = {978-1-4503-3754-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/0002SMM14,
  author       = {Andrew M. White and
                  Katherine Shaw and
                  Fabian Monrose and
                  Elliott Moreton},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Isn't that Fantabulous: Security, Linguistic and Usability Challenges
                  of Pronounceable Tokens},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {25--38},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683470},
  doi          = {10.1145/2683467.2683470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/0002SMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AlmeshekahS14,
  author       = {Mohammed H. Almeshekah and
                  Eugene H. Spafford},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Planning and Integrating Deception into Computer Security Defenses},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683482},
  doi          = {10.1145/2683467.2683482},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AlmeshekahS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CapposZORY14,
  author       = {Justin Cappos and
                  Yanyan Zhuang and
                  Daniela Oliveira and
                  Marissa Rosenthal and
                  Kuo{-}Chuan Yeh},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making
                  Processes},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683472},
  doi          = {10.1145/2683467.2683472},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CapposZORY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DunphyVCCVWMO14,
  author       = {Paul Dunphy and
                  John Vines and
                  Lizzie Coles{-}Kemp and
                  Rachel Clarke and
                  Vasillis Vlachokyriakos and
                  Peter C. Wright and
                  John C. McCarthy and
                  Patrick Olivier},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Understanding the Experience-Centeredness of Privacy and Security
                  Technologies},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683475},
  doi          = {10.1145/2683467.2683475},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/DunphyVCCVWMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EdwardsLE14,
  author       = {Benjamin Edwards and
                  Michael E. Locasto and
                  Jeremy Epstein},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Panel Summary: The Future of Software Regulation},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683478},
  doi          = {10.1145/2683467.2683478},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/EdwardsLE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GatesM14,
  author       = {Carrie Gates and
                  Peter Matthews},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Data Is the New Currency},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683477},
  doi          = {10.1145/2683467.2683477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GatesM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HustedM14,
  author       = {Nathaniel Husted and
                  Steven A. Myers},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Emergent Properties {\&} Security: The Complexity ofSecurity as
                  a Science},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683468},
  doi          = {10.1145/2683467.2683468},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/HustedM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KuehnM14,
  author       = {Andreas Kuehn and
                  Milton Mueller},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse,
                  and Emerging Institutions},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683473},
  doi          = {10.1145/2683467.2683473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/KuehnM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PieczulFR14,
  author       = {Olgierd Pieczul and
                  Simon N. Foley and
                  Vivien M. Rooney},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {I'm OK, You're OK, the System's {OK:} Normative Security for Systems},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683476},
  doi          = {10.1145/2683467.2683476},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PieczulFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PietersHD14,
  author       = {Wolter Pieters and
                  Dina Hadziosmanovic and
                  Francien Dechesne},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Cyber Security as Social Experiment},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683469},
  doi          = {10.1145/2683467.2683469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PietersHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PollerTK14,
  author       = {Andreas Poller and
                  Sven T{\"{u}}rpe and
                  Katharina Kinder{-}Kurlanda},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {An Asset to Security Modeling?: Analyzing Stakeholder Collaborations
                  Instead of Threats to Assets},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {69--82},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683474},
  doi          = {10.1145/2683467.2683474},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PollerTK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/StobertB14,
  author       = {Elizabeth Stobert and
                  Robert Biddle},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {A Password Manager that Doesn't Remember Passwords},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {39--52},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683471},
  doi          = {10.1145/2683467.2683471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/StobertB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2014,
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2683467},
  isbn         = {978-1-4503-3062-6},
  timestamp    = {Fri, 16 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ArdBGS13,
  author       = {Julie Boxwell Ard and
                  Matt Bishop and
                  Carrie Gates and
                  Michael Xin Sun},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Information behaving badly},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535825},
  doi          = {10.1145/2535813.2535825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ArdBGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AshendenL13,
  author       = {Debi Ashenden and
                  Darren Lawrence},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Can we sell security like soap?: a new approach to behaviour change},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535823},
  doi          = {10.1145/2535813.2535823},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AshendenL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopBBGG13,
  author       = {Matt Bishop and
                  Emily Rine Butler and
                  Kevin R. B. Butler and
                  Carrie Gates and
                  Steven Greenspan},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Forgive and forget: return to obscurity},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535814},
  doi          = {10.1145/2535813.2535814},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopBBGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Castro13,
  author       = {Daniel Medeiros Nunes de Castro},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {{NSPHD:} the polyglot computer},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {121--122},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535827},
  doi          = {10.1145/2535813.2535827},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Castro13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChenKNSTTTVY13,
  author       = {Binbin Chen and
                  Zbigniew Kalbarczyk and
                  David M. Nicol and
                  William H. Sanders and
                  Rui Tan and
                  William G. Temple and
                  Nils Ole Tippenhauer and
                  An Hoa Vu and
                  David K. Y. Yau},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Go with the flow: toward workflow-oriented security assessment},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535821},
  doi          = {10.1145/2535813.2535821},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChenKNSTTTVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CraneLBF13,
  author       = {Stephen Crane and
                  Per Larsen and
                  Stefan Brunthaler and
                  Michael Franz},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Booby trapping software},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535824},
  doi          = {10.1145/2535813.2535824},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/CraneLBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Durmuth13,
  author       = {Markus D{\"{u}}rmuth},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Useful password hashing: how to waste computing cycles with style},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535817},
  doi          = {10.1145/2535813.2535817},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Durmuth13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EgelmanHO13,
  author       = {Serge Egelman and
                  Cormac Herley and
                  Paul C. van Oorschot},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Markets for zero-day exploits: ethics and implications},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535818},
  doi          = {10.1145/2535813.2535818},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/EgelmanHO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MathurCB13,
  author       = {Suhas Mathur and
                  Baris Coskun and
                  Suhrid Balakrishnan},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Detecting hidden enemy lines in {IP} address space},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535816},
  doi          = {10.1145/2535813.2535816},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MathurCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertTK13,
  author       = {Sean Peisert and
                  Edward B. Talbot and
                  Tom M. Kroeger},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Principles of authentication},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535819},
  doi          = {10.1145/2535813.2535819},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RoweLH13,
  author       = {Jeff Rowe and
                  Karl N. Levitt and
                  Mike Hogarth},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Towards the realization of a public health system for shared secure
                  cyber-space},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535815},
  doi          = {10.1145/2535813.2535815},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RoweLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SomayajiMB13,
  author       = {Anil Somayaji and
                  David Mould and
                  Carson Brown},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Towards narrative authentication: or, against boring authentication},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535820},
  doi          = {10.1145/2535813.2535820},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SomayajiMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Sundaramurthy13,
  author       = {Sathya Chandran Sundaramurthy},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Designing forensic analysis techniques through anthropology},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {119--120},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535826},
  doi          = {10.1145/2535813.2535826},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Sundaramurthy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZhaoM13,
  author       = {Lianying Zhao and
                  Mohammad Mannan},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Explicit authentication response considered harmful},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535822},
  doi          = {10.1145/2535813.2535822},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ZhaoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2013,
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2535813},
  isbn         = {978-1-4503-2582-0},
  timestamp    = {Fri, 31 Jan 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CrandallO12,
  author       = {Jedidiah R. Crandall and
                  Daniela Oliveira},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Holographic vulnerability studies: vulnerabilities as fractures in
                  interpretation as information flows across abstraction boundaries},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413309},
  doi          = {10.1145/2413296.2413309},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CrandallO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DongGCK12,
  author       = {Zheng Dong and
                  Vaibhav Garg and
                  L. Jean Camp and
                  Apu Kapadia},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Pools, clubs and security: designing for a party not a person},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413304},
  doi          = {10.1145/2413296.2413304},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DongGCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EdwardsMSHF12,
  author       = {Benjamin Edwards and
                  Tyler Moore and
                  George Stelle and
                  Steven A. Hofmeyr and
                  Stephanie Forrest},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Beyond the blacklist: modeling malware spread and the effect of interventions},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {53--66},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413302},
  doi          = {10.1145/2413296.2413302},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/EdwardsMSHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FordM12,
  author       = {Richard Ford and
                  Liam M. Mayron},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {All your base are belong to {US}},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {105--114},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413306},
  doi          = {10.1145/2413296.2413306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FordM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GarrisonLH12,
  author       = {William C. Garrison III and
                  Adam J. Lee and
                  Timothy L. Hinrichs},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {The need for application-aware access control evaluation},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413307},
  doi          = {10.1145/2413296.2413307},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/GarrisonLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LipfordZ12,
  author       = {Heather Richter Lipford and
                  Mary Ellen Zurko},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Someone to watch over me},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413303},
  doi          = {10.1145/2413296.2413303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LipfordZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MortonS12,
  author       = {Anthony Morton and
                  Martina Angela Sasse},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Privacy is a process, not a {PET:} a theory for effective privacy
                  practice},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {87--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413305},
  doi          = {10.1145/2413296.2413305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MortonS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertTB12,
  author       = {Sean Peisert and
                  Edward B. Talbot and
                  Matt Bishop},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Turtles all the way down: a clean-slate, ground-up, first-principles
                  approach to secure systems},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413299},
  doi          = {10.1145/2413296.2413299},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PietersVP12,
  author       = {Wolter Pieters and
                  Sanne H. G. van der Ven and
                  Christian W. Probst},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {A move in the security measurement stalemate: elo-style ratings to
                  quantify vulnerability},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413298},
  doi          = {10.1145/2413296.2413298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PietersVP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RoweLPSAJ12,
  author       = {Jeff Rowe and
                  Karl N. Levitt and
                  Simon Parsons and
                  Elizabeth Sklar and
                  Andy Applebaum and
                  Sharmin Jalal},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Argumentation logic to assist in security administration},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413301},
  doi          = {10.1145/2413296.2413301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RoweLPSAJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ThorpeSB12,
  author       = {Julie Thorpe and
                  Amirali Salehi{-}Abari and
                  Robert Burden},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Video-passwords: advertising while authenticating},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {127--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413308},
  doi          = {10.1145/2413296.2413308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ThorpeSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Turpe12,
  author       = {Sven T{\"{u}}rpe},
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {Point-and-shoot security design: can we build better tools for developers?},
  booktitle    = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  pages        = {27--42},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413296.2413300},
  doi          = {10.1145/2413296.2413300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Turpe12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2012,
  editor       = {Richard Ford and
                  Mary Ellen Zurko and
                  Cormac Herley and
                  Tara Whalen},
  title        = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy
                  - September 18 - 21, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2413296},
  isbn         = {978-1-4503-1794-8},
  timestamp    = {Mon, 17 Dec 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BicakciO11,
  author       = {Kemal Bicakci and
                  Paul C. van Oorschot},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {A multi-word password proposal (gridWord) and exploring questions
                  about science in security research and usable security evaluation},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073280},
  doi          = {10.1145/2073276.2073280},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BicakciO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopCFM11,
  author       = {Matt Bishop and
                  Marco M. Carvalho and
                  Richard Ford and
                  Liam M. Mayron},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Resilience is more than availability},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073286},
  doi          = {10.1145/2073276.2073286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopCFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BohmeG11,
  author       = {Rainer B{\"{o}}hme and
                  Jens Grossklags},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {The security cost of cheap user interaction},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {67--82},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073284},
  doi          = {10.1145/2073276.2073284},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BohmeG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DuJTLC11,
  author       = {Wenliang Du and
                  Karthick Jayaraman and
                  Xi Tan and
                  Tongbo Luo and
                  Steve J. Chapin},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Position paper: why are there so many vulnerabilities in web applications?},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073285},
  doi          = {10.1145/2073276.2073285},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DuJTLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Towards a formal model of accountability},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073282},
  doi          = {10.1145/2073276.2073282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FriedlandMSW11,
  author       = {Gerald Friedland and
                  Gregor Maier and
                  Robin Sommer and
                  Nicholas Weaver},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Sherlock holmes' evil twin: on the impact of global inference for
                  online privacy},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {105--114},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073287},
  doi          = {10.1145/2073276.2073287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FriedlandMSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Gutmann11,
  author       = {Peter Gutmann},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Applying problem-structuring methods to problems in computer security},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073281},
  doi          = {10.1145/2073276.2073281},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Gutmann11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HamacherK11,
  author       = {Kay Hamacher and
                  Stefan Katzenbeisser},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Public security: simulations need to replace conventional wisdom},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073288},
  doi          = {10.1145/2073276.2073288},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HamacherK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LocastoMD11,
  author       = {Michael E. Locasto and
                  Michael Massimi and
                  Peter DePasquale},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Security and privacy considerations in digital death},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073278},
  doi          = {10.1145/2073276.2073278},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LocastoMD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Pavlovic11,
  author       = {Dusko Pavlovic},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Gaming security by obscurity},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {125--140},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073289},
  doi          = {10.1145/2073276.2073289},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Pavlovic11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PietersC11,
  author       = {Wolter Pieters and
                  Lizzie Coles{-}Kemp},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Reducing normative conflicts in information security},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {11--24},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073279},
  doi          = {10.1145/2073276.2073279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PietersC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WashR11,
  author       = {Rick Wash and
                  Emilee J. Rader},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Influencing mental models of security: a research agenda},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073283},
  doi          = {10.1145/2073276.2073283},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/WashR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2011,
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2073276},
  isbn         = {978-1-4503-1078-9},
  timestamp    = {Tue, 13 Nov 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Al-SalehC10,
  author       = {Mohammed I. Al{-}Saleh and
                  Jedidiah R. Crandall},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {On information flow for intrusion detection: what if accurate full-system
                  dynamic information flow tracking was possible?},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {17--32},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900551},
  doi          = {10.1145/1900546.1900551},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Al-SalehC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopCPSBAFH10,
  author       = {Matt Bishop and
                  Justin Cummins and
                  Sean Peisert and
                  Anhad Singh and
                  Bhume Bhumiratana and
                  Deborah A. Agarwal and
                  Deborah A. Frincke and
                  Michael A. Hogarth},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Relationships and data sanitization: a study in scarlet},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {151--164},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900567},
  doi          = {10.1145/1900546.1900567},
  timestamp    = {Mon, 28 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopCPSBAFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BratusLRS10,
  author       = {Sergey Bratus and
                  Michael E. Locasto and
                  Ashwin Ramaswamy and
                  Sean W. Smith},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {VM-based security overkill: a lament for applied systems security
                  research},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900554},
  doi          = {10.1145/1900546.1900554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BratusLRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Cleeff10,
  author       = {Andr{\'{e}} van Cleeff},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {A risk management process for consumers: the next step in information
                  security},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {107--114},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900561},
  doi          = {10.1145/1900546.1900561},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Cleeff10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Coles-KempK10,
  author       = {Lizzie Coles{-}Kemp and
                  Elahe Kani{-}Zabihi},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {On-line privacy and consent: a dialogue, not a monologue},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900560},
  doi          = {10.1145/1900546.1900560},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Coles-KempK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FailyF10,
  author       = {Shamal Faily and
                  Ivan Flechais},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {To boldly go where invention isn't secure: applying security entrepreneurship
                  to secure systems design},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900557},
  doi          = {10.1145/1900546.1900557},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FailyF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Franz10,
  author       = {Michael Franz},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {E unibus pluram: massive-scale software diversity as a defense mechanism},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {7--16},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900550},
  doi          = {10.1145/1900546.1900550},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Franz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LilienAO10,
  author       = {Leszek Lilien and
                  Adawia Al{-}Alawneh and
                  Lotfi Ben Othmane},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {The pervasive trust foundation for security in next generation networks},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {129--142},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900564},
  doi          = {10.1145/1900546.1900564},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LilienAO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MaxionLM10,
  author       = {Roy A. Maxion and
                  Thomas A. Longstaff and
                  John McHugh},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Why is there no science in cyber science?: a panel discussion at {NSPW}
                  2010},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900548},
  doi          = {10.1145/1900546.1900548},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MaxionLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MolnarEC10,
  author       = {David Molnar and
                  Serge Egelman and
                  Nicolas Christin},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {This is your data on drugs: lessons computer security can learn from
                  the drug war},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {143--149},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900566},
  doi          = {10.1145/1900546.1900566},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MooreFP10,
  author       = {Tyler Moore and
                  Allan Friedman and
                  Ariel D. Procaccia},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Would a 'cyber warrior' protect us: exploring trade-offs between attack
                  and defense of information systems},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900559},
  doi          = {10.1145/1900546.1900559},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MooreFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ParkinMIS10,
  author       = {Simon E. Parkin and
                  Aad P. A. van Moorsel and
                  Philip Inglesant and
                  Martina Angela Sasse},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {A stealth approach to usable security: helping {IT} security managers
                  to identify workable security solutions},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {33--50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900553},
  doi          = {10.1145/1900546.1900553},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ParkinMIS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RaskinTH10,
  author       = {Victor Raskin and
                  Julia M. Taylor and
                  Christian Hempelmann},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Ontological semantic technology for detecting insider threat and social
                  engineering},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {115--128},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900563},
  doi          = {10.1145/1900546.1900563},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RaskinTH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SunBHB10,
  author       = {San{-}Tsai Sun and
                  Yazan Boshmaf and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {A billion keys, but few locks: the crisis of web single sign-on},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900556},
  doi          = {10.1145/1900546.1900556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SunBHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2010,
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546},
  doi          = {10.1145/1900546},
  isbn         = {978-1-4503-0415-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopGH09,
  author       = {Matt Bishop and
                  Carrie Gates and
                  Jeffrey Hunker},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {The sisterhood of the traveling packets},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719039},
  doi          = {10.1145/1719030.1719039},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChurchW09,
  author       = {Luke Church and
                  Alma Whitten},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Generative usability: security and user centered design beyond the
                  appliance},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719038},
  doi          = {10.1145/1719030.1719038},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChurchW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GibsonRCM09,
  author       = {Marcia Gibson and
                  Karen Renaud and
                  Marc Conrad and
                  Carsten Maple},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Musipass: authenticating me softly with "my" song},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {85--100},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719043},
  doi          = {10.1145/1719030.1719043},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GibsonRCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Herley09,
  author       = {Cormac Herley},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {So long, and no thanks for the externalities: the rational rejection
                  of security advice by users},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719050},
  doi          = {10.1145/1719030.1719050},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Herley09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JakobssonJ09,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Server-side detection of malware infection},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719033},
  doi          = {10.1145/1719030.1719033},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JohnsonBRS09,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Robert W. Reeder and
                  Stuart E. Schechter},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Laissez-faire file sharing: access control designed for individuals
                  at the endpoints},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719032},
  doi          = {10.1145/1719030.1719032},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JohnsonBRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KlineR09,
  author       = {Erik Kline and
                  Peter L. Reiher},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Securing data through avoidance routing},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719046},
  doi          = {10.1145/1719030.1719046},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/KlineR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MisraS09,
  author       = {Janardan Misra and
                  Indranil Saha},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {A reinforcement model for collaborative security and Its formal analysis},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {101--114},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719045},
  doi          = {10.1145/1719030.1719045},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MisraS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertBCG09,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Laura Corriss and
                  Steven J. Greenwald},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security
                  paradigms with appreciation to the Roman poet Juvenal},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {71--84},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719041},
  doi          = {10.1145/1719030.1719041},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertBCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ProbstH09,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Fluid information systems},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {125--132},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719048},
  doi          = {10.1145/1719030.1719048},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ProbstH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Turpe09,
  author       = {Sven T{\"{u}}rpe},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {What is the shape of your security policy?: security as a classification
                  problem},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {23--36},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719035},
  doi          = {10.1145/1719030.1719035},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Turpe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Verendel09,
  author       = {Vilhelm Verendel},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Quantified security is a weak hypothesis: a critical survey of results
                  and assumptions},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {37--50},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719036},
  doi          = {10.1145/1719030.1719036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Verendel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2009,
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030},
  doi          = {10.1145/1719030},
  isbn         = {978-1-60558-845-2},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BeautementSW08,
  author       = {Adam Beautement and
                  Martina Angela Sasse and
                  Mike Wonham},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {The compliance budget: managing security behaviour in organisations},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595684},
  doi          = {10.1145/1595676.1595684},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BeautementSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BishopEPWG08,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Sean Peisert and
                  Sean Whalen and
                  Carrie Gates},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {We have met the enemy and he is us},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595678},
  doi          = {10.1145/1595676.1595678},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BishopEPWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CrandallEFLS08,
  author       = {Jedidiah R. Crandall and
                  Roya Ensafi and
                  Stephanie Forrest and
                  Joshua Ladau and
                  Bilal Shebaro},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {The ecology of Malware},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595692},
  doi          = {10.1145/1595676.1595692},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CrandallEFLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GreenwaldSFT08,
  author       = {Steven J. Greenwald and
                  Brian D. Snow and
                  Richard Ford and
                  Richard Thieme},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Towards an ethical code for information security?},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {75--87},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595689},
  doi          = {10.1145/1595676.1595689},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GreenwaldSFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HerleyF08,
  author       = {Cormac Herley and
                  Dinei A. F. Flor{\^{e}}ncio},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {A profitless endeavor: phishing as tragedy of the commons},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595686},
  doi          = {10.1145/1595676.1595686},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HerleyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Julisch08,
  author       = {Klaus Julisch},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Security compliance: the next frontier in security research},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {71--74},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595687},
  doi          = {10.1145/1595676.1595687},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Julisch08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LaurieS08,
  author       = {Ben Laurie and
                  Abe Singer},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Choose the red pill \emph{and} the blue pill: a position paper},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {127--133},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595695},
  doi          = {10.1145/1595676.1595695},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LaurieS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MannanO08,
  author       = {Mohammad Mannan and
                  Paul C. van Oorschot},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Localization of credential information to address increasingly inevitable
                  data breaches},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595680},
  doi          = {10.1145/1595676.1595680},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MannanO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MolloyCR08,
  author       = {Ian M. Molloy and
                  Pau{-}Chen Cheng and
                  Pankaj Rohatgi},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Trading in risk: using markets to improve access control},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {107--125},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595694},
  doi          = {10.1145/1595676.1595694},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MolloyCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ShirleyE08,
  author       = {Jeff Shirley and
                  David Evans},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {The user is not the enemy: fighting malware by tracking user intentions},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {33--45},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595683},
  doi          = {10.1145/1595676.1595683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ShirleyE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WursterO08,
  author       = {Glenn Wurster and
                  Paul C. van Oorschot},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {The developer is the enemy},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {89--97},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595691},
  doi          = {10.1145/1595676.1595691},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WursterO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZhaoCB08,
  author       = {Hang Zhao and
                  Chi{-}Kin Chau and
                  Steven M. Bellovin},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {{ROFL:} routing as the firewall layer},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {23--31},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595681},
  doi          = {10.1145/1595676.1595681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZhaoCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2008,
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676},
  doi          = {10.1145/1595676},
  isbn         = {978-1-60558-341-9},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Beaumont-GayER07,
  author       = {Matt Beaumont{-}Gay and
                  Kevin Eustice and
                  Peter L. Reiher},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Information protection via environmental data tethers},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {67--73},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600188},
  doi          = {10.1145/1600176.1600188},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Beaumont-GayER07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChowGV07,
  author       = {Stanley Chow and
                  Christophe Gustave and
                  Dmitri Vinokurov},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Authenticated names},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600181},
  doi          = {10.1145/1600176.1600181},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChowGV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EdwardsPS07,
  author       = {W. Keith Edwards and
                  Erika Shehan Poole and
                  Jennifer Stoll},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Security automation considered harmful?},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600182},
  doi          = {10.1145/1600176.1600182},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/EdwardsPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hunker07,
  author       = {Jeffrey Hunker},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {A privacy expectations and security assurance offer system},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600179},
  doi          = {10.1145/1600176.1600179},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hunker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KursaweK07,
  author       = {Klaus Kursawe and
                  Stefan Katzenbeisser},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Computing under occupation},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600191},
  doi          = {10.1145/1600176.1600191},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/KursaweK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Locasto07,
  author       = {Michael E. Locasto},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Self-healing: science, engineering, and fiction},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600183},
  doi          = {10.1145/1600176.1600183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Locasto07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MannanO07,
  author       = {Mohammad Mannan and
                  Paul C. van Oorschot},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Security and usability: the gap in real-world online banking},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600178},
  doi          = {10.1145/1600176.1600178},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MannanO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/NaliOA07,
  author       = {Deholo Nali and
                  Paul C. van Oorschot and
                  Andy Adler},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {VideoTicket: detecting identity fraud attempts via audiovisual certificates
                  and signatures},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {89--101},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600192},
  doi          = {10.1145/1600176.1600192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/NaliOA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SankaranarayananCU07,
  author       = {Vidyaraman Sankaranarayanan and
                  Madhusudhanan Chandrasekaran and
                  Shambhu J. Upadhyaya},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Position: the user is the enemy},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600189},
  doi          = {10.1145/1600176.1600189},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SankaranarayananCU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Solworth07,
  author       = {Jon A. Solworth},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Robustly secure computer systems: a new security paradigm of system
                  discontinuity},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {55--65},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600186},
  doi          = {10.1145/1600176.1600186},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Solworth07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SomayajiLF07,
  author       = {Anil Somayaji and
                  Michael E. Locasto and
                  Jan Feyereisl},
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {The future of biologically-inspired security: is there anything left
                  to learn?},
  booktitle    = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176.1600185},
  doi          = {10.1145/1600176.1600185},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SomayajiLF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2006,
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://dl.acm.org/citation.cfm?id=1278940},
  isbn         = {978-1-59593-923-4},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2007,
  editor       = {Konstantin Beznosov and
                  Angelos D. Keromytis},
  title        = {Proceedings of the 2007 Workshop on New Security Paradigms, White
                  Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21,
                  2007},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1600176},
  doi          = {10.1145/1600176},
  isbn         = {978-1-60558-080-7},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BondD06,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {A pact with the devil},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278952},
  timestamp    = {Thu, 29 Nov 2018 11:17:10 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BondD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Conti06,
  author       = {Gregory J. Conti},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Googling considered harmful},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278951},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Conti06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CrawfordBBCL06,
  author       = {Rick Crawford and
                  Matt Bishop and
                  Bhume Bhumiratana and
                  Lisa Clark and
                  Karl N. Levitt},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Sanitization models and their limitations},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {41--56},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278948},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CrawfordBBCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FordG06,
  author       = {Richard Ford and
                  Sarah Gordon},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Cent, five cent, ten cent, dollar: hitting botnets where it \emph{really}
                  hurts},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278942},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FordG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GatesT06,
  author       = {Carrie Gates and
                  Carol Taylor},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Challenging the anomaly detection paradigm: a provocative discussion},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278945},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GatesT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Greenwald06,
  author       = {Steven J. Greenwald},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {E-Prime for security: a new security paradigm},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {87--95},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278954},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Greenwald06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Gutmann06,
  author       = {Peter Gutmann},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {{PKI} design for the real world},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {109--116},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278958},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Gutmann06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LocastoSK06,
  author       = {Michael E. Locasto and
                  Angelos Stavrou and
                  Angelos D. Keromytis},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Dark application communities},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278943},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LocastoSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/NeagoeB06,
  author       = {Vicentiu Neagoe and
                  Matt Bishop},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Inconsistency in deception for defense},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278946},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/NeagoeB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PorrasS06,
  author       = {Phillip A. Porras and
                  Vitaly Shmatikov},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Large-scale collection and sanitization of network security data:
                  risks and challenges},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278949},
  timestamp    = {Thu, 29 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PorrasS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WangD06,
  author       = {Wei Wang and
                  Thomas E. Daniels},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Diffusion and graph spectral methods for network forensic analysis},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278956},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/WangD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Beznosov05,
  author       = {Konstantin Beznosov},
  editor       = {Simon N. Foley},
  title        = {Flooding and recycling authorizations},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146285},
  doi          = {10.1145/1146269.1146285},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Beznosov05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Bishop05,
  author       = {Matt Bishop},
  editor       = {Simon N. Foley},
  title        = {The insider problem revisited},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {75--76},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146287},
  doi          = {10.1145/1146269.1146287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Bishop05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Bishop05a,
  author       = {Matt Bishop},
  editor       = {Simon N. Foley},
  title        = {Position: "insider" is relative},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {77--78},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146288},
  doi          = {10.1145/1146269.1146288},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Bishop05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FlechaisRS05,
  author       = {Ivan Flechais and
                  Jens Riegelsberger and
                  Martina Angela Sasse},
  editor       = {Simon N. Foley},
  title        = {Divide and conquer: the role of trust and assurance in the design
                  of secure socio-technical systems},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {33--41},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146280},
  doi          = {10.1145/1146269.1146280},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FlechaisRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FordBB05,
  author       = {Richard Ford and
                  Mark Bush and
                  Alex Boulatov},
  editor       = {Simon N. Foley},
  title        = {Internet instability and disturbance: goal or menace?},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {3--8},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146271},
  doi          = {10.1145/1146269.1146271},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FordBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Littlewood05,
  author       = {Bev Littlewood},
  editor       = {Simon N. Foley},
  title        = {"Diversity as a computer defense mechanism"},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {17--18},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146275},
  doi          = {10.1145/1146269.1146275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Littlewood05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LocastoSK05,
  author       = {Michael E. Locasto and
                  Stelios Sidiroglou and
                  Angelos D. Keromytis},
  editor       = {Simon N. Foley},
  title        = {Speculative virtual verification: policy-constrained speculative execution},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146295},
  doi          = {10.1145/1146269.1146295},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LocastoSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MarceauJ05,
  author       = {Carla Marceau and
                  Robert A. Joyce},
  editor       = {Simon N. Foley},
  title        = {Empirical privilege profiling},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {111--118},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146294},
  doi          = {10.1145/1146269.1146294},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MarceauJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Maxion05,
  author       = {Roy A. Maxion},
  editor       = {Simon N. Foley},
  title        = {Use of diversity as a defense mechanism},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {21--22},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146277},
  doi          = {10.1145/1146269.1146277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Maxion05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott05,
  author       = {John P. McDermott},
  editor       = {Simon N. Foley},
  title        = {Visual security protocol modeling},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {97--109},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146293},
  doi          = {10.1145/1146269.1146293},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McHugh05,
  author       = {John McHugh},
  editor       = {Simon N. Foley},
  title        = {Software diversity: \emph{use of diversity as a defense mechanism}},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {19--20},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146276},
  doi          = {10.1145/1146269.1146276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McHugh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Oorschot05,
  author       = {Paul C. van Oorschot},
  editor       = {Simon N. Foley},
  title        = {Message authentication by integrity with public corroboration},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {57--63},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146283},
  doi          = {10.1145/1146269.1146283},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Oorschot05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PeisertKBM05,
  author       = {Sean Peisert and
                  Sidney Karin and
                  Matt Bishop and
                  Keith Marzullo},
  editor       = {Simon N. Foley},
  title        = {Principles-driven forensic analysis},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {85--93},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146291},
  doi          = {10.1145/1146269.1146291},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PeisertKBM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ProbstGF05,
  author       = {Christian W. Probst and
                  Andreas Gal and
                  Michael Franz},
  editor       = {Simon N. Foley},
  title        = {Average case vs. worst case: margins of safety in system design},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146279},
  doi          = {10.1145/1146269.1146279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ProbstGF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schwarting05,
  author       = {Irene Schwarting},
  editor       = {Simon N. Foley},
  title        = {Position paper},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {79--81},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146289},
  doi          = {10.1145/1146269.1146289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schwarting05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Taylor05,
  author       = {Carol Taylor},
  editor       = {Simon N. Foley},
  title        = {Diversity: the biological perspective position statement},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {15--16},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146274},
  doi          = {10.1145/1146269.1146274},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Taylor05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/TaylorA05,
  author       = {Carol Taylor and
                  Jim Alves{-}Foss},
  editor       = {Simon N. Foley},
  title        = {Diversity as a computer defense mechanism},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {11--14},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146273},
  doi          = {10.1145/1146269.1146273},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/TaylorA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ThorpeOS05,
  author       = {Julie Thorpe and
                  Paul C. van Oorschot and
                  Anil Somayaji},
  editor       = {Simon N. Foley},
  title        = {Pass-thoughts: authenticating with our minds},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146282},
  doi          = {10.1145/1146269.1146282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ThorpeOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2005,
  editor       = {Simon N. Foley},
  title        = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269},
  doi          = {10.1145/1146269},
  isbn         = {1-59593-317-4},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Allwein04,
  author       = {Gerard Allwein},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {A qualitative framework for Shannon information theories},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {23--31},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066030},
  doi          = {10.1145/1065907.1066030},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Allwein04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BeznosovK04,
  author       = {Konstantin Beznosov and
                  Philippe Kruchten},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Towards agile security assurance},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066034},
  doi          = {10.1145/1065907.1066034},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BeznosovK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DragovicC04,
  author       = {Boris Dragovic and
                  Jon Crowcroft},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Information exposure control through data manipulation for ubiquitous
                  computing},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066036},
  doi          = {10.1145/1065907.1066036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DragovicC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FlinnS04,
  author       = {Scott Flinn and
                  Steve Stoyles},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Omnivore: risk management through bidirectional transparency},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {97--105},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066043},
  doi          = {10.1145/1065907.1066043},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FlinnS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GatesW04,
  author       = {Carrie Gates and
                  Tara Whalen},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Profiling the defenders},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {107--114},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066044},
  doi          = {10.1145/1065907.1066044},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GatesW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GreenwaldORR04,
  author       = {Steven J. Greenwald and
                  Kenneth G. Olthoff and
                  Victor Raskin and
                  Willibald Ruch},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {The user non-acceptance paradigm: INFOSEC's dirty little secret},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {35--43},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066032},
  doi          = {10.1145/1065907.1066032},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GreenwaldORR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HaldarF04,
  author       = {Vivek Haldar and
                  Michael Franz},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Symmetric behavior-based trust: a new paradigm for internet computing},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {79--84},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066039},
  doi          = {10.1145/1065907.1066039},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HaldarF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HollebeekW04,
  author       = {Timothy Hollebeek and
                  Rand Waltzman},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {The role of suspicion in model-based intrusion detection},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066041},
  doi          = {10.1145/1065907.1066041},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HollebeekW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PopescuCT04,
  author       = {Bogdan C. Popescu and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Support for multi-level security policies in {DRM} architectures},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1065909},
  doi          = {10.1145/1065907.1065909},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PopescuCT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SadeghiS04,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Property-based attestation for computing platforms: caring about properties,
                  not mechanisms},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {67--77},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066038},
  doi          = {10.1145/1065907.1066038},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SadeghiS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZhouF04,
  author       = {Hongbin Zhou and
                  Simon N. Foley},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {A collaborative approach to autonomic security protocols},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907.1066029},
  doi          = {10.1145/1065907.1066029},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZhouF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2004,
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Proceedings of the New Security Paradigms Workshop 2004, September
                  20-23, 2004, Nova Scotia, Canada},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1065907},
  doi          = {10.1145/1065907},
  isbn         = {1-59593-076-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AlkassarSS03,
  author       = {Ammar Alkassar and
                  Christian St{\"{u}}ble and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Secure object identification: or: solving the Chess Grandmaster Problem},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {77--85},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986668},
  doi          = {10.1145/986655.986668},
  timestamp    = {Wed, 14 Nov 2018 10:52:51 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AlkassarSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BackesS03,
  author       = {Michael Backes and
                  Matthias Schunter},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {From absence of certain vulnerabilities towards security proofs: pushing
                  the limits of formal verification},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {67--74},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986666},
  doi          = {10.1145/986655.986666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BackesS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BeresD03,
  author       = {Yolanta Beres and
                  Chris I. Dalton},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Dynamic label binding at run-time},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986662},
  doi          = {10.1145/986655.986662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BeresD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DuVarneyVB03,
  author       = {Daniel C. DuVarney and
                  V. N. Venkatakrishnan and
                  Sandeep Bhatkar},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {{SELF:} a transparent security extension for {ELF} binaries},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986661},
  doi          = {10.1145/986655.986661},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DuVarneyVB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EusticeKMPRR03,
  author       = {Kevin Eustice and
                  Leonard Kleinrock and
                  Shane Markstrum and
                  Gerald J. Popek and
                  Venkatraman Ramakrishna and
                  Peter L. Reiher},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Securing nomads: the case for quarantine, examination, and decontamination},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {123--128},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986673},
  doi          = {10.1145/986655.986673},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/EusticeKMPRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FlechaisSH03,
  author       = {Ivan Flechais and
                  Martina Angela Sasse and
                  Stephen Hailes},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Bringing security home: a process for developing secure and usable
                  systems},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {49--57},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986664},
  doi          = {10.1145/986655.986664},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FlechaisSH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GatesS03,
  author       = {Carrie Gates and
                  Jacob Slonim},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Owner-controlled information},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986670},
  doi          = {10.1145/986655.986670},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GatesS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JonesWOWE03,
  author       = {K. Jones and
                  Ashraf Wadaa and
                  Stephan Olariu and
                  Larry Wilson and
                  Mohamed Eltoweissy},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Towards a new paradigm for securing wireless sensor networks},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {115--121},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986672},
  doi          = {10.1145/986655.986672},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JonesWOWE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermottKF03,
  author       = {John P. McDermott and
                  Anya Kim and
                  Judith N. Froscher},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Merging paradigms of survivability and security: stochastic faults
                  and designed faults},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {19--25},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986659},
  doi          = {10.1145/986655.986659},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermottKF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McHughG03,
  author       = {John McHugh and
                  Carrie Gates},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Locality: a new paradigm for thinking about normal behavior and outsider
                  threat},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986657},
  doi          = {10.1145/986655.986657},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McHughG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MirkovicRR03,
  author       = {Jelena Mirkovic and
                  Max Robinson and
                  Peter L. Reiher},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Alliance formation for DDoS defense},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986658},
  doi          = {10.1145/986655.986658},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MirkovicRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Perrin03,
  author       = {Trevor Perrin},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Public key distribution through "cryptoIDs"},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {87--102},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986669},
  doi          = {10.1145/986655.986669},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Perrin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Ray03,
  author       = {Arnab Ray},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Security check: a formal yet practical framework for secure software
                  architecture},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {59--65},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986665},
  doi          = {10.1145/986655.986665},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Ray03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2003,
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655},
  doi          = {10.1145/986655},
  isbn         = {1-58113-880-6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AhamadMLOSLP02,
  author       = {Mustaque Ahamad and
                  Leo Mark and
                  Wenke Lee and
                  Edward Omicienski and
                  Andre dos Santos and
                  Ling Liu and
                  Calton Pu},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Guarding the next Internet frontier: countering denial of information
                  attacks},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {136--143},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844126},
  doi          = {10.1145/844102.844126},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AhamadMLOSLP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AshleyPS02,
  author       = {Paul Ashley and
                  Calvin Powers and
                  Matthias Schunter},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {From privacy promises to privacy management: a new approach for enforcing
                  privacy throughout an enterprise},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844110},
  doi          = {10.1145/844102.844110},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AshleyPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BhattacharyyaHE02,
  author       = {Manasi Bhattacharyya and
                  Shlomo Hershkop and
                  Eleazar Eskin},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {{MET:} an experimental system for Malicious Email Tracking},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844104},
  doi          = {10.1145/844102.844104},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BhattacharyyaHE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Blakley02,
  author       = {Bob Blakley},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Assuring critical systems},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {110--112},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844122},
  doi          = {10.1145/844102.844122},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Blakley02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CapkunBH02,
  author       = {Srdjan Capkun and
                  Levente Butty{\'{a}}n and
                  Jean{-}Pierre Hubaux},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Small worlds in security systems: an analysis of the {PGP} certificate
                  graph},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {28--35},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844108},
  doi          = {10.1145/844102.844108},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CapkunBH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ConnellyC02,
  author       = {Kay Connelly and
                  Andrew A. Chien},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Breaking the barriers: high performance security for high performance
                  computing},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {36--42},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844109},
  doi          = {10.1145/844102.844109},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ConnellyC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DourishR02,
  author       = {Paul Dourish and
                  David F. Redmiles},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {An approach to usable security based on event monitoring and visualization},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {75--81},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844116},
  doi          = {10.1145/844102.844116},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DourishR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DuZ02,
  author       = {Wenliang Du and
                  Justin Zhijun Zhan},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {A practical approach to solve Secure Multi-party Computation problems},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {127--135},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844125},
  doi          = {10.1145/844102.844125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DuZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/GreenwaldS02,
  author       = {Steven J. Greenwald and
                  Marv Schaefer},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Assurance in life/nation critical endeavors a panel},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844119},
  doi          = {10.1145/844102.844119},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/GreenwaldS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HaldarSF02,
  author       = {Vivek Haldar and
                  Christian H. Stork and
                  Michael Franz},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {The source is the proof},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {69--73},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844114},
  doi          = {10.1145/844102.844114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HaldarSF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/InoueF02,
  author       = {Hajime Inoue and
                  Stephanie Forrest},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Anomaly intrusion detection in dynamic execution environments},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {52--60},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844112},
  doi          = {10.1145/844102.844112},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/InoueF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Marceau02,
  author       = {Carla Marceau},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {An evolutionary approach to cyber security},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {108--109},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844121},
  doi          = {10.1145/844102.844121},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Marceau02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MoskowitzCN02,
  author       = {Ira S. Moskowitz and
                  Liwu Chang and
                  Richard E. Newman},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Capacity is the wrong paradigm},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {114--126},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844124},
  doi          = {10.1145/844102.844124},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MoskowitzCN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SmettersG02,
  author       = {Diana K. Smetters and
                  Rebecca E. Grinter},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Moving from the design of usable security technologies to the design
                  of useful secure applications},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844117},
  doi          = {10.1145/844102.844117},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SmettersG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/TaylorA02,
  author       = {Carol Taylor and
                  Jim Alves{-}Foss},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {An empirical analysis of {NATE:} Network Analysis of Anomalous Traffic
                  Events},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844106},
  doi          = {10.1145/844102.844106},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/TaylorA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ToyoizumiK02,
  author       = {Hiroshi Toyoizumi and
                  Atsuhi Kara},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Predators: good will mobile codes combat against computer viruses},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {11--17},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844105},
  doi          = {10.1145/844102.844105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ToyoizumiK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/VenkatakrishnanPS02,
  author       = {V. N. Venkatakrishnan and
                  Ram Peri and
                  R. Sekar},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Empowering mobile code using expressive security policies},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {61--68},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844113},
  doi          = {10.1145/844102.844113},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/VenkatakrishnanPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Williams02,
  author       = {John Michael Williams},
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Biometrics or ... biohazards?},
  booktitle    = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102.844120},
  doi          = {10.1145/844102.844120},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Williams02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2002,
  editor       = {Cristina Serban and
                  Carla Marceau and
                  Simon N. Foley},
  title        = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia
                  Beach, VA, USA, September 23-26, 2002},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/844102},
  doi          = {10.1145/844102},
  isbn         = {1-58113-598-X},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BalacheffCPP01,
  author       = {Boris Balacheff and
                  Liqun Chen and
                  David Plaquin and
                  Graeme Proudler},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {A trusted process to digitally sign a document},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {79--86},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508184},
  doi          = {10.1145/508171.508184},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BalacheffCPP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BlakleyMG01,
  author       = {Bob Blakley and
                  Ellen McDermott and
                  Daniel E. Geer Jr.},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Information security is information risk management},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {97--104},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508187},
  doi          = {10.1145/508171.508187},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BlakleyMG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BrostoffS01,
  author       = {Sacha Brostoff and
                  Martina Angela Sasse},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Safe and sound: a safety-critical approach to security},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508178},
  doi          = {10.1145/508171.508178},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BrostoffS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BruschiR01,
  author       = {Danilo Bruschi and
                  Emilia Rosti},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {AngeL: a tool to disarm computer systems},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {63--69},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508182},
  doi          = {10.1145/508171.508182},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BruschiR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DuA01,
  author       = {Wenliang Du and
                  Mikhail J. Atallah},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Secure multi-party computation problems and their applications: a
                  review and open problems},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508174},
  doi          = {10.1145/508171.508174},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/DuA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FoleyM01,
  author       = {Simon N. Foley and
                  John P. Morrison},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Computational paradigms and protection},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {3--11},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508173},
  doi          = {10.1145/508171.508173},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FoleyM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Greenwald01,
  author       = {Steven J. Greenwald},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {The New Security Paradigms Workshop - boom or bust?: a panel},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {107--111},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508189},
  doi          = {10.1145/508171.508189},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Greenwald01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hosmer01,
  author       = {Hilary H. Hosmer},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Position statement for \emph{New Security Paradigms Workshop - boom
                  or bust?}: neither boom nor bust},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {113},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508190},
  doi          = {10.1145/508171.508190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hosmer01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PalWS01,
  author       = {Partha P. Pal and
                  Franklin Webber and
                  Richard E. Schantz},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Survival by defense-enabling},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {71--78},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508183},
  doi          = {10.1145/508171.508183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PalWS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RaskinHTN01,
  author       = {Victor Raskin and
                  Christian Hempelmann and
                  Katrina E. Triezenberg and
                  Sergei Nirenburg},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Ontology in information security: a useful theoretical foundation
                  and methodological tool},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {53--59},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508180},
  doi          = {10.1145/508171.508180},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RaskinHTN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schaefer01,
  author       = {Marvin Schaefer},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {The New Security Paradigms Workshop - boom or bust?: thinking in an
                  age of instant communication; communicating in a time of reflective
                  thought},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {119--123},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508192},
  doi          = {10.1145/508171.508192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schaefer01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SekarRRS01,
  author       = {R. Sekar and
                  C. R. Ramakrishnan and
                  I. V. Ramakrishnan and
                  Scott A. Smolka},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Model-Carrying Code {(MCC):} a new paradigm for mobile-code security},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508175},
  doi          = {10.1145/508171.508175},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SekarRRS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WeirichS01,
  author       = {Dirk Weirich and
                  Martina Angela Sasse},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Pretty good persuasion: a first step towards effective password security
                  in the real world},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {137--143},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508195},
  doi          = {10.1145/508171.508195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WeirichS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Yan01,
  author       = {Jeff Jianxin Yan},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {A note on proactive password checking},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {127--135},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508194},
  doi          = {10.1145/508171.508194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Yan01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZhangVALD01,
  author       = {Yongguang Zhang and
                  Harrick M. Vin and
                  Lorenzo Alvisi and
                  Wenke Lee and
                  Son K. Dao},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Heterogeneous networking: a new survivability paradigm},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {33--39},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508177},
  doi          = {10.1145/508171.508177},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZhangVALD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Zurko01,
  author       = {Mary Ellen Zurko},
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Tracking influence through citation index comparisons and preliminary
                  case studies panel position statement},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  pages        = {115--117},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171.508191},
  doi          = {10.1145/508171.508191},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Zurko01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2001,
  editor       = {Victor Raskin and
                  Steven J. Greenwald and
                  Brenda Timmerman and
                  Darrell M. Kienzle},
  title        = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft,
                  New Mexico, USA, September 10-13, 2001},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/508171},
  doi          = {10.1145/508171},
  isbn         = {1-58113-457-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/AtallahMRN00,
  author       = {Mikhail J. Atallah and
                  Craig J. McDonough and
                  Victor Raskin and
                  Sergei Nirenburg},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Natural language processing for information assurance and security:
                  an overview and implementations},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {51--65},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366190},
  doi          = {10.1145/366173.366190},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/AtallahMRN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BruschiR00,
  author       = {Danilo Bruschi and
                  Emilia Rosti},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Disarming offense to facilitate defense},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {69--75},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366192},
  doi          = {10.1145/366173.366192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BruschiR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DanielsS00,
  author       = {Thomas E. Daniels and
                  Eugene H. Spafford},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Network traffic tracking systems: folly in the large?},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366200},
  doi          = {10.1145/366173.366200},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DanielsS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Foley00,
  author       = {Simon N. Foley},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Conduit cascades and secure synchronization},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366205},
  doi          = {10.1145/366173.366205},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Foley00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/IrvineL00,
  author       = {Cynthia E. Irvine and
                  Timothy E. Levin},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Quality of security service},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {91--99},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366195},
  doi          = {10.1145/366173.366195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/IrvineL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Kahn00,
  author       = {Clifford E. Kahn},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Incentives to help stop floods},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {127--132},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366202},
  doi          = {10.1145/366173.366202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Kahn00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Marceau00,
  author       = {Carla Marceau},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Characterizing the behavior of a program using multiple-length N-grams},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {101--110},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366197},
  doi          = {10.1145/366173.366197},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Marceau00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott00,
  author       = {James P. McDermott},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Attack net penetration testing},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {15--21},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366183},
  doi          = {10.1145/366173.366183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MoskowitzLC00,
  author       = {Ira S. Moskowitz and
                  Garth E. Longdon and
                  Liwu Chang},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A new paradigm hidden in steganography},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366189},
  doi          = {10.1145/366173.366189},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MoskowitzLC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Olthoff00,
  author       = {Kenneth G. Olthoff},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Reflections on ratings},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366198},
  doi          = {10.1145/366173.366198},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Olthoff00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PerrineS00,
  author       = {Tom Perrine and
                  Abe Singer},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {New paradigms in incident management},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {133--138},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366204},
  doi          = {10.1145/366173.366204},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/PerrineS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Rannenberg00,
  author       = {Kai Rannenberg},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Multilateral security a concept and examples for balanced security},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {151--162},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366208},
  doi          = {10.1145/366173.366208},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Rannenberg00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SchudelW00,
  author       = {Gregg Schudel and
                  Bradley Wood},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Adversary work factor as a metric for information assurance},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366185},
  doi          = {10.1145/366173.366185},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SchudelW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/TempletonL00,
  author       = {Steven J. Templeton and
                  Karl E. Levitt},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A requires/provides model for computer attacks},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366187},
  doi          = {10.1145/366173.366187},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/TempletonL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Yasinsac00,
  author       = {Alec Yasinsac},
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Dynamic analysis of security protocols},
  booktitle    = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  pages        = {77--87},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173.366194},
  doi          = {10.1145/366173.366194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Yasinsac00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2000,
  editor       = {Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton,
                  Co. Cork, Ireland, September 18-21, 2000},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/366173},
  doi          = {10.1145/366173},
  isbn         = {1-58113-260-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ErlingssonS99,
  author       = {{\'{U}}lfar Erlingsson and
                  Fred B. Schneider},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {{SASI} enforcement of security policies: a retrospective},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {87--95},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335201},
  doi          = {10.1145/335169.335201},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ErlingssonS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Henning99,
  author       = {Ronda R. Henning},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Security service level agreements: quantifiable security for the enterprise?},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {54--60},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335194},
  doi          = {10.1145/335169.335194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Henning99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JonssonSL99,
  author       = {Erland Jonsson and
                  Lars Str{\"{o}}mberg and
                  Stefan Lindskog},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {On the functional relation between security and dependability impairments},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {104--111},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335204},
  doi          = {10.1145/335169.335204},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JonssonSL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LiRP99,
  author       = {Jun Li and
                  Peter L. Reiher and
                  Gerald J. Popek},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Securing information transmission by redundancy},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {112--117},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335205},
  doi          = {10.1145/335169.335205},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LiRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LipsonF99,
  author       = {Howard F. Lipson and
                  David A. Fisher},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Survivability - a new technical and business perspective on security},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {33--39},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335187},
  doi          = {10.1145/335169.335187},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LipsonF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MarkhamCD99,
  author       = {Tom Markham and
                  Dwight Colby and
                  Mary Denz},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Security modeling in the {COTS} environment},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {96--102},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335202},
  doi          = {10.1145/335169.335202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MarkhamCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McHughM99,
  author       = {John McHugh and
                  James Bret Michael},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Secure group management in large distributed systems: what is a group
                  and what does it do?},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {80--85},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335199},
  doi          = {10.1145/335169.335199},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McHughM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Olthoff99,
  author       = {Kenneth G. Olthoff},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {A cursory examination of market forces driving the use of protection
                  profiles},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335195},
  doi          = {10.1145/335169.335195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Olthoff99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Olthoff99a,
  author       = {Kenneth G. Olthoff},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Report on the discussion of "A cursory examination of market forces
                  driving the common criteria"},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {67--68},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335196},
  doi          = {10.1145/335169.335196},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Olthoff99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Olthoff99b,
  author       = {Kenneth G. Olthoff},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {The high assurance brake job - a cautionary tale in five scenes},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {118--140},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335206},
  doi          = {10.1145/335169.335206},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Olthoff99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Pancho99,
  author       = {Susan Pancho},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Paradigm shifts in protocol analysis},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {70--79},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335198},
  doi          = {10.1145/335169.335198},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Pancho99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Povey99,
  author       = {Dean Povey},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Optimistic security: a new access control paradigm},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335188},
  doi          = {10.1145/335169.335188},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Povey99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schneider99,
  author       = {Edward A. Schneider},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Security architecture-based system design},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {25--31},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335185},
  doi          = {10.1145/335169.335185},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schneider99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Timmerman99,
  author       = {Brenda Timmerman},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Secure dynamic adaptive traffic masking},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335184},
  doi          = {10.1145/335169.335184},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Timmerman99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WelchBR99,
  author       = {Donald J. Welch and
                  Nathan Buchheit and
                  Anthony Ruocco},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Discussion: strike back: offensive actions in information warfare},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {47--52},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335192},
  doi          = {10.1145/335169.335192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WelchBR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1999,
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169},
  doi          = {10.1145/335169},
  isbn         = {1-58113-149-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Abrams98,
  author       = {Marshall D. Abrams},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Security Engineering in an Evolutionary Acquisition Environment},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310902},
  doi          = {10.1145/310889.310902},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Abrams98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Beaver98,
  author       = {Donald Beaver},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Server-Assisted Cryptography},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {92--106},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310923},
  doi          = {10.1145/310889.310923},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Beaver98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChangM98,
  author       = {Liwu Chang and
                  Ira S. Moskowitz},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Parsimonious Downgrading and Decision Trees Applied to the Inference
                  Problem},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310921},
  doi          = {10.1145/310889.310921},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChangM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CowanP98,
  author       = {Crispin Cowan and
                  Calton Pu},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Death, Taxes, and Imperfact Software: Surviving the Inevitable},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {54--70},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310915},
  doi          = {10.1145/310889.310915},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CowanP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Foley98,
  author       = {Simon N. Foley},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Evaluating System Integrity},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {40--47},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310909},
  doi          = {10.1145/310889.310909},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Foley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Greenwald98,
  author       = {Steven J. Greenwald},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Discussion Topic: What is the Old Security Paradigm?},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310925},
  doi          = {10.1145/310889.310925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Greenwald98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Jonsson98,
  author       = {Erland Jonsson},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {An Integrated Framework for Security and Dependability},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {22--29},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310903},
  doi          = {10.1145/310889.310903},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Jonsson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Kahn98,
  author       = {Clifford E. Kahn},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Tolerating Penetrations and Insider Attacks by Requiring Independent
                  Corroboration},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {122--133},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310926},
  doi          = {10.1145/310889.310926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Kahn98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LinRM98,
  author       = {Meng{-}Jang Lin and
                  Aleta Ricciardi and
                  Keith Marzullo},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A New Model for Availability in the Face of Self-Propagating Attacks},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {134--137},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310928},
  doi          = {10.1145/310889.310928},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LinRM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott98,
  author       = {John P. McDermott},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity
                  Attacks},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {48--51},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310911},
  doi          = {10.1145/310889.310911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PhillipsS98,
  author       = {Cynthia A. Phillips and
                  Laura Painton Swiler},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {A Graph-based System for Network-vulnerability Analysis},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {71--79},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310919},
  doi          = {10.1145/310889.310919},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PhillipsS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RiechmannH98,
  author       = {Thomas Riechmann and
                  Franz J. Hauck},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Meta Objects for Access Control: a Formal Model for Role-Based Principals},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {30--38},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310906},
  doi          = {10.1145/310889.310906},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RiechmannH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlaterSSW98,
  author       = {Chris Slater and
                  O. Sami Saydjari and
                  Bruce Schneier and
                  Jim Wallner},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Toward a Secure System Engineering Methodolgy},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {2--10},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310900},
  doi          = {10.1145/310889.310900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SlaterSSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1998,
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889},
  doi          = {10.1145/310889},
  isbn         = {1-58113-168-2},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Abdul-RahmanH97,
  author       = {Alfarez Abdul{-}Rahman and
                  Stephen Hailes},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A distributed trust model},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {48--60},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283739},
  doi          = {10.1145/283699.283739},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Abdul-RahmanH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CheungL97,
  author       = {Steven Cheung and
                  Karl N. Levitt},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Protecting routing infrastructures from denial of service using cooperative
                  intrusion detection},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {94--106},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283744},
  doi          = {10.1145/283699.283744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CheungL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Essin97,
  author       = {Daniel J. Essin},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Patterns of trust and policy},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283738},
  doi          = {10.1145/283699.283738},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Essin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hinton97,
  author       = {Heather M. Hinton},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Under-specification, composition and emergent properties},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {83--93},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283743},
  doi          = {10.1145/283699.283743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hinton97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/KienzleW97,
  author       = {Darrell M. Kienzle and
                  William A. Wulf},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A practical approach to security assessment},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {5--16},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283731},
  doi          = {10.1145/283699.283731},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/KienzleW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MamboMO97,
  author       = {Masahiro Mambo and
                  Takanori Murayama and
                  Eiji Okamoto},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A tentative approach to constructing tamper-resistant software},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283736},
  doi          = {10.1145/283699.283736},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MamboMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows97,
  author       = {Catherine Meadows},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Three paradigms in computer security},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {34--37},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283737},
  doi          = {10.1145/283699.283737},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MoskowitzK97,
  author       = {Ira S. Moskowitz and
                  Myong H. Kang},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {An insecurity flow model},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {61--74},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283741},
  doi          = {10.1145/283699.283741},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MoskowitzK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Nelson97,
  author       = {Ruth Nelson},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Integrating formalism and pragmatism: architectural security},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283713},
  doi          = {10.1145/283699.283713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Nelson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RiechmannH97,
  author       = {Thomas Riechmann and
                  Franz J. Hauck},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Meta objects for access control: extending capability-based security},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283735},
  doi          = {10.1145/283699.283735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RiechmannH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SomayajiHF97,
  author       = {Anil Somayaji and
                  Steven A. Hofmeyr and
                  Stephanie Forrest},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Principles of a computer immune system},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {75--82},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283742},
  doi          = {10.1145/283699.283742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SomayajiHF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Timmerman97,
  author       = {Brenda Timmerman},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A security model for dynamic adaptive traffic masking},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283748},
  doi          = {10.1145/283699.283748},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Timmerman97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1997,
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699},
  doi          = {10.1145/283699},
  isbn         = {0-89791-986-6},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Baker96,
  author       = {Dixie B. Baker},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Fortresses built upon sand},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {148--153},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304886},
  doi          = {10.1145/304851.304886},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Baker96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Blakley96,
  author       = {Bob Blakley},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {The Emperor's old armor},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {2--16},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304855},
  doi          = {10.1145/304851.304855},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Blakley96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChuangW96,
  author       = {Shaw{-}Cheng Chuang and
                  Paul Wernick},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {A credibility-based model of computer system security},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304865},
  doi          = {10.1145/304851.304865},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChuangW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FilmanL96,
  author       = {Robert E. Filman and
                  Ted Linden},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {SafeBots: a paradigm for software security controls},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {45--51},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304863},
  doi          = {10.1145/304851.304863},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FilmanL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Greenwald96,
  author       = {Steven J. Greenwald},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {A new security policy for distributed resource management and access
                  control},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {74--86},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304870},
  doi          = {10.1145/304851.304870},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Greenwald96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hosmer96,
  author       = {Hilary H. Hosmer},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Availability policies in an adversarial environment},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {105--117},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304876},
  doi          = {10.1145/304851.304876},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hosmer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Josang96,
  author       = {Audun J{\o}sang},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {The right type of trust for distributed systems},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {119--131},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304877},
  doi          = {10.1145/304851.304877},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Josang96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Millen96,
  author       = {Jonathan K. Millen},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {{CAPSL:} Common Authentication Protocol Specification Language},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {132},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304879},
  doi          = {10.1145/304851.304879},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Millen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/NelsonS96,
  author       = {Ruth Nelson and
                  Elizabeth Schwartz},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Managing time for service and security},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {101--104},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304874},
  doi          = {10.1145/304851.304874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/NelsonS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/OlawskyFSS96,
  author       = {Duane E. Olawsky and
                  Todd Fine and
                  Edward A. Schneider and
                  Ray Spencer},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Developing and using a "policy neutral" access control policy},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {60--67},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304866},
  doi          = {10.1145/304851.304866},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/OlawskyFSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/OrmanS96,
  author       = {Hilarie K. Orman and
                  Richard Schroeppel},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Positive feedback and the madness of crowds},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {134--138},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304882},
  doi          = {10.1145/304851.304882},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/OrmanS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RasmussonJ96,
  author       = {Lars Rasmusson and
                  Sverker Janson},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Simulated social control for secure Internet commerce},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {18--25},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304857},
  doi          = {10.1145/304851.304857},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/RasmussonJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SerbanM96,
  author       = {Cristina Serban and
                  Bruce M. McMillin},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Run-time security evaluation: can we afford it?},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {68--72},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304868},
  doi          = {10.1145/304851.304868},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SerbanM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/VimercatiS96,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Access control in federated systems},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {87--99},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304871},
  doi          = {10.1145/304851.304871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/VimercatiS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Williams96,
  author       = {Jeff Williams},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Just sick about security},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {139--146},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304884},
  doi          = {10.1145/304851.304884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Williams96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WulfWK96,
  author       = {William A. Wulf and
                  Chenxi Wang and
                  Darrell M. Kienzle},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {A new model of security for distributed systems},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {34--43},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304860},
  doi          = {10.1145/304851.304860},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WulfWK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZurkoS96,
  author       = {Mary Ellen Zurko and
                  Richard T. Simon},
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {User-centered security},
  booktitle    = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  pages        = {27--33},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851.304859},
  doi          = {10.1145/304851.304859},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZurkoS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1996,
  editor       = {Tom Haigh and
                  Hilary H. Hosmer},
  title        = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead,
                  CA, USA, September 17-20, 1996},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/304851},
  doi          = {10.1145/304851},
  isbn         = {0-89791-944-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BaceS95,
  author       = {Rebecca G. Bace and
                  Marvin Schaefer},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {'TSUPDOOD?: Repackaged problems for you and {MMI}},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {2--10},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492338},
  doi          = {10.1109/NSPW.1995.492338},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/BaceS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BertinoS95,
  author       = {Elisa Bertino and
                  Pierangela Samarati},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Research issues in authorization models for hypertext systems},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {22--28},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492340},
  doi          = {10.1109/NSPW.1995.492340},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BertinoS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FletcherJLHMW95,
  author       = {Sharon K. Fletcher and
                  Roxana M. Jansma and
                  Judy J. Lim and
                  Ron Halbgewachs and
                  Martin D. Murphy and
                  Gregory D. Wyss},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Software system risk management and assurance},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {66--74},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492345},
  doi          = {10.1109/NSPW.1995.492345},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FletcherJLHMW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Ford95,
  author       = {William R. Ford},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Administration in a multiple policy/domain environment: the administration
                  and melding of disparate policies},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {42--52},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492343},
  doi          = {10.1109/NSPW.1995.492343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Ford95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Haigh95,
  author       = {Tom Haigh},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Virtual enterprises and the enterprise security architecture},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {53--64},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492344},
  doi          = {10.1109/NSPW.1995.492344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Haigh95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JonesCW95,
  author       = {Vicki Ellen Jones and
                  Neil Ching and
                  Marianne Winslett},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Credentials for privacy and interoperation},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {92--100},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492348},
  doi          = {10.1109/NSPW.1995.492348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JonesCW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows95,
  author       = {Catherine Meadows},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Applying the dependability paradigm to computer security},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {75--79},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492346},
  doi          = {10.1109/NSPW.1995.492346},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Nelson95,
  author       = {Ruth Nelson},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Unhelpfulness as a security policy: or it's about time},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {29--32},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492341},
  doi          = {10.1109/NSPW.1995.492341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Nelson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/NelsonH95,
  author       = {Ruth Nelson and
                  Hilary H. Hosmer},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Security for infinite networks},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {11--19},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492339},
  doi          = {10.1109/NSPW.1995.492339},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/NelsonH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/WilliamsSL95,
  author       = {Jeffrey R. Williams and
                  Marv Schaefer and
                  Douglas J. Landoll},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Pretty good assurance},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492347},
  doi          = {10.1109/NSPW.1995.492347},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/WilliamsSL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/YesbergA95,
  author       = {John D. Yesberg and
                  Mark S. Anderson},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {QuARC: expressive security mechanisms},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {34--40},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492342},
  doi          = {10.1109/NSPW.1995.492342},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/YesbergA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1995,
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/3552/proceeding},
  isbn         = {0-8186-7318-4},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Bell94,
  author       = {David Elliott Bell},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Modeling the "multipolicy machine"},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {2--9},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656208},
  doi          = {10.1109/NSPW.1994.656208},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Bell94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BertinoBS94,
  author       = {Elisa Bertino and
                  Claudio Bettini and
                  Pierangela Samarati},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {A discretionary access control model with temporal authorizations},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {102--107},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656246},
  doi          = {10.1109/NSPW.1994.656246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BertinoBS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CastanoMS94,
  author       = {Silvana Castano and
                  Giancarlo Martella and
                  Pierangela Samarati},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {A new approach to security system development},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {82--88},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656236},
  doi          = {10.1109/NSPW.1994.656236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CastanoMS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Dobson94,
  author       = {John Dobson},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Messages, communication, information security and value},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {10--19},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656215},
  doi          = {10.1109/NSPW.1994.656215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Dobson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/EssinL94,
  author       = {Daniel J. Essin and
                  Thomas L. Lincoln},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Healthcare information architecture: elements of a new paradigm},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {32--41},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656224},
  doi          = {10.1109/NSPW.1994.656224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/EssinL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Ferris94,
  author       = {Martin Ferris},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {New email security infrastructure},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {20--27},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656218},
  doi          = {10.1109/NSPW.1994.656218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Ferris94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hamilton94,
  author       = {Deborah Hamilton},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Providing non-hierarchical security through interface mechanisms},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656242},
  doi          = {10.1109/NSPW.1994.656242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hamilton94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LimogesNHB94,
  author       = {Charles G. Limoges and
                  Ruth R. Nelson and
                  John H. Heimann and
                  David S. Becker},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Versatile integrity and security environment {(VISE)} for computer
                  systems},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656252},
  doi          = {10.1109/NSPW.1994.656252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LimogesNHB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Lin94,
  author       = {T. Y. Lin},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Anomaly detection: a soft computing approach},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {44--53},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656226},
  doi          = {10.1109/NSPW.1994.656226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Lin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Lincoln94,
  author       = {Thomas L. Lincoln},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {"HIS-Treck - the next generation": an introduction to future hospital
                  information systems},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {28--31},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656222},
  doi          = {10.1109/NSPW.1994.656222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Lincoln94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Nelson94,
  author       = {Ruth Nelson},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {What is a secret - and - what does that have to do with computer security?},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {74--79},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656234},
  doi          = {10.1109/NSPW.1994.656234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Nelson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Ovchinnikov94,
  author       = {Sergei Ovchinnikov},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Fuzzy sets and secure computer systems},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {54--62},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656230},
  doi          = {10.1109/NSPW.1994.656230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Ovchinnikov94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schneier94,
  author       = {Bruce Schneier},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Designing encryption algorithms for real people},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {98--101},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656244},
  doi          = {10.1109/NSPW.1994.656244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schneier94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Spalka94,
  author       = {Adrian Spalka},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Formal semantics of confidentiality in multilevel logic databases},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {64--73},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656232},
  doi          = {10.1109/NSPW.1994.656232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Spalka94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1994,
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5272/proceeding},
  isbn         = {0-8186-6335-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Bailey93,
  author       = {David Bailey},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Managing complexity in secure networks},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {2--6},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283762},
  doi          = {10.1145/283751.283762},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Bailey93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Baker93,
  author       = {Dixie B. Baker},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {The evolved threat paradigm: look who's wearing the black hats!},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {126--130},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283804},
  doi          = {10.1145/283751.283804},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Baker93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Denning93,
  author       = {Dorothy E. Denning},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {A new paradigm for trusted systems},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {36--41},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283772},
  doi          = {10.1145/283751.283772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Denning93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Desmedt93,
  author       = {Yvo Desmedt},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Computer security by redefining what a computer is},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {160--166},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283834},
  doi          = {10.1145/283751.283834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Desmedt93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Dobson93,
  author       = {John Dobson},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {New security paradigms: what other concepts do we need as well?},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {7--18},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283765},
  doi          = {10.1145/283751.283765},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Dobson93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hammonds93,
  author       = {Grace L. Hammonds},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Confidentiality, integrity, assured service: tying security all together},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283775},
  doi          = {10.1145/283751.283775},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hammonds93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hosmer93,
  author       = {Hilary H. Hosmer},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {The multipolicy paradigm for trusted systems},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {19--32},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283768},
  doi          = {10.1145/283751.283768},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hosmer93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Hosmer93a,
  author       = {Hilary H. Hosmer},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy
                  paradigm},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283845},
  doi          = {10.1145/283751.283845},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Hosmer93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Howe93,
  author       = {Donald M. Howe},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Information system security engineering: a spiral approach to revolution},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {53--56},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283777},
  doi          = {10.1145/283751.283777},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Howe93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LaPadula93,
  author       = {Leonard J. LaPadula},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Prospect on security paradigms},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {62--68},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283781},
  doi          = {10.1145/283751.283781},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LaPadula93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LaPadulaW93,
  author       = {Leonard J. LaPadula and
                  James G. Williams},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {External consistency in a network environment},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {131--137},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283808},
  doi          = {10.1145/283751.283808},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/LaPadulaW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Lin93,
  author       = {T. Y. Lin},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Bell and LaPadula axioms: a "new" paradigm for an "old" model},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {82--93},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283789},
  doi          = {10.1145/283751.283789},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Lin93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Lin93a,
  author       = {T. Y. Lin},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Concurrent automata, database computers, and security: a "new" security
                  paradigm for secure parallel processing},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {94--104},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283792},
  doi          = {10.1145/283751.283792},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Lin93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McLean93,
  author       = {John McLean},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {New paradigms for high assurance software},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {42--47},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283773},
  doi          = {10.1145/283751.283773},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McLean93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows93,
  author       = {Catherine Meadows},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {An outline of a taxonomy of computer security research and development},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {33--35},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283770},
  doi          = {10.1145/283751.283770},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MichaelSL93,
  author       = {James Bret Michael and
                  Edgar H. Sibley and
                  David C. Littman},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Integration of formal and heuristic reasoning as a basis for testing
                  and debugging computer security policy},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {69--75},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283784},
  doi          = {10.1145/283751.283784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/MichaelSL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Rooker93,
  author       = {Terry Rooker},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Application level security using an object-oriented graphical user
                  interface},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {105--108},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283796},
  doi          = {10.1145/283751.283796},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Rooker93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Rooker93a,
  author       = {Terry Rooker},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {The reference monitor: an idea whose time has come},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {192--197},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283847},
  doi          = {10.1145/283751.283847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Rooker93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schaefer93,
  author       = {Marvin Schaefer},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {We need to think about the foundations of computer security},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {120--125},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283801},
  doi          = {10.1145/283751.283801},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schaefer93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Shockley93,
  author       = {W. R. Shockley},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Identification and authentication when users have multiple accounts},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {185--191},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283846},
  doi          = {10.1145/283751.283846},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Shockley93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Slack93,
  author       = {James M. Slack},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Security in an object-oriented database},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {155--159},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283831},
  doi          = {10.1145/283751.283831},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Slack93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Smith93,
  author       = {Mark Smith},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {The no-policy paradigm: towards a policy-free protocol supporting
                  a secure {X} Window System},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {109--117},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283798},
  doi          = {10.1145/283751.283798},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Smith93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/StrensD93,
  author       = {Ros Strens and
                  John E. Dobson},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {How responsibility modelling leads to security requirements},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {143--149},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283828},
  doi          = {10.1145/283751.283828},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/StrensD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Towards a task-based paradigm for flexible and adaptable access control
                  in distributed applications},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {138--142},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283810},
  doi          = {10.1145/283751.283810},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Thuraisingham93,
  author       = {Bhavani Thuraisingham},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Secure computing with the actor paradigm},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {76--81},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283788},
  doi          = {10.1145/283751.283788},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Thuraisingham93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Vazquez-Gomez93,
  author       = {Jos{\'{e}} de J. V{\'{a}}zquez{-}G{\'{o}}mez},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Modelling multidomain security},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {167--174},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283842},
  doi          = {10.1145/283751.283842},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Vazquez-Gomez93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Williams93,
  author       = {James G. Williams},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {A shift in security modeling paradigms},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {57--61},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283780},
  doi          = {10.1145/283751.283780},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Williams93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/YazdanianC93,
  author       = {Kioumars Yazdanian and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Neighborhood data and database security},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {150--154},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283829},
  doi          = {10.1145/283751.283829},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/YazdanianC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1993,
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751},
  doi          = {10.1145/283751},
  isbn         = {0-8186-5430-9},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics