Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/nspw:"
@inproceedings{DBLP:conf/nspw/AltHD23, author = {Florian Alt and Mariam Hassib and Verena Distler}, title = {Human-centered Behavioral and Physiological Security}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {48--61}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633504}, doi = {10.1145/3633500.3633504}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AltHD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Bradley023, author = {Conner Bradley and David Barrera}, title = {Escaping Vendor Mortality: {A} New Paradigm for Extending IoT Device Longevity}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {1--16}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633501}, doi = {10.1145/3633500.3633501}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Bradley023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChowdhuryR23, author = {Partha Das Chowdhury and Karen Renaud}, title = {'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {76--91}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633506}, doi = {10.1145/3633500.3633506}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChowdhuryR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FlechaisC23, author = {Ivan Flechais and George Chalhoub}, title = {Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {62--75}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633505}, doi = {10.1145/3633500.3633505}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FlechaisC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KockschS23, author = {Laura Anna Kocksch and Estrid S{\o}rensen}, title = {Towards a Typology of Interdisciplinarity in Cybersecurity: Trade, Choice, and Agnostic-Antagonist}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {116--129}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633510}, doi = {10.1145/3633500.3633510}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/KockschS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RamokapaneR23, author = {Kopo Marvin Ramokapane and Awais Rashid}, title = {ExD: Explainable Deletion}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {34--47}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633503}, doi = {10.1145/3633500.3633503}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RamokapaneR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SharevskiZ23, author = {Filipo Sharevski and Aziz N. Zeidieh}, title = {"I Just Didn't Notice It: " Experiences with Misinformation Warnings on Social Media amongst Users Who Are Low Vision or Blind}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {17--33}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633502}, doi = {10.1145/3633500.3633502}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SharevskiZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SimHKR23, author = {Mattea Sim and Kurt Hugenberg and Tadayoshi Kohno and Franziska Roesner}, title = {A Scalable Inclusive Security Intervention to Center Marginalized {\&} Vulnerable Populations in Security {\&} Privacy Design}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {102--115}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633508}, doi = {10.1145/3633500.3633508}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SimHKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/YangHKVD23, author = {Fangfei Yang and Weijie Huang and Kelly Kaoudis and Anjo Vahldiek{-}Oberwagner and Nathan Dautenhahn}, title = {Endoprocess: Programmable and Extensible Subprocess Isolation}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {92--101}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633507}, doi = {10.1145/3633500.3633507}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/YangHKVD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2023, title = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500}, doi = {10.1145/3633500}, timestamp = {Wed, 27 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BuckleyCB22, author = {Gerard Buckley and Tristan Caulfield and Ingolf Becker}, title = {"It may be a pain in the backside but..." Insights into the resilience of business after {GDPR}}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {21--34}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584320}, doi = {10.1145/3584318.3584320}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BuckleyCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChowdhuryHRR22, author = {Partha Das Chowdhury and Andr{\'{e}}s Dom{\'{\i}}nguez Hern{\'{a}}ndez and Kopo Marvin Ramokapane and Awais Rashid}, title = {From Utility to Capability: {A} New Paradigm to Conceptualize and Develop Inclusive PETs}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {60--74}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584323}, doi = {10.1145/3584318.3584323}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ChowdhuryHRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ClarkS22, author = {Michael Clark and Kent E. Seamons}, title = {Passwords and Cryptwords: The Final Limits on Lengths}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {75--89}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584324}, doi = {10.1145/3584318.3584324}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ClarkS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CliffordHLB22, author = {Michael Clifford and Miriam Heller and Karl N. Levitt and Matt Bishop}, title = {Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {90--103}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584325}, doi = {10.1145/3584318.3584325}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/CliffordHLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hicks22, author = {Alexander Hicks}, title = {Transparency, Compliance, And Contestability When Code Is(n't) Law}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {130--142}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584854}, doi = {10.1145/3584318.3584854}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Hicks22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LongF22, author = {Yan Long and Kevin Fu}, title = {Side Auth: Synthesizing Virtual Sensors for Authentication}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {35--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584321}, doi = {10.1145/3584318.3584321}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/LongF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MalchikF22, author = {Caleb Malchik and Joan Feigenbaum}, title = {Toward User Control over Information Access: {A} Sociotechnical Approach}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {117--129}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584327}, doi = {10.1145/3584318.3584327}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MalchikF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Malkin22, author = {Nathan Malkin}, title = {Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {104--116}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584326}, doi = {10.1145/3584318.3584326}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Malkin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RenaudSD22, author = {Karen Renaud and Rosalind Searle and Marc J. Dupuis}, title = {Cybersecurity Regrets: I've had a few.... Je Ne Regrette}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {1--20}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584319}, doi = {10.1145/3584318.3584319}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/RenaudSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SlesingerCPH22, author = {Ian Slesinger and Lizzie Coles{-}Kemp and Niki Panteli and Ren{\'{e}} Rydhof Hansen}, title = {Designing Through The Stack: The Case for a Participatory Digital Security By Design}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {45--59}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584322}, doi = {10.1145/3584318.3584322}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2022, title = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318}, doi = {10.1145/3584318}, isbn = {978-1-4503-9866-4}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AranovichWYKABF21, author = {Ra{\'{u}}l Aranovich and Muting Wu and Dian Yu and Katya Katsy and Benyamin Ahmadnia and Matthew Bishop and Vladimir Filkov and Kenji Sagae}, title = {Beyond {NVD:} Cybersecurity meets the Semantic Web}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {59--69}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3501259}, doi = {10.1145/3498891.3501259}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/AranovichWYKABF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GallagherTMF21, author = {Kevin Gallagher and Santiago Torres{-}Arias and Nasir D. Memon and Jessica Feldman}, title = {{COLBAC:} Shifting Cybersecurity from Hierarchical to Horizontal Designs}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {13--27}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3498903}, doi = {10.1145/3498891.3498903}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GallagherTMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HielscherKMS21, author = {Jonas Hielscher and Annette Kluge and Uta Menges and M. Angela Sasse}, title = {"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {108--122}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3498902}, doi = {10.1145/3498891.3498902}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HielscherKMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LavrenovsLK21, author = {Arturs Lavrenovs and {\'{E}}ireann Leverett and Aaron Kaplan}, title = {The tragedy of common bandwidth: rDDoS}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {43--58}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3500928}, doi = {10.1145/3498891.3500928}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/LavrenovsLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ParkinAW21, author = {Simon Parkin and Simon Arnell and Jeremy Ward}, title = {Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {28--42}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3498895}, doi = {10.1145/3498891.3498895}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ParkinAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RenaudSD21, author = {Karen Renaud and Rosalind Searle and Marc J. Dupuis}, title = {Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {70--87}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3498896}, doi = {10.1145/3498891.3498896}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/RenaudSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SharevskiJPJ21, author = {Filipo Sharevski and Peter Jachim and Emma Pieroni and Nate Jachim}, title = {VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information Discourse}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {88--107}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3498893}, doi = {10.1145/3498891.3498893}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SharevskiJPJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WoodsC21, author = {Daniel W. Woods and Aaron Ceross}, title = {Blessed Are The Lawyers, For They Shall Inherit Cybersecurity}, booktitle = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, pages = {1--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891.3501257}, doi = {10.1145/3498891.3501257}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WoodsC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2021, title = {{NSPW} '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3498891}, doi = {10.1145/3498891}, isbn = {978-1-4503-8573-2}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/000120, author = {Susan Landau}, title = {Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {1--19}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442171}, doi = {10.1145/3442167.3442171}, timestamp = {Fri, 05 Feb 2021 14:28:57 +0100}, biburl = {https://dblp.org/rec/conf/nspw/000120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AshendenO20, author = {Debi Ashenden and Gail Ollis}, title = {Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {34--44}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442178}, doi = {10.1145/3442167.3442178}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AshendenO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Brookes20, author = {Scott Brookes}, title = {Transcending the Teetering Tower of Trust: Demonstrated with Virtual Memory Fuses for Software Enclaves}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {90--98}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442168}, doi = {10.1145/3442167.3442168}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Brookes20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DabbourS20, author = {Nour Dabbour and Anil Somayaji}, title = {Towards In-Band Non-Cryptographic Authentication}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {20--33}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442180}, doi = {10.1145/3442167.3442180}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DabbourS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DistlerLLK20, author = {Verena Distler and Gabriele Lenzini and Carine Lallemand and Vincent Koenig}, title = {The Framework of Security-Enhancing Friction: How {UX} Can Help Users Behave More Securely}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {45--58}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442173}, doi = {10.1145/3442167.3442173}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/DistlerLLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JachimST20, author = {Peter Jachim and Filipo Sharevski and Paige Treebridge}, title = {TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the {COVID-19} Pandemic}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {59--75}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442169}, doi = {10.1145/3442167.3442169}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/JachimST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JoqueH20, author = {Justin Joque and S. M. Taiabul Haque}, title = {Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {99--110}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442170}, doi = {10.1145/3442167.3442170}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JoqueH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SingerB20, author = {Abe Singer and Matt Bishop}, title = {Trust-Based Security; Or, Trust Considered Harmful}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {76--89}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442179}, doi = {10.1145/3442167.3442179}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SingerB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SperoB20, author = {Eric Spero and Robert Biddle}, title = {Out of Sight, Out of Mind: {UI} Design and the Inhibition of Mental Models of Security}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {127--143}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442174}, doi = {10.1145/3442167.3442174}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SperoB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SpringGHV20, author = {Jonathan M. Spring and April Galyardt and Allen D. Householder and Nathan M. VanHoudnos}, title = {On managing vulnerabilities in {AI/ML} systems}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {111--126}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442177}, doi = {10.1145/3442167.3442177}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SpringGHV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2020, title = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167}, doi = {10.1145/3442167}, isbn = {978-1-4503-8995-2}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AddasTS19, author = {Alaadin Addas and Julie Thorpe and Amirali Salehi{-}Abari}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Towards models for quantifying the known adversary}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {103--117}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368869}, doi = {10.1145/3368860.3368869}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/AddasTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Ahmed-Rengers19, author = {Mansoor Ahmed{-}Rengers}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {FrameProv: towards end-to-end video provenance}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {68--77}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368866}, doi = {10.1145/3368860.3368866}, timestamp = {Wed, 22 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Ahmed-Rengers19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CapobiancoGHJKQ19, author = {Frank Capobianco and Rahul George and Kaiming Huang and Trent Jaeger and Srikanth V. Krishnamurthy and Zhiyun Qian and Mathias Payer and Paul L. Yu}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Employing attack graphs for intrusion detection}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {16--30}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368862}, doi = {10.1145/3368860.3368862}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CapobiancoGHJKQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CaulfieldSS19, author = {Tristan Caulfield and Jonathan M. Spring and M. Angela Sasse}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Why Jenny can't figure out which of these messages is a covert information operation}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {118--128}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368870}, doi = {10.1145/3368860.3368870}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/CaulfieldSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MalkinEW19, author = {Nathan Malkin and Serge Egelman and David A. Wagner}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Privacy controls for always-listening devices}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {78--91}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368867}, doi = {10.1145/3368860.3368867}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MalkinEW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ParkinPLT19, author = {Simon Parkin and Trupti Patel and Isabel Lopez{-}Neira and Leonie Maria Tanczer}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {1--15}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368861}, doi = {10.1145/3368860.3368861}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ParkinPLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Pieters19, author = {Wolter Pieters}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Everything-as-a-hack: claims-making for access to digital and social resources}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {92--102}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368868}, doi = {10.1145/3368860.3368868}, timestamp = {Wed, 22 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Pieters19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RenaudD19, author = {Karen Renaud and Marc J. Dupuis}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Cyber security fear appeals: unexpectedly complicated}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {42--56}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368864}, doi = {10.1145/3368860.3368864}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/RenaudD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SharevskiTW19, author = {Filipo Sharevski and Paige Treebridge and Jessica Westbrook}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {31--41}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368863}, doi = {10.1145/3368860.3368863}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SharevskiTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WestinC19, author = {Fiona Westin and Sonia Chiasson}, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm}, booktitle = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, pages = {57--67}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860.3368865}, doi = {10.1145/3368860.3368865}, timestamp = {Wed, 22 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WestinC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2019, editor = {Marco Carvalho and Wolter Pieters and Elizabeth Stobert}, title = {{NSPW} '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368860}, doi = {10.1145/3368860}, isbn = {978-1-4503-7647-1}, timestamp = {Wed, 22 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AnantharamanBFK18, author = {Prashant Anantharaman and J. Peter Brady and Patrick Flathers and Vijay H. Kothari and Michael C. Millian and Jason Reeves and Nathan Reitinger and William G. Nisen and Sean W. Smith}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Going Dark: {A} Retrospective on the North American Blackout of 2038}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {52--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285011}, doi = {10.1145/3285002.3285011}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/AnantharamanBFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopGL18, author = {Matt Bishop and Carrie Gates and Karl N. Levitt}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Augmenting Machine Learning with Argumentation}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {1--11}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285005}, doi = {10.1145/3285002.3285005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BurgessS18, author = {Mark Burgess and Anil Somayaji}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {After the BlockCLoud Apocalypse}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {103--109}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285012}, doi = {10.1145/3285002.3285012}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BurgessS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CerossS18, author = {Aaron Ceross and Andrew Simpson}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Rethinking the Proposition of Privacy Engineering}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {89--102}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285006}, doi = {10.1145/3285002.3285006}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/CerossS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DierkerR18, author = {Steve Dierker and Volker Roth}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Can Software Licenses Contribute to Cyberarms Control?}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {41--51}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285009}, doi = {10.1145/3285002.3285009}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/DierkerR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KarRGP18, author = {Diptendu Mohan Kar and Indrajit Ray and Jenna Gallegos and Jean Peccoud}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Digital Signatures to Ensure the Authenticity and Integrity of Synthetic {DNA} Molecules}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {110--122}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285007}, doi = {10.1145/3285002.3285007}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/KarRGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Padmos18, author = {Arne Padmos}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Against Mindset}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {12--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285004}, doi = {10.1145/3285002.3285004}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Padmos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Pieters18, author = {Wolter Pieters}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {On Security Singularities}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {80--88}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285008}, doi = {10.1145/3285002.3285008}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Pieters18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RooneyF18, author = {Vivien M. Rooney and Simon N. Foley}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {64--79}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285003}, doi = {10.1145/3285002.3285003}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/RooneyF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/TrowbridgeSW18, author = {Adam Trowbridge and Filipo Sharevski and Jessica Westbrook}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Malicious User Experience Design Research for Cybersecurity}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {123--130}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285010}, doi = {10.1145/3285002.3285010}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/TrowbridgeSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/VescentB18, author = {Heather Vescent and Bob Blakley}, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution}, booktitle = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, pages = {28--40}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002.3285013}, doi = {10.1145/3285002.3285013}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/VescentB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2018, editor = {Marco Carvalho and Matt Bishop and Anil Somayaji and Wolter Pieters and Mohammad Mannan}, title = {Proceedings of the New Security Paradigms Workshop, {NSPW} 2018, Windsor, UK, August 28-31, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285002}, doi = {10.1145/3285002}, isbn = {978-1-4503-6597-0}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BissiasLK17, author = {George Bissias and Brian Neil Levine and Nikunj Kapadia}, title = {Market-based Security for Distributed Applications}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {19--34}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171541}, doi = {10.1145/3171533.3171541}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BissiasLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GananCE17, author = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and Michael Ciere and Michel van Eeten}, title = {Beyond the pretty penny: the Economic Impact of Cybercrime}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {35--45}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171535}, doi = {10.1145/3171533.3171535}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/GananCE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MerrillCC17, author = {Nick Merrill and Max T. Curran and John Chuang}, title = {Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {70--79}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171537}, doi = {10.1145/3171533.3171537}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MerrillCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Obada-ObiehS17, author = {Borke Obada{-}Obieh and Anil Somayaji}, title = {Can {I} believe you?: Establishing Trust in Computer Mediated Introductions}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {94--106}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171544}, doi = {10.1145/3171533.3171544}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Obada-ObiehS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertBT17, author = {Sean Peisert and Matt Bishop and Edward B. Talbot}, title = {A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {80--89}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171536}, doi = {10.1145/3171533.3171536}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PieczulFZ17, author = {Olgierd Pieczul and Simon N. Foley and Mary Ellen Zurko}, title = {Developer-centered security and the symmetry of ignorance}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {46--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171539}, doi = {10.1145/3171533.3171539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PieczulFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RenaudW17, author = {Karen Renaud and Merrill Warkentin}, title = {Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {57--69}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171534}, doi = {10.1145/3171533.3171534}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RenaudW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RuotiS17, author = {Scott Ruoti and Kent E. Seamons}, title = {End-to-End Passwords}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {107--121}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171542}, doi = {10.1145/3171533.3171542}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/RuotiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SpringMP17, author = {Jonathan M. Spring and Tyler Moore and David J. Pym}, title = {Practicing a Science of Security: {A} Philosophy of Science Perspective}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {1--18}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171540}, doi = {10.1145/3171533.3171540}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SpringMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Wang17, author = {Yang Wang}, title = {The Third Wave?: Inclusive Privacy and Security}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {122--130}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171538}, doi = {10.1145/3171533.3171538}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Wang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WeberSSZ17, author = {Sam Weber and Adam Shostack and Jon A. Solworth and Mary Ellen Zurko}, title = {Panel: Empirically-based Secure {OS} Design}, booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, pages = {90--93}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533.3171543}, doi = {10.1145/3171533.3171543}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WeberSSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2017, title = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017, Santa Cruz, CA, USA, October 01-04, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171533}, doi = {10.1145/3171533}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AfanasyevHRSYZ016, author = {Alexander Afanasyev and J. Alex Halderman and Scott Ruoti and Kent E. Seamons and Yingdi Yu and Daniel Zappala and Lixia Zhang}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Content-based security for the web}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {49--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011890}, doi = {10.1145/3011883.3011890}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/AfanasyevHRSYZ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BalisaneM16, author = {Ranjbar A. Balisane and Andrew C. Martin}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Trusted execution environment-based authentication gauge \emph{(TEEBAG)}}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {61--67}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011892}, doi = {10.1145/3011883.3011892}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BalisaneM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BrookesT16, author = {Scott Brookes and Stephen Taylor}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Rethinking operating system design: asymmetric multiprocessing for security and performance}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {68--79}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011886}, doi = {10.1145/3011883.3011886}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BrookesT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChenBWEMCWFO16, author = {Aokun Chen and Pratik Prabhanjan Brahma and Dapeng Oliver Wu and Natalie C. Ebner and Brandon Matthews and Jedidiah R. Crandall and Xuetao Wei and Michalis Faloutsos and Daniela Oliveira}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {23--35}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011888}, doi = {10.1145/3011883.3011888}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ChenBWEMCWFO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FichtnerPT16, author = {Laura Fichtner and Wolter Pieters and Andr{\'{e}} Teixeira}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Cybersecurity as a \emph{Politikum}: implications of security discourses for infrastructures}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {36--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011887}, doi = {10.1145/3011883.3011887}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/FichtnerPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FioravantiBF16, author = {Mark E. Fioravanti II and Matt Bishop and Richard Ford}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {I'm not sure if we're okay: uncertainty for attackers and defenders}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {1--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011889}, doi = {10.1145/3011883.3011889}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/FioravantiBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HalawaBBCRS16, author = {Hassan Halawa and Konstantin Beznosov and Yazan Boshmaf and Baris Coskun and Matei Ripeanu and Elizeu Santos{-}Neto}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {11--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011885}, doi = {10.1145/3011883.3011885}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HalawaBBCRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HeitzenraterS16, author = {Chad Heitzenrater and Andrew C. Simpson}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {A case for the economics of secure software development}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {92--105}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011884}, doi = {10.1145/3011883.3011884}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/HeitzenraterS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LundquistMH16, author = {Gilmore R. Lundquist and Vishwath Mohan and Kevin W. Hamlen}, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Searching for software diversity: attaining artificial diversity through program synthesis}, booktitle = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, pages = {80--91}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883.3011891}, doi = {10.1145/3011883.3011891}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LundquistMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2016, editor = {Carrie Gates and Rainer B{\"{o}}hme and Mohammad Mannan and Serge Egelman}, title = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016, Granby, Colorado, USA, September 26-29, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011883}, doi = {10.1145/3011883}, isbn = {978-1-4503-4813-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BenensonLOPU15, author = {Zinaida Benenson and Gabriele Lenzini and Daniela Oliveira and Simon Parkin and Sven Uebelacker}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {85--99}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841120}, doi = {10.1145/2841113.2841120}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BenensonLOPU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BerisBS15, author = {Odette Beris and Adam Beautement and M. Angela Sasse}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {73--84}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841119}, doi = {10.1145/2841113.2841119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BerisBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EgelmanP15, author = {Serge Egelman and Eyal P{\'{e}}er}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {The Myth of the Average User: Improving Privacy and Security Systems through Individualization}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {16--28}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841115}, doi = {10.1145/2841113.2841115}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/EgelmanP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ElliottK15, author = {Aaron Elliott and Scott Knight}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Towards Managed Role Explosion}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {100--111}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841121}, doi = {10.1145/2841113.2841121}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ElliottK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ForgetCB15, author = {Alain Forget and Sonia Chiasson and Robert Biddle}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Choose Your Own Authentication}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {1--15}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841114}, doi = {10.1145/2841113.2841114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ForgetCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HallHCT15, author = {Peter Hall and Claude Heath and Lizzie Coles{-}Kemp and Axel Tanner}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Examining the Contribution of Critical Visualisation to Information Security}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {59--72}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841118}, doi = {10.1145/2841113.2841118}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/HallHCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HerleyP15, author = {Cormac Herley and Wolter Pieters}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {"If you were attacked, you'd be sorry": Counterfactuals as security arguments}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {112--123}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841122}, doi = {10.1145/2841113.2841122}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HerleyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HerrA15, author = {Trey Herr and Eric Armbrust}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Milware: Identification and Implications of State Authored Malicious Software}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {29--43}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841116}, doi = {10.1145/2841113.2841116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HerrA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HillD15, author = {Raquel Hill and Devan Ray Donaldson}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Bridging the Trust Gap: Integrating Models of Behavior and Perception}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {148--155}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841125}, doi = {10.1145/2841113.2841125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HillD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MannanSPR15, author = {Mohammad Mannan and Arash Shahkar and Atieh Saberi Pirouz and Vladimir Rabotka}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {124--136}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841123}, doi = {10.1145/2841113.2841123}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MannanSPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PelizziS15, author = {Riccardo Pelizzi and R. Sekar}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {WebSheets: Web Applications for Non-Programmers}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {137--147}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841124}, doi = {10.1145/2841113.2841124}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PelizziS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZengerZPPP15, author = {Christian T. Zenger and Jan Zimmer and Mario Pietersz and Jan{-}Felix Posielek and Christof Paar}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Exploiting the Physical Environment for Securing the Internet of Things}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {44--58}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841117}, doi = {10.1145/2841113.2841117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZengerZPPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2015, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113}, doi = {10.1145/2841113}, isbn = {978-1-4503-3754-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/0002SMM14, author = {Andrew M. White and Katherine Shaw and Fabian Monrose and Elliott Moreton}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {25--38}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683470}, doi = {10.1145/2683467.2683470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/0002SMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AlmeshekahS14, author = {Mohammed H. Almeshekah and Eugene H. Spafford}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Planning and Integrating Deception into Computer Security Defenses}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {127--138}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683482}, doi = {10.1145/2683467.2683482}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AlmeshekahS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CapposZORY14, author = {Justin Cappos and Yanyan Zhuang and Daniela Oliveira and Marissa Rosenthal and Kuo{-}Chuan Yeh}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {53--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683472}, doi = {10.1145/2683467.2683472}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CapposZORY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DunphyVCCVWMO14, author = {Paul Dunphy and John Vines and Lizzie Coles{-}Kemp and Rachel Clarke and Vasillis Vlachokyriakos and Peter C. Wright and John C. McCarthy and Patrick Olivier}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Understanding the Experience-Centeredness of Privacy and Security Technologies}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {83--94}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683475}, doi = {10.1145/2683467.2683475}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/DunphyVCCVWMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EdwardsLE14, author = {Benjamin Edwards and Michael E. Locasto and Jeremy Epstein}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Panel Summary: The Future of Software Regulation}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {117--126}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683478}, doi = {10.1145/2683467.2683478}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/EdwardsLE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GatesM14, author = {Carrie Gates and Peter Matthews}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Data Is the New Currency}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {105--116}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683477}, doi = {10.1145/2683467.2683477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GatesM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HustedM14, author = {Nathaniel Husted and Steven A. Myers}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Emergent Properties {\&} Security: The Complexity ofSecurity as a Science}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {1--14}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683468}, doi = {10.1145/2683467.2683468}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/HustedM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KuehnM14, author = {Andreas Kuehn and Milton Mueller}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {63--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683473}, doi = {10.1145/2683467.2683473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/KuehnM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PieczulFR14, author = {Olgierd Pieczul and Simon N. Foley and Vivien M. Rooney}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {I'm OK, You're OK, the System's {OK:} Normative Security for Systems}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {95--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683476}, doi = {10.1145/2683467.2683476}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PieczulFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PietersHD14, author = {Wolter Pieters and Dina Hadziosmanovic and Francien Dechesne}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Cyber Security as Social Experiment}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {15--24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683469}, doi = {10.1145/2683467.2683469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PietersHD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PollerTK14, author = {Andreas Poller and Sven T{\"{u}}rpe and Katharina Kinder{-}Kurlanda}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {69--82}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683474}, doi = {10.1145/2683467.2683474}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PollerTK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/StobertB14, author = {Elizabeth Stobert and Robert Biddle}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {A Password Manager that Doesn't Remember Passwords}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {39--52}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683471}, doi = {10.1145/2683467.2683471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/StobertB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2014, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2683467}, isbn = {978-1-4503-3062-6}, timestamp = {Fri, 16 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ArdBGS13, author = {Julie Boxwell Ard and Matt Bishop and Carrie Gates and Michael Xin Sun}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Information behaving badly}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {107--118}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535825}, doi = {10.1145/2535813.2535825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ArdBGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AshendenL13, author = {Debi Ashenden and Darren Lawrence}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Can we sell security like soap?: a new approach to behaviour change}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {87--94}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535823}, doi = {10.1145/2535813.2535823}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AshendenL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopBBGG13, author = {Matt Bishop and Emily Rine Butler and Kevin R. B. Butler and Carrie Gates and Steven Greenspan}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Forgive and forget: return to obscurity}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {1--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535814}, doi = {10.1145/2535813.2535814}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopBBGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Castro13, author = {Daniel Medeiros Nunes de Castro}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {{NSPHD:} the polyglot computer}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {121--122}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535827}, doi = {10.1145/2535813.2535827}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Castro13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChenKNSTTTVY13, author = {Binbin Chen and Zbigniew Kalbarczyk and David M. Nicol and William H. Sanders and Rui Tan and William G. Temple and Nils Ole Tippenhauer and An Hoa Vu and David K. Y. Yau}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Go with the flow: toward workflow-oriented security assessment}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {65--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535821}, doi = {10.1145/2535813.2535821}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChenKNSTTTVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CraneLBF13, author = {Stephen Crane and Per Larsen and Stefan Brunthaler and Michael Franz}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Booby trapping software}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {95--106}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535824}, doi = {10.1145/2535813.2535824}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/CraneLBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Durmuth13, author = {Markus D{\"{u}}rmuth}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Useful password hashing: how to waste computing cycles with style}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {31--40}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535817}, doi = {10.1145/2535813.2535817}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Durmuth13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EgelmanHO13, author = {Serge Egelman and Cormac Herley and Paul C. van Oorschot}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Markets for zero-day exploits: ethics and implications}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {41--46}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535818}, doi = {10.1145/2535813.2535818}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/EgelmanHO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MathurCB13, author = {Suhas Mathur and Baris Coskun and Suhrid Balakrishnan}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Detecting hidden enemy lines in {IP} address space}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {19--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535816}, doi = {10.1145/2535813.2535816}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MathurCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertTK13, author = {Sean Peisert and Edward B. Talbot and Tom M. Kroeger}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Principles of authentication}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {47--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535819}, doi = {10.1145/2535813.2535819}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PeisertTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RoweLH13, author = {Jeff Rowe and Karl N. Levitt and Mike Hogarth}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Towards the realization of a public health system for shared secure cyber-space}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535815}, doi = {10.1145/2535813.2535815}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RoweLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SomayajiMB13, author = {Anil Somayaji and David Mould and Carson Brown}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Towards narrative authentication: or, against boring authentication}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {57--64}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535820}, doi = {10.1145/2535813.2535820}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SomayajiMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Sundaramurthy13, author = {Sathya Chandran Sundaramurthy}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Designing forensic analysis techniques through anthropology}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {119--120}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535826}, doi = {10.1145/2535813.2535826}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Sundaramurthy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZhaoM13, author = {Lianying Zhao and Mohammad Mannan}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Explicit authentication response considered harmful}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {77--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535822}, doi = {10.1145/2535813.2535822}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ZhaoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2013, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2535813}, isbn = {978-1-4503-2582-0}, timestamp = {Fri, 31 Jan 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CrandallO12, author = {Jedidiah R. Crandall and Daniela Oliveira}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {141--152}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413309}, doi = {10.1145/2413296.2413309}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CrandallO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DongGCK12, author = {Zheng Dong and Vaibhav Garg and L. Jean Camp and Apu Kapadia}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Pools, clubs and security: designing for a party not a person}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {77--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413304}, doi = {10.1145/2413296.2413304}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DongGCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EdwardsMSHF12, author = {Benjamin Edwards and Tyler Moore and George Stelle and Steven A. Hofmeyr and Stephanie Forrest}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Beyond the blacklist: modeling malware spread and the effect of interventions}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {53--66}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413302}, doi = {10.1145/2413296.2413302}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/EdwardsMSHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FordM12, author = {Richard Ford and Liam M. Mayron}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {All your base are belong to {US}}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {105--114}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413306}, doi = {10.1145/2413296.2413306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FordM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GarrisonLH12, author = {William C. Garrison III and Adam J. Lee and Timothy L. Hinrichs}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {The need for application-aware access control evaluation}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {115--126}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413307}, doi = {10.1145/2413296.2413307}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/GarrisonLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LipfordZ12, author = {Heather Richter Lipford and Mary Ellen Zurko}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Someone to watch over me}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {67--76}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413303}, doi = {10.1145/2413296.2413303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LipfordZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MortonS12, author = {Anthony Morton and Martina Angela Sasse}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Privacy is a process, not a {PET:} a theory for effective privacy practice}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {87--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413305}, doi = {10.1145/2413296.2413305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MortonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertTB12, author = {Sean Peisert and Edward B. Talbot and Matt Bishop}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {15--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413299}, doi = {10.1145/2413296.2413299}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PietersVP12, author = {Wolter Pieters and Sanne H. G. van der Ven and Christian W. Probst}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {A move in the security measurement stalemate: elo-style ratings to quantify vulnerability}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {1--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413298}, doi = {10.1145/2413296.2413298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PietersVP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RoweLPSAJ12, author = {Jeff Rowe and Karl N. Levitt and Simon Parsons and Elizabeth Sklar and Andy Applebaum and Sharmin Jalal}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Argumentation logic to assist in security administration}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {43--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413301}, doi = {10.1145/2413296.2413301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RoweLPSAJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ThorpeSB12, author = {Julie Thorpe and Amirali Salehi{-}Abari and Robert Burden}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Video-passwords: advertising while authenticating}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {127--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413308}, doi = {10.1145/2413296.2413308}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ThorpeSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Turpe12, author = {Sven T{\"{u}}rpe}, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {Point-and-shoot security design: can we build better tools for developers?}, booktitle = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, pages = {27--42}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413296.2413300}, doi = {10.1145/2413296.2413300}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Turpe12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2012, editor = {Richard Ford and Mary Ellen Zurko and Cormac Herley and Tara Whalen}, title = {The New Security Paradigms Workshop, {NSPW} '12, Bertinoro, Italy - September 18 - 21, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2413296}, isbn = {978-1-4503-1794-8}, timestamp = {Mon, 17 Dec 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BicakciO11, author = {Kemal Bicakci and Paul C. van Oorschot}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {25--36}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073280}, doi = {10.1145/2073276.2073280}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BicakciO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopCFM11, author = {Matt Bishop and Marco M. Carvalho and Richard Ford and Liam M. Mayron}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Resilience is more than availability}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {95--104}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073286}, doi = {10.1145/2073276.2073286}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BishopCFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BohmeG11, author = {Rainer B{\"{o}}hme and Jens Grossklags}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {The security cost of cheap user interaction}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {67--82}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073284}, doi = {10.1145/2073276.2073284}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BohmeG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DuJTLC11, author = {Wenliang Du and Karthick Jayaraman and Xi Tan and Tongbo Luo and Steve J. Chapin}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Position paper: why are there so many vulnerabilities in web applications?}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {83--94}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073285}, doi = {10.1145/2073276.2073285}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DuJTLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Towards a formal model of accountability}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {45--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073282}, doi = {10.1145/2073276.2073282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FriedlandMSW11, author = {Gerald Friedland and Gregor Maier and Robin Sommer and Nicholas Weaver}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Sherlock holmes' evil twin: on the impact of global inference for online privacy}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {105--114}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073287}, doi = {10.1145/2073276.2073287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FriedlandMSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Gutmann11, author = {Peter Gutmann}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Applying problem-structuring methods to problems in computer security}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {37--44}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073281}, doi = {10.1145/2073276.2073281}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Gutmann11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HamacherK11, author = {Kay Hamacher and Stefan Katzenbeisser}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Public security: simulations need to replace conventional wisdom}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {115--124}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073288}, doi = {10.1145/2073276.2073288}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HamacherK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LocastoMD11, author = {Michael E. Locasto and Michael Massimi and Peter DePasquale}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Security and privacy considerations in digital death}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {1--10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073278}, doi = {10.1145/2073276.2073278}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LocastoMD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Pavlovic11, author = {Dusko Pavlovic}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Gaming security by obscurity}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {125--140}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073289}, doi = {10.1145/2073276.2073289}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Pavlovic11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PietersC11, author = {Wolter Pieters and Lizzie Coles{-}Kemp}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Reducing normative conflicts in information security}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {11--24}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073279}, doi = {10.1145/2073276.2073279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PietersC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WashR11, author = {Rick Wash and Emilee J. Rader}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Influencing mental models of security: a research agenda}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {57--66}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073283}, doi = {10.1145/2073276.2073283}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/WashR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2011, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2073276}, isbn = {978-1-4503-1078-9}, timestamp = {Tue, 13 Nov 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Al-SalehC10, author = {Mohammed I. Al{-}Saleh and Jedidiah R. Crandall}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {17--32}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900551}, doi = {10.1145/1900546.1900551}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Al-SalehC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopCPSBAFH10, author = {Matt Bishop and Justin Cummins and Sean Peisert and Anhad Singh and Bhume Bhumiratana and Deborah A. Agarwal and Deborah A. Frincke and Michael A. Hogarth}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Relationships and data sanitization: a study in scarlet}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {151--164}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900567}, doi = {10.1145/1900546.1900567}, timestamp = {Mon, 28 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopCPSBAFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BratusLRS10, author = {Sergey Bratus and Michael E. Locasto and Ashwin Ramaswamy and Sean W. Smith}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {VM-based security overkill: a lament for applied systems security research}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {51--60}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900554}, doi = {10.1145/1900546.1900554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BratusLRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Cleeff10, author = {Andr{\'{e}} van Cleeff}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {A risk management process for consumers: the next step in information security}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {107--114}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900561}, doi = {10.1145/1900546.1900561}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Cleeff10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Coles-KempK10, author = {Lizzie Coles{-}Kemp and Elahe Kani{-}Zabihi}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {On-line privacy and consent: a dialogue, not a monologue}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {95--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900560}, doi = {10.1145/1900546.1900560}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Coles-KempK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FailyF10, author = {Shamal Faily and Ivan Flechais}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {73--84}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900557}, doi = {10.1145/1900546.1900557}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FailyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Franz10, author = {Michael Franz}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {E unibus pluram: massive-scale software diversity as a defense mechanism}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {7--16}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900550}, doi = {10.1145/1900546.1900550}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Franz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LilienAO10, author = {Leszek Lilien and Adawia Al{-}Alawneh and Lotfi Ben Othmane}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {The pervasive trust foundation for security in next generation networks}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {129--142}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900564}, doi = {10.1145/1900546.1900564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LilienAO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MaxionLM10, author = {Roy A. Maxion and Thomas A. Longstaff and John McHugh}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Why is there no science in cyber science?: a panel discussion at {NSPW} 2010}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {1--6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900548}, doi = {10.1145/1900546.1900548}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MaxionLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MolnarEC10, author = {David Molnar and Serge Egelman and Nicolas Christin}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {This is your data on drugs: lessons computer security can learn from the drug war}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {143--149}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900566}, doi = {10.1145/1900546.1900566}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MooreFP10, author = {Tyler Moore and Allan Friedman and Ariel D. Procaccia}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {85--94}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900559}, doi = {10.1145/1900546.1900559}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MooreFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ParkinMIS10, author = {Simon E. Parkin and Aad P. A. van Moorsel and Philip Inglesant and Martina Angela Sasse}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {A stealth approach to usable security: helping {IT} security managers to identify workable security solutions}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {33--50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900553}, doi = {10.1145/1900546.1900553}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ParkinMIS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RaskinTH10, author = {Victor Raskin and Julia M. Taylor and Christian Hempelmann}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Ontological semantic technology for detecting insider threat and social engineering}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {115--128}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900563}, doi = {10.1145/1900546.1900563}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RaskinTH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SunBHB10, author = {San{-}Tsai Sun and Yazan Boshmaf and Kirstie Hawkey and Konstantin Beznosov}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {A billion keys, but few locks: the crisis of web single sign-on}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {61--72}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900556}, doi = {10.1145/1900546.1900556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SunBHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2010, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546}, doi = {10.1145/1900546}, isbn = {978-1-4503-0415-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopGH09, author = {Matt Bishop and Carrie Gates and Jeffrey Hunker}, editor = {Anil Somayaji and Richard Ford}, title = {The sisterhood of the traveling packets}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {59--70}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719039}, doi = {10.1145/1719030.1719039}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BishopGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChurchW09, author = {Luke Church and Alma Whitten}, editor = {Anil Somayaji and Richard Ford}, title = {Generative usability: security and user centered design beyond the appliance}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {51--58}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719038}, doi = {10.1145/1719030.1719038}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChurchW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GibsonRCM09, author = {Marcia Gibson and Karen Renaud and Marc Conrad and Carsten Maple}, editor = {Anil Somayaji and Richard Ford}, title = {Musipass: authenticating me softly with "my" song}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {85--100}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719043}, doi = {10.1145/1719030.1719043}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GibsonRCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Herley09, author = {Cormac Herley}, editor = {Anil Somayaji and Richard Ford}, title = {So long, and no thanks for the externalities: the rational rejection of security advice by users}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {133--144}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719050}, doi = {10.1145/1719030.1719050}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Herley09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JakobssonJ09, author = {Markus Jakobsson and Ari Juels}, editor = {Anil Somayaji and Richard Ford}, title = {Server-side detection of malware infection}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719033}, doi = {10.1145/1719030.1719033}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JohnsonBRS09, author = {Maritza L. Johnson and Steven M. Bellovin and Robert W. Reeder and Stuart E. Schechter}, editor = {Anil Somayaji and Richard Ford}, title = {Laissez-faire file sharing: access control designed for individuals at the endpoints}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719032}, doi = {10.1145/1719030.1719032}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JohnsonBRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KlineR09, author = {Erik Kline and Peter L. Reiher}, editor = {Anil Somayaji and Richard Ford}, title = {Securing data through avoidance routing}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {115--124}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719046}, doi = {10.1145/1719030.1719046}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/KlineR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MisraS09, author = {Janardan Misra and Indranil Saha}, editor = {Anil Somayaji and Richard Ford}, title = {A reinforcement model for collaborative security and Its formal analysis}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {101--114}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719045}, doi = {10.1145/1719030.1719045}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MisraS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertBCG09, author = {Sean Peisert and Matt Bishop and Laura Corriss and Steven J. Greenwald}, editor = {Anil Somayaji and Richard Ford}, title = {Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {71--84}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719041}, doi = {10.1145/1719030.1719041}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertBCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ProbstH09, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, editor = {Anil Somayaji and Richard Ford}, title = {Fluid information systems}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {125--132}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719048}, doi = {10.1145/1719030.1719048}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ProbstH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Turpe09, author = {Sven T{\"{u}}rpe}, editor = {Anil Somayaji and Richard Ford}, title = {What is the shape of your security policy?: security as a classification problem}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {23--36}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719035}, doi = {10.1145/1719030.1719035}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Turpe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Verendel09, author = {Vilhelm Verendel}, editor = {Anil Somayaji and Richard Ford}, title = {Quantified security is a weak hypothesis: a critical survey of results and assumptions}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {37--50}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719036}, doi = {10.1145/1719030.1719036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Verendel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2009, editor = {Anil Somayaji and Richard Ford}, title = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030}, doi = {10.1145/1719030}, isbn = {978-1-60558-845-2}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BeautementSW08, author = {Adam Beautement and Martina Angela Sasse and Mike Wonham}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {The compliance budget: managing security behaviour in organisations}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {47--58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595684}, doi = {10.1145/1595676.1595684}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BeautementSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BishopEPWG08, author = {Matt Bishop and Sophie Engle and Sean Peisert and Sean Whalen and Carrie Gates}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {We have met the enemy and he is us}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {1--12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595678}, doi = {10.1145/1595676.1595678}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BishopEPWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CrandallEFLS08, author = {Jedidiah R. Crandall and Roya Ensafi and Stephanie Forrest and Joshua Ladau and Bilal Shebaro}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {The ecology of Malware}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {99--106}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595692}, doi = {10.1145/1595676.1595692}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CrandallEFLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GreenwaldSFT08, author = {Steven J. Greenwald and Brian D. Snow and Richard Ford and Richard Thieme}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Towards an ethical code for information security?}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {75--87}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595689}, doi = {10.1145/1595676.1595689}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GreenwaldSFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HerleyF08, author = {Cormac Herley and Dinei A. F. Flor{\^{e}}ncio}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {A profitless endeavor: phishing as tragedy of the commons}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {59--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595686}, doi = {10.1145/1595676.1595686}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HerleyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Julisch08, author = {Klaus Julisch}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Security compliance: the next frontier in security research}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {71--74}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595687}, doi = {10.1145/1595676.1595687}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Julisch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LaurieS08, author = {Ben Laurie and Abe Singer}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Choose the red pill \emph{and} the blue pill: a position paper}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {127--133}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595695}, doi = {10.1145/1595676.1595695}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/LaurieS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MannanO08, author = {Mohammad Mannan and Paul C. van Oorschot}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Localization of credential information to address increasingly inevitable data breaches}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {13--21}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595680}, doi = {10.1145/1595676.1595680}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MannanO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MolloyCR08, author = {Ian M. Molloy and Pau{-}Chen Cheng and Pankaj Rohatgi}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Trading in risk: using markets to improve access control}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {107--125}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595694}, doi = {10.1145/1595676.1595694}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MolloyCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ShirleyE08, author = {Jeff Shirley and David Evans}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {The user is not the enemy: fighting malware by tracking user intentions}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {33--45}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595683}, doi = {10.1145/1595676.1595683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ShirleyE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WursterO08, author = {Glenn Wurster and Paul C. van Oorschot}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {The developer is the enemy}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {89--97}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595691}, doi = {10.1145/1595676.1595691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WursterO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZhaoCB08, author = {Hang Zhao and Chi{-}Kin Chau and Steven M. Bellovin}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {{ROFL:} routing as the firewall layer}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {23--31}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595681}, doi = {10.1145/1595676.1595681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZhaoCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2008, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676}, doi = {10.1145/1595676}, isbn = {978-1-60558-341-9}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Beaumont-GayER07, author = {Matt Beaumont{-}Gay and Kevin Eustice and Peter L. Reiher}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Information protection via environmental data tethers}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {67--73}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600188}, doi = {10.1145/1600176.1600188}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Beaumont-GayER07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChowGV07, author = {Stanley Chow and Christophe Gustave and Dmitri Vinokurov}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Authenticated names}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {23--32}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600181}, doi = {10.1145/1600176.1600181}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChowGV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EdwardsPS07, author = {W. Keith Edwards and Erika Shehan Poole and Jennifer Stoll}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Security automation considered harmful?}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {33--42}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600182}, doi = {10.1145/1600176.1600182}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/EdwardsPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hunker07, author = {Jeffrey Hunker}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {A privacy expectations and security assurance offer system}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {15--22}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600179}, doi = {10.1145/1600176.1600179}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hunker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KursaweK07, author = {Klaus Kursawe and Stefan Katzenbeisser}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Computing under occupation}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {81--88}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600191}, doi = {10.1145/1600176.1600191}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/KursaweK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Locasto07, author = {Michael E. Locasto}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Self-healing: science, engineering, and fiction}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {43--48}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600183}, doi = {10.1145/1600176.1600183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Locasto07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MannanO07, author = {Mohammad Mannan and Paul C. van Oorschot}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Security and usability: the gap in real-world online banking}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {1--14}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600178}, doi = {10.1145/1600176.1600178}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MannanO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/NaliOA07, author = {Deholo Nali and Paul C. van Oorschot and Andy Adler}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {89--101}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600192}, doi = {10.1145/1600176.1600192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/NaliOA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SankaranarayananCU07, author = {Vidyaraman Sankaranarayanan and Madhusudhanan Chandrasekaran and Shambhu J. Upadhyaya}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Position: the user is the enemy}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {75--80}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600189}, doi = {10.1145/1600176.1600189}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SankaranarayananCU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Solworth07, author = {Jon A. Solworth}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Robustly secure computer systems: a new security paradigm of system discontinuity}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {55--65}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600186}, doi = {10.1145/1600176.1600186}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Solworth07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SomayajiLF07, author = {Anil Somayaji and Michael E. Locasto and Jan Feyereisl}, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {The future of biologically-inspired security: is there anything left to learn?}, booktitle = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, pages = {49--54}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176.1600185}, doi = {10.1145/1600176.1600185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SomayajiLF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2006, editor = {Christian Hempelmann and Victor Raskin}, title = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, publisher = {{ACM}}, year = {2007}, url = {https://dl.acm.org/citation.cfm?id=1278940}, isbn = {978-1-59593-923-4}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2007, editor = {Konstantin Beznosov and Angelos D. Keromytis}, title = {Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, {USA} - September 18-21, 2007}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1600176}, doi = {10.1145/1600176}, isbn = {978-1-60558-080-7}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BondD06, author = {Mike Bond and George Danezis}, editor = {Christian Hempelmann and Victor Raskin}, title = {A pact with the devil}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {77--82}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278952}, timestamp = {Thu, 29 Nov 2018 11:17:10 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BondD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Conti06, author = {Gregory J. Conti}, editor = {Christian Hempelmann and Victor Raskin}, title = {Googling considered harmful}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {67--76}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278951}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Conti06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CrawfordBBCL06, author = {Rick Crawford and Matt Bishop and Bhume Bhumiratana and Lisa Clark and Karl N. Levitt}, editor = {Christian Hempelmann and Victor Raskin}, title = {Sanitization models and their limitations}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {41--56}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278948}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CrawfordBBCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FordG06, author = {Richard Ford and Sarah Gordon}, editor = {Christian Hempelmann and Victor Raskin}, title = {Cent, five cent, ten cent, dollar: hitting botnets where it \emph{really} hurts}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {3--10}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278942}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FordG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GatesT06, author = {Carrie Gates and Carol Taylor}, editor = {Christian Hempelmann and Victor Raskin}, title = {Challenging the anomaly detection paradigm: a provocative discussion}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {21--29}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278945}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GatesT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Greenwald06, author = {Steven J. Greenwald}, editor = {Christian Hempelmann and Victor Raskin}, title = {E-Prime for security: a new security paradigm}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {87--95}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278954}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Greenwald06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Gutmann06, author = {Peter Gutmann}, editor = {Christian Hempelmann and Victor Raskin}, title = {{PKI} design for the real world}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {109--116}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278958}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Gutmann06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LocastoSK06, author = {Michael E. Locasto and Angelos Stavrou and Angelos D. Keromytis}, editor = {Christian Hempelmann and Victor Raskin}, title = {Dark application communities}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {11--18}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278943}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LocastoSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/NeagoeB06, author = {Vicentiu Neagoe and Matt Bishop}, editor = {Christian Hempelmann and Victor Raskin}, title = {Inconsistency in deception for defense}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {31--38}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278946}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/NeagoeB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PorrasS06, author = {Phillip A. Porras and Vitaly Shmatikov}, editor = {Christian Hempelmann and Victor Raskin}, title = {Large-scale collection and sanitization of network security data: risks and challenges}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {57--64}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278949}, timestamp = {Thu, 29 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PorrasS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WangD06, author = {Wei Wang and Thomas E. Daniels}, editor = {Christian Hempelmann and Victor Raskin}, title = {Diffusion and graph spectral methods for network forensic analysis}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {99--106}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278956}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/WangD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Beznosov05, author = {Konstantin Beznosov}, editor = {Simon N. Foley}, title = {Flooding and recycling authorizations}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {67--72}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146285}, doi = {10.1145/1146269.1146285}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Beznosov05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Bishop05, author = {Matt Bishop}, editor = {Simon N. Foley}, title = {The insider problem revisited}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {75--76}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146287}, doi = {10.1145/1146269.1146287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Bishop05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Bishop05a, author = {Matt Bishop}, editor = {Simon N. Foley}, title = {Position: "insider" is relative}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {77--78}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146288}, doi = {10.1145/1146269.1146288}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Bishop05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FlechaisRS05, author = {Ivan Flechais and Jens Riegelsberger and Martina Angela Sasse}, editor = {Simon N. Foley}, title = {Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {33--41}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146280}, doi = {10.1145/1146269.1146280}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FlechaisRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FordBB05, author = {Richard Ford and Mark Bush and Alex Boulatov}, editor = {Simon N. Foley}, title = {Internet instability and disturbance: goal or menace?}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {3--8}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146271}, doi = {10.1145/1146269.1146271}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FordBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Littlewood05, author = {Bev Littlewood}, editor = {Simon N. Foley}, title = {"Diversity as a computer defense mechanism"}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {17--18}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146275}, doi = {10.1145/1146269.1146275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Littlewood05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LocastoSK05, author = {Michael E. Locasto and Stelios Sidiroglou and Angelos D. Keromytis}, editor = {Simon N. Foley}, title = {Speculative virtual verification: policy-constrained speculative execution}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {119--124}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146295}, doi = {10.1145/1146269.1146295}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LocastoSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MarceauJ05, author = {Carla Marceau and Robert A. Joyce}, editor = {Simon N. Foley}, title = {Empirical privilege profiling}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {111--118}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146294}, doi = {10.1145/1146269.1146294}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MarceauJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Maxion05, author = {Roy A. Maxion}, editor = {Simon N. Foley}, title = {Use of diversity as a defense mechanism}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {21--22}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146277}, doi = {10.1145/1146269.1146277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Maxion05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott05, author = {John P. McDermott}, editor = {Simon N. Foley}, title = {Visual security protocol modeling}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {97--109}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146293}, doi = {10.1145/1146269.1146293}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermott05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McHugh05, author = {John McHugh}, editor = {Simon N. Foley}, title = {Software diversity: \emph{use of diversity as a defense mechanism}}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {19--20}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146276}, doi = {10.1145/1146269.1146276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McHugh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Oorschot05, author = {Paul C. van Oorschot}, editor = {Simon N. Foley}, title = {Message authentication by integrity with public corroboration}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {57--63}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146283}, doi = {10.1145/1146269.1146283}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Oorschot05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PeisertKBM05, author = {Sean Peisert and Sidney Karin and Matt Bishop and Keith Marzullo}, editor = {Simon N. Foley}, title = {Principles-driven forensic analysis}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {85--93}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146291}, doi = {10.1145/1146269.1146291}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PeisertKBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ProbstGF05, author = {Christian W. Probst and Andreas Gal and Michael Franz}, editor = {Simon N. Foley}, title = {Average case vs. worst case: margins of safety in system design}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {25--32}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146279}, doi = {10.1145/1146269.1146279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ProbstGF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Schwarting05, author = {Irene Schwarting}, editor = {Simon N. Foley}, title = {Position paper}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {79--81}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146289}, doi = {10.1145/1146269.1146289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Schwarting05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Taylor05, author = {Carol Taylor}, editor = {Simon N. Foley}, title = {Diversity: the biological perspective position statement}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {15--16}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146274}, doi = {10.1145/1146269.1146274}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Taylor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/TaylorA05, author = {Carol Taylor and Jim Alves{-}Foss}, editor = {Simon N. Foley}, title = {Diversity as a computer defense mechanism}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {11--14}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146273}, doi = {10.1145/1146269.1146273}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/TaylorA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ThorpeOS05, author = {Julie Thorpe and Paul C. van Oorschot and Anil Somayaji}, editor = {Simon N. Foley}, title = {Pass-thoughts: authenticating with our minds}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {45--56}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146282}, doi = {10.1145/1146269.1146282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ThorpeOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2005, editor = {Simon N. Foley}, title = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269}, doi = {10.1145/1146269}, isbn = {1-59593-317-4}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Allwein04, author = {Gerard Allwein}, editor = {Christian Hempelmann and Victor Raskin}, title = {A qualitative framework for Shannon information theories}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {23--31}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066030}, doi = {10.1145/1065907.1066030}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Allwein04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BeznosovK04, author = {Konstantin Beznosov and Philippe Kruchten}, editor = {Christian Hempelmann and Victor Raskin}, title = {Towards agile security assurance}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {47--54}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066034}, doi = {10.1145/1065907.1066034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BeznosovK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DragovicC04, author = {Boris Dragovic and Jon Crowcroft}, editor = {Christian Hempelmann and Victor Raskin}, title = {Information exposure control through data manipulation for ubiquitous computing}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {57--64}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066036}, doi = {10.1145/1065907.1066036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DragovicC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FlinnS04, author = {Scott Flinn and Steve Stoyles}, editor = {Christian Hempelmann and Victor Raskin}, title = {Omnivore: risk management through bidirectional transparency}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {97--105}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066043}, doi = {10.1145/1065907.1066043}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FlinnS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GatesW04, author = {Carrie Gates and Tara Whalen}, editor = {Christian Hempelmann and Victor Raskin}, title = {Profiling the defenders}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {107--114}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066044}, doi = {10.1145/1065907.1066044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GatesW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GreenwaldORR04, author = {Steven J. Greenwald and Kenneth G. Olthoff and Victor Raskin and Willibald Ruch}, editor = {Christian Hempelmann and Victor Raskin}, title = {The user non-acceptance paradigm: INFOSEC's dirty little secret}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {35--43}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066032}, doi = {10.1145/1065907.1066032}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GreenwaldORR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HaldarF04, author = {Vivek Haldar and Michael Franz}, editor = {Christian Hempelmann and Victor Raskin}, title = {Symmetric behavior-based trust: a new paradigm for internet computing}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {79--84}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066039}, doi = {10.1145/1065907.1066039}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HaldarF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HollebeekW04, author = {Timothy Hollebeek and Rand Waltzman}, editor = {Christian Hempelmann and Victor Raskin}, title = {The role of suspicion in model-based intrusion detection}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {87--94}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066041}, doi = {10.1145/1065907.1066041}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HollebeekW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PopescuCT04, author = {Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Christian Hempelmann and Victor Raskin}, title = {Support for multi-level security policies in {DRM} architectures}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {3--9}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1065909}, doi = {10.1145/1065907.1065909}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PopescuCT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SadeghiS04, author = {Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Christian Hempelmann and Victor Raskin}, title = {Property-based attestation for computing platforms: caring about properties, not mechanisms}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {67--77}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066038}, doi = {10.1145/1065907.1066038}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SadeghiS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZhouF04, author = {Hongbin Zhou and Simon N. Foley}, editor = {Christian Hempelmann and Victor Raskin}, title = {A collaborative approach to autonomic security protocols}, booktitle = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, pages = {13--21}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907.1066029}, doi = {10.1145/1065907.1066029}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZhouF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2004, editor = {Christian Hempelmann and Victor Raskin}, title = {Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1065907}, doi = {10.1145/1065907}, isbn = {1-59593-076-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AlkassarSS03, author = {Ammar Alkassar and Christian St{\"{u}}ble and Ahmad{-}Reza Sadeghi}, editor = {Christian Hempelmann and Victor Raskin}, title = {Secure object identification: or: solving the Chess Grandmaster Problem}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {77--85}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986668}, doi = {10.1145/986655.986668}, timestamp = {Wed, 14 Nov 2018 10:52:51 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AlkassarSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BackesS03, author = {Michael Backes and Matthias Schunter}, editor = {Christian Hempelmann and Victor Raskin}, title = {From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {67--74}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986666}, doi = {10.1145/986655.986666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BackesS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BeresD03, author = {Yolanta Beres and Chris I. Dalton}, editor = {Christian Hempelmann and Victor Raskin}, title = {Dynamic label binding at run-time}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {39--46}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986662}, doi = {10.1145/986655.986662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BeresD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DuVarneyVB03, author = {Daniel C. DuVarney and V. N. Venkatakrishnan and Sandeep Bhatkar}, editor = {Christian Hempelmann and Victor Raskin}, title = {{SELF:} a transparent security extension for {ELF} binaries}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {29--38}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986661}, doi = {10.1145/986655.986661}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DuVarneyVB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EusticeKMPRR03, author = {Kevin Eustice and Leonard Kleinrock and Shane Markstrum and Gerald J. Popek and Venkatraman Ramakrishna and Peter L. Reiher}, editor = {Christian Hempelmann and Victor Raskin}, title = {Securing nomads: the case for quarantine, examination, and decontamination}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {123--128}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986673}, doi = {10.1145/986655.986673}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/EusticeKMPRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FlechaisSH03, author = {Ivan Flechais and Martina Angela Sasse and Stephen Hailes}, editor = {Christian Hempelmann and Victor Raskin}, title = {Bringing security home: a process for developing secure and usable systems}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {49--57}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986664}, doi = {10.1145/986655.986664}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FlechaisSH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GatesS03, author = {Carrie Gates and Jacob Slonim}, editor = {Christian Hempelmann and Victor Raskin}, title = {Owner-controlled information}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {103--111}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986670}, doi = {10.1145/986655.986670}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GatesS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JonesWOWE03, author = {K. Jones and Ashraf Wadaa and Stephan Olariu and Larry Wilson and Mohamed Eltoweissy}, editor = {Christian Hempelmann and Victor Raskin}, title = {Towards a new paradigm for securing wireless sensor networks}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {115--121}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986672}, doi = {10.1145/986655.986672}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JonesWOWE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermottKF03, author = {John P. McDermott and Anya Kim and Judith N. Froscher}, editor = {Christian Hempelmann and Victor Raskin}, title = {Merging paradigms of survivability and security: stochastic faults and designed faults}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {19--25}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986659}, doi = {10.1145/986655.986659}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermottKF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McHughG03, author = {John McHugh and Carrie Gates}, editor = {Christian Hempelmann and Victor Raskin}, title = {Locality: a new paradigm for thinking about normal behavior and outsider threat}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {3--10}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986657}, doi = {10.1145/986655.986657}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McHughG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MirkovicRR03, author = {Jelena Mirkovic and Max Robinson and Peter L. Reiher}, editor = {Christian Hempelmann and Victor Raskin}, title = {Alliance formation for DDoS defense}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {11--18}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986658}, doi = {10.1145/986655.986658}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MirkovicRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Perrin03, author = {Trevor Perrin}, editor = {Christian Hempelmann and Victor Raskin}, title = {Public key distribution through "cryptoIDs"}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {87--102}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986669}, doi = {10.1145/986655.986669}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Perrin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Ray03, author = {Arnab Ray}, editor = {Christian Hempelmann and Victor Raskin}, title = {Security check: a formal yet practical framework for secure software architecture}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {59--65}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986665}, doi = {10.1145/986655.986665}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Ray03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2003, editor = {Christian Hempelmann and Victor Raskin}, title = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655}, doi = {10.1145/986655}, isbn = {1-58113-880-6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AhamadMLOSLP02, author = {Mustaque Ahamad and Leo Mark and Wenke Lee and Edward Omicienski and Andre dos Santos and Ling Liu and Calton Pu}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Guarding the next Internet frontier: countering denial of information attacks}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {136--143}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844126}, doi = {10.1145/844102.844126}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AhamadMLOSLP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AshleyPS02, author = {Paul Ashley and Calvin Powers and Matthias Schunter}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {43--50}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844110}, doi = {10.1145/844102.844110}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AshleyPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BhattacharyyaHE02, author = {Manasi Bhattacharyya and Shlomo Hershkop and Eleazar Eskin}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {{MET:} an experimental system for Malicious Email Tracking}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {3--10}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844104}, doi = {10.1145/844102.844104}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BhattacharyyaHE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Blakley02, author = {Bob Blakley}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Assuring critical systems}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {110--112}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844122}, doi = {10.1145/844102.844122}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Blakley02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CapkunBH02, author = {Srdjan Capkun and Levente Butty{\'{a}}n and Jean{-}Pierre Hubaux}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Small worlds in security systems: an analysis of the {PGP} certificate graph}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {28--35}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844108}, doi = {10.1145/844102.844108}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CapkunBH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ConnellyC02, author = {Kay Connelly and Andrew A. Chien}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Breaking the barriers: high performance security for high performance computing}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {36--42}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844109}, doi = {10.1145/844102.844109}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ConnellyC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DourishR02, author = {Paul Dourish and David F. Redmiles}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {An approach to usable security based on event monitoring and visualization}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {75--81}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844116}, doi = {10.1145/844102.844116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DourishR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DuZ02, author = {Wenliang Du and Justin Zhijun Zhan}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {A practical approach to solve Secure Multi-party Computation problems}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {127--135}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844125}, doi = {10.1145/844102.844125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DuZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/GreenwaldS02, author = {Steven J. Greenwald and Marv Schaefer}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Assurance in life/nation critical endeavors a panel}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {91--96}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844119}, doi = {10.1145/844102.844119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/GreenwaldS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HaldarSF02, author = {Vivek Haldar and Christian H. Stork and Michael Franz}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {The source is the proof}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {69--73}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844114}, doi = {10.1145/844102.844114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/HaldarSF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/InoueF02, author = {Hajime Inoue and Stephanie Forrest}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Anomaly intrusion detection in dynamic execution environments}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {52--60}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844112}, doi = {10.1145/844102.844112}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/InoueF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Marceau02, author = {Carla Marceau}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {An evolutionary approach to cyber security}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {108--109}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844121}, doi = {10.1145/844102.844121}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Marceau02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MoskowitzCN02, author = {Ira S. Moskowitz and Liwu Chang and Richard E. Newman}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Capacity is the wrong paradigm}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {114--126}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844124}, doi = {10.1145/844102.844124}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MoskowitzCN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SmettersG02, author = {Diana K. Smetters and Rebecca E. Grinter}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Moving from the design of usable security technologies to the design of useful secure applications}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {82--89}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844117}, doi = {10.1145/844102.844117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SmettersG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/TaylorA02, author = {Carol Taylor and Jim Alves{-}Foss}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {An empirical analysis of {NATE:} Network Analysis of Anomalous Traffic Events}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {18--26}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844106}, doi = {10.1145/844102.844106}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/TaylorA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ToyoizumiK02, author = {Hiroshi Toyoizumi and Atsuhi Kara}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Predators: good will mobile codes combat against computer viruses}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {11--17}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844105}, doi = {10.1145/844102.844105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ToyoizumiK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/VenkatakrishnanPS02, author = {V. N. Venkatakrishnan and Ram Peri and R. Sekar}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Empowering mobile code using expressive security policies}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {61--68}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844113}, doi = {10.1145/844102.844113}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/VenkatakrishnanPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Williams02, author = {John Michael Williams}, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Biometrics or ... biohazards?}, booktitle = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, pages = {97--107}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102.844120}, doi = {10.1145/844102.844120}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Williams02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2002, editor = {Cristina Serban and Carla Marceau and Simon N. Foley}, title = {Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/844102}, doi = {10.1145/844102}, isbn = {1-58113-598-X}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BalacheffCPP01, author = {Boris Balacheff and Liqun Chen and David Plaquin and Graeme Proudler}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {A trusted process to digitally sign a document}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {79--86}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508184}, doi = {10.1145/508171.508184}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BalacheffCPP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BlakleyMG01, author = {Bob Blakley and Ellen McDermott and Daniel E. Geer Jr.}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Information security is information risk management}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {97--104}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508187}, doi = {10.1145/508171.508187}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BlakleyMG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BrostoffS01, author = {Sacha Brostoff and Martina Angela Sasse}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Safe and sound: a safety-critical approach to security}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {41--50}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508178}, doi = {10.1145/508171.508178}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BrostoffS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BruschiR01, author = {Danilo Bruschi and Emilia Rosti}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {AngeL: a tool to disarm computer systems}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {63--69}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508182}, doi = {10.1145/508171.508182}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BruschiR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DuA01, author = {Wenliang Du and Mikhail J. Atallah}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Secure multi-party computation problems and their applications: a review and open problems}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {13--22}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508174}, doi = {10.1145/508171.508174}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/DuA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FoleyM01, author = {Simon N. Foley and John P. Morrison}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Computational paradigms and protection}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {3--11}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508173}, doi = {10.1145/508171.508173}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FoleyM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Greenwald01, author = {Steven J. Greenwald}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {The New Security Paradigms Workshop - boom or bust?: a panel}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {107--111}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508189}, doi = {10.1145/508171.508189}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Greenwald01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hosmer01, author = {Hilary H. Hosmer}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Position statement for \emph{New Security Paradigms Workshop - boom or bust?}: neither boom nor bust}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {113}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508190}, doi = {10.1145/508171.508190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hosmer01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PalWS01, author = {Partha P. Pal and Franklin Webber and Richard E. Schantz}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Survival by defense-enabling}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {71--78}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508183}, doi = {10.1145/508171.508183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PalWS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RaskinHTN01, author = {Victor Raskin and Christian Hempelmann and Katrina E. Triezenberg and Sergei Nirenburg}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Ontology in information security: a useful theoretical foundation and methodological tool}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {53--59}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508180}, doi = {10.1145/508171.508180}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RaskinHTN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Schaefer01, author = {Marvin Schaefer}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {The New Security Paradigms Workshop - boom or bust?: thinking in an age of instant communication; communicating in a time of reflective thought}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {119--123}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508192}, doi = {10.1145/508171.508192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Schaefer01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SekarRRS01, author = {R. Sekar and C. R. Ramakrishnan and I. V. Ramakrishnan and Scott A. Smolka}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Model-Carrying Code {(MCC):} a new paradigm for mobile-code security}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {23--30}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508175}, doi = {10.1145/508171.508175}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SekarRRS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WeirichS01, author = {Dirk Weirich and Martina Angela Sasse}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Pretty good persuasion: a first step towards effective password security in the real world}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {137--143}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508195}, doi = {10.1145/508171.508195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WeirichS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Yan01, author = {Jeff Jianxin Yan}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {A note on proactive password checking}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {127--135}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508194}, doi = {10.1145/508171.508194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Yan01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZhangVALD01, author = {Yongguang Zhang and Harrick M. Vin and Lorenzo Alvisi and Wenke Lee and Son K. Dao}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Heterogeneous networking: a new survivability paradigm}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {33--39}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508177}, doi = {10.1145/508171.508177}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZhangVALD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Zurko01, author = {Mary Ellen Zurko}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Tracking influence through citation index comparisons and preliminary case studies panel position statement}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {115--117}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508191}, doi = {10.1145/508171.508191}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Zurko01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2001, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171}, doi = {10.1145/508171}, isbn = {1-58113-457-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/AtallahMRN00, author = {Mikhail J. Atallah and Craig J. McDonough and Victor Raskin and Sergei Nirenburg}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Natural language processing for information assurance and security: an overview and implementations}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {51--65}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366190}, doi = {10.1145/366173.366190}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/AtallahMRN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BruschiR00, author = {Danilo Bruschi and Emilia Rosti}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Disarming offense to facilitate defense}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {69--75}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366192}, doi = {10.1145/366173.366192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BruschiR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DanielsS00, author = {Thomas E. Daniels and Eugene H. Spafford}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Network traffic tracking systems: folly in the large?}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {119--124}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366200}, doi = {10.1145/366173.366200}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DanielsS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Foley00, author = {Simon N. Foley}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Conduit cascades and secure synchronization}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {141--150}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366205}, doi = {10.1145/366173.366205}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Foley00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/IrvineL00, author = {Cynthia E. Irvine and Timothy E. Levin}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Quality of security service}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {91--99}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366195}, doi = {10.1145/366173.366195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/IrvineL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Kahn00, author = {Clifford E. Kahn}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Incentives to help stop floods}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {127--132}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366202}, doi = {10.1145/366173.366202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Kahn00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Marceau00, author = {Carla Marceau}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Characterizing the behavior of a program using multiple-length N-grams}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {101--110}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366197}, doi = {10.1145/366173.366197}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Marceau00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott00, author = {James P. McDermott}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Attack net penetration testing}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {15--21}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366183}, doi = {10.1145/366173.366183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermott00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MoskowitzLC00, author = {Ira S. Moskowitz and Garth E. Longdon and Liwu Chang}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {A new paradigm hidden in steganography}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {41--50}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366189}, doi = {10.1145/366173.366189}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MoskowitzLC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Olthoff00, author = {Kenneth G. Olthoff}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Reflections on ratings}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {111--116}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366198}, doi = {10.1145/366173.366198}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Olthoff00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PerrineS00, author = {Tom Perrine and Abe Singer}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {New paradigms in incident management}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {133--138}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366204}, doi = {10.1145/366173.366204}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/PerrineS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Rannenberg00, author = {Kai Rannenberg}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Multilateral security a concept and examples for balanced security}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {151--162}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366208}, doi = {10.1145/366173.366208}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Rannenberg00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SchudelW00, author = {Gregg Schudel and Bradley Wood}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Adversary work factor as a metric for information assurance}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {23--30}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366185}, doi = {10.1145/366173.366185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SchudelW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/TempletonL00, author = {Steven J. Templeton and Karl E. Levitt}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {A requires/provides model for computer attacks}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {31--38}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366187}, doi = {10.1145/366173.366187}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/TempletonL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Yasinsac00, author = {Alec Yasinsac}, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Dynamic analysis of security protocols}, booktitle = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, pages = {77--87}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173.366194}, doi = {10.1145/366173.366194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Yasinsac00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/2000, editor = {Mary Ellen Zurko and Steven J. Greenwald}, title = {Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/366173}, doi = {10.1145/366173}, isbn = {1-58113-260-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ErlingssonS99, author = {{\'{U}}lfar Erlingsson and Fred B. Schneider}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {{SASI} enforcement of security policies: a retrospective}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {87--95}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335201}, doi = {10.1145/335169.335201}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ErlingssonS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Henning99, author = {Ronda R. Henning}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Security service level agreements: quantifiable security for the enterprise?}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {54--60}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335194}, doi = {10.1145/335169.335194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Henning99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JonssonSL99, author = {Erland Jonsson and Lars Str{\"{o}}mberg and Stefan Lindskog}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {On the functional relation between security and dependability impairments}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {104--111}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335204}, doi = {10.1145/335169.335204}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JonssonSL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LiRP99, author = {Jun Li and Peter L. Reiher and Gerald J. Popek}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Securing information transmission by redundancy}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {112--117}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335205}, doi = {10.1145/335169.335205}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/LiRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LipsonF99, author = {Howard F. Lipson and David A. Fisher}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Survivability - a new technical and business perspective on security}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {33--39}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335187}, doi = {10.1145/335169.335187}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LipsonF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MarkhamCD99, author = {Tom Markham and Dwight Colby and Mary Denz}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Security modeling in the {COTS} environment}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {96--102}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335202}, doi = {10.1145/335169.335202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MarkhamCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McHughM99, author = {John McHugh and James Bret Michael}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Secure group management in large distributed systems: what is a group and what does it do?}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {80--85}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335199}, doi = {10.1145/335169.335199}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McHughM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Olthoff99, author = {Kenneth G. Olthoff}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {A cursory examination of market forces driving the use of protection profiles}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {61--66}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335195}, doi = {10.1145/335169.335195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Olthoff99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Olthoff99a, author = {Kenneth G. Olthoff}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Report on the discussion of "A cursory examination of market forces driving the common criteria"}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {67--68}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335196}, doi = {10.1145/335169.335196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Olthoff99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Olthoff99b, author = {Kenneth G. Olthoff}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {The high assurance brake job - a cautionary tale in five scenes}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {118--140}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335206}, doi = {10.1145/335169.335206}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Olthoff99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Pancho99, author = {Susan Pancho}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Paradigm shifts in protocol analysis}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {70--79}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335198}, doi = {10.1145/335169.335198}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Pancho99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Povey99, author = {Dean Povey}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Optimistic security: a new access control paradigm}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {40--45}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335188}, doi = {10.1145/335169.335188}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Povey99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Schneider99, author = {Edward A. Schneider}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Security architecture-based system design}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {25--31}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335185}, doi = {10.1145/335169.335185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Schneider99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Timmerman99, author = {Brenda Timmerman}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Secure dynamic adaptive traffic masking}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {13--24}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335184}, doi = {10.1145/335169.335184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Timmerman99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WelchBR99, author = {Donald J. Welch and Nathan Buchheit and Anthony Ruocco}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Discussion: strike back: offensive actions in information warfare}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {47--52}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335192}, doi = {10.1145/335169.335192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WelchBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1999, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169}, doi = {10.1145/335169}, isbn = {1-58113-149-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Abrams98, author = {Marshall D. Abrams}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Security Engineering in an Evolutionary Acquisition Environment}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {11--20}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310902}, doi = {10.1145/310889.310902}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Abrams98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Beaver98, author = {Donald Beaver}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Server-Assisted Cryptography}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {92--106}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310923}, doi = {10.1145/310889.310923}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Beaver98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChangM98, author = {Liwu Chang and Ira S. Moskowitz}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Parsimonious Downgrading and Decision Trees Applied to the Inference Problem}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {82--89}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310921}, doi = {10.1145/310889.310921}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChangM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CowanP98, author = {Crispin Cowan and Calton Pu}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Death, Taxes, and Imperfact Software: Surviving the Inevitable}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {54--70}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310915}, doi = {10.1145/310889.310915}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CowanP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Foley98, author = {Simon N. Foley}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Evaluating System Integrity}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {40--47}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310909}, doi = {10.1145/310889.310909}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Foley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Greenwald98, author = {Steven J. Greenwald}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Discussion Topic: What is the Old Security Paradigm?}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {107--118}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310925}, doi = {10.1145/310889.310925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Greenwald98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Jonsson98, author = {Erland Jonsson}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {An Integrated Framework for Security and Dependability}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {22--29}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310903}, doi = {10.1145/310889.310903}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Jonsson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Kahn98, author = {Clifford E. Kahn}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {122--133}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310926}, doi = {10.1145/310889.310926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Kahn98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LinRM98, author = {Meng{-}Jang Lin and Aleta Ricciardi and Keith Marzullo}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {A New Model for Availability in the Face of Self-Propagating Attacks}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {134--137}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310928}, doi = {10.1145/310889.310928}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LinRM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott98, author = {John P. McDermott}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {48--51}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310911}, doi = {10.1145/310889.310911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermott98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PhillipsS98, author = {Cynthia A. Phillips and Laura Painton Swiler}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {A Graph-based System for Network-vulnerability Analysis}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {71--79}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310919}, doi = {10.1145/310889.310919}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PhillipsS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RiechmannH98, author = {Thomas Riechmann and Franz J. Hauck}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Meta Objects for Access Control: a Formal Model for Role-Based Principals}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {30--38}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310906}, doi = {10.1145/310889.310906}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RiechmannH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SlaterSSW98, author = {Chris Slater and O. Sami Saydjari and Bruce Schneier and Jim Wallner}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Toward a Secure System Engineering Methodolgy}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {2--10}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310900}, doi = {10.1145/310889.310900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SlaterSSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1998, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889}, doi = {10.1145/310889}, isbn = {1-58113-168-2}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Abdul-RahmanH97, author = {Alfarez Abdul{-}Rahman and Stephen Hailes}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A distributed trust model}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {48--60}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283739}, doi = {10.1145/283699.283739}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Abdul-RahmanH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CheungL97, author = {Steven Cheung and Karl N. Levitt}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Protecting routing infrastructures from denial of service using cooperative intrusion detection}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {94--106}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283744}, doi = {10.1145/283699.283744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CheungL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Essin97, author = {Daniel J. Essin}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Patterns of trust and policy}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {38--47}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283738}, doi = {10.1145/283699.283738}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Essin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hinton97, author = {Heather M. Hinton}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Under-specification, composition and emergent properties}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {83--93}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283743}, doi = {10.1145/283699.283743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hinton97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/KienzleW97, author = {Darrell M. Kienzle and William A. Wulf}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A practical approach to security assessment}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {5--16}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283731}, doi = {10.1145/283699.283731}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/KienzleW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MamboMO97, author = {Masahiro Mambo and Takanori Murayama and Eiji Okamoto}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A tentative approach to constructing tamper-resistant software}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {23--33}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283736}, doi = {10.1145/283699.283736}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MamboMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows97, author = {Catherine Meadows}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Three paradigms in computer security}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {34--37}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283737}, doi = {10.1145/283699.283737}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MoskowitzK97, author = {Ira S. Moskowitz and Myong H. Kang}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {An insecurity flow model}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {61--74}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283741}, doi = {10.1145/283699.283741}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MoskowitzK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Nelson97, author = {Ruth Nelson}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Integrating formalism and pragmatism: architectural security}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {1--4}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283713}, doi = {10.1145/283699.283713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Nelson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RiechmannH97, author = {Thomas Riechmann and Franz J. Hauck}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Meta objects for access control: extending capability-based security}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {17--22}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283735}, doi = {10.1145/283699.283735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RiechmannH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SomayajiHF97, author = {Anil Somayaji and Steven A. Hofmeyr and Stephanie Forrest}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Principles of a computer immune system}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {75--82}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283742}, doi = {10.1145/283699.283742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SomayajiHF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Timmerman97, author = {Brenda Timmerman}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A security model for dynamic adaptive traffic masking}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {107--116}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283748}, doi = {10.1145/283699.283748}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Timmerman97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1997, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699}, doi = {10.1145/283699}, isbn = {0-89791-986-6}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Baker96, author = {Dixie B. Baker}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Fortresses built upon sand}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {148--153}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304886}, doi = {10.1145/304851.304886}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Baker96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Blakley96, author = {Bob Blakley}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {The Emperor's old armor}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {2--16}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304855}, doi = {10.1145/304851.304855}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Blakley96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChuangW96, author = {Shaw{-}Cheng Chuang and Paul Wernick}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {A credibility-based model of computer system security}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {53--58}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304865}, doi = {10.1145/304851.304865}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChuangW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FilmanL96, author = {Robert E. Filman and Ted Linden}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {SafeBots: a paradigm for software security controls}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {45--51}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304863}, doi = {10.1145/304851.304863}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FilmanL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Greenwald96, author = {Steven J. Greenwald}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {A new security policy for distributed resource management and access control}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {74--86}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304870}, doi = {10.1145/304851.304870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Greenwald96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hosmer96, author = {Hilary H. Hosmer}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Availability policies in an adversarial environment}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {105--117}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304876}, doi = {10.1145/304851.304876}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hosmer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Josang96, author = {Audun J{\o}sang}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {The right type of trust for distributed systems}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {119--131}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304877}, doi = {10.1145/304851.304877}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Josang96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Millen96, author = {Jonathan K. Millen}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {{CAPSL:} Common Authentication Protocol Specification Language}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {132}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304879}, doi = {10.1145/304851.304879}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Millen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/NelsonS96, author = {Ruth Nelson and Elizabeth Schwartz}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Managing time for service and security}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {101--104}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304874}, doi = {10.1145/304851.304874}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/NelsonS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/OlawskyFSS96, author = {Duane E. Olawsky and Todd Fine and Edward A. Schneider and Ray Spencer}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Developing and using a "policy neutral" access control policy}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {60--67}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304866}, doi = {10.1145/304851.304866}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/OlawskyFSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/OrmanS96, author = {Hilarie K. Orman and Richard Schroeppel}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Positive feedback and the madness of crowds}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {134--138}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304882}, doi = {10.1145/304851.304882}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/OrmanS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/RasmussonJ96, author = {Lars Rasmusson and Sverker Janson}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Simulated social control for secure Internet commerce}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {18--25}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304857}, doi = {10.1145/304851.304857}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/RasmussonJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SerbanM96, author = {Cristina Serban and Bruce M. McMillin}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Run-time security evaluation: can we afford it?}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {68--72}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304868}, doi = {10.1145/304851.304868}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SerbanM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/VimercatiS96, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Access control in federated systems}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {87--99}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304871}, doi = {10.1145/304851.304871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/VimercatiS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Williams96, author = {Jeff Williams}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Just sick about security}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {139--146}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304884}, doi = {10.1145/304851.304884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Williams96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WulfWK96, author = {William A. Wulf and Chenxi Wang and Darrell M. Kienzle}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {A new model of security for distributed systems}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {34--43}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304860}, doi = {10.1145/304851.304860}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WulfWK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZurkoS96, author = {Mary Ellen Zurko and Richard T. Simon}, editor = {Tom Haigh and Hilary H. Hosmer}, title = {User-centered security}, booktitle = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, pages = {27--33}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851.304859}, doi = {10.1145/304851.304859}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZurkoS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1996, editor = {Tom Haigh and Hilary H. Hosmer}, title = {Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/304851}, doi = {10.1145/304851}, isbn = {0-89791-944-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BaceS95, author = {Rebecca G. Bace and Marvin Schaefer}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {'TSUPDOOD?: Repackaged problems for you and {MMI}}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {2--10}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492338}, doi = {10.1109/NSPW.1995.492338}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BaceS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BertinoS95, author = {Elisa Bertino and Pierangela Samarati}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Research issues in authorization models for hypertext systems}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {22--28}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492340}, doi = {10.1109/NSPW.1995.492340}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BertinoS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FletcherJLHMW95, author = {Sharon K. Fletcher and Roxana M. Jansma and Judy J. Lim and Ron Halbgewachs and Martin D. Murphy and Gregory D. Wyss}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Software system risk management and assurance}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {66--74}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492345}, doi = {10.1109/NSPW.1995.492345}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FletcherJLHMW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Ford95, author = {William R. Ford}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Administration in a multiple policy/domain environment: the administration and melding of disparate policies}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {42--52}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492343}, doi = {10.1109/NSPW.1995.492343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Ford95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Haigh95, author = {Tom Haigh}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Virtual enterprises and the enterprise security architecture}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {53--64}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492344}, doi = {10.1109/NSPW.1995.492344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Haigh95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JonesCW95, author = {Vicki Ellen Jones and Neil Ching and Marianne Winslett}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Credentials for privacy and interoperation}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {92--100}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492348}, doi = {10.1109/NSPW.1995.492348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JonesCW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows95, author = {Catherine Meadows}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Applying the dependability paradigm to computer security}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {75--79}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492346}, doi = {10.1109/NSPW.1995.492346}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Nelson95, author = {Ruth Nelson}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Unhelpfulness as a security policy: or it's about time}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {29--32}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492341}, doi = {10.1109/NSPW.1995.492341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Nelson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/NelsonH95, author = {Ruth Nelson and Hilary H. Hosmer}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Security for infinite networks}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {11--19}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492339}, doi = {10.1109/NSPW.1995.492339}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/NelsonH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/WilliamsSL95, author = {Jeffrey R. Williams and Marv Schaefer and Douglas J. Landoll}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Pretty good assurance}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {82--89}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492347}, doi = {10.1109/NSPW.1995.492347}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/WilliamsSL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/YesbergA95, author = {John D. Yesberg and Mark S. Anderson}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {QuARC: expressive security mechanisms}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {34--40}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492342}, doi = {10.1109/NSPW.1995.492342}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/YesbergA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1995, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://ieeexplore.ieee.org/xpl/conhome/3552/proceeding}, isbn = {0-8186-7318-4}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Bell94, author = {David Elliott Bell}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Modeling the "multipolicy machine"}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {2--9}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656208}, doi = {10.1109/NSPW.1994.656208}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Bell94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BertinoBS94, author = {Elisa Bertino and Claudio Bettini and Pierangela Samarati}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {A discretionary access control model with temporal authorizations}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {102--107}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656246}, doi = {10.1109/NSPW.1994.656246}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BertinoBS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CastanoMS94, author = {Silvana Castano and Giancarlo Martella and Pierangela Samarati}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {A new approach to security system development}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {82--88}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656236}, doi = {10.1109/NSPW.1994.656236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CastanoMS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Dobson94, author = {John Dobson}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Messages, communication, information security and value}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {10--19}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656215}, doi = {10.1109/NSPW.1994.656215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Dobson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/EssinL94, author = {Daniel J. Essin and Thomas L. Lincoln}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Healthcare information architecture: elements of a new paradigm}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {32--41}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656224}, doi = {10.1109/NSPW.1994.656224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/EssinL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Ferris94, author = {Martin Ferris}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {New email security infrastructure}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {20--27}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656218}, doi = {10.1109/NSPW.1994.656218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Ferris94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hamilton94, author = {Deborah Hamilton}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Providing non-hierarchical security through interface mechanisms}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {89--95}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656242}, doi = {10.1109/NSPW.1994.656242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hamilton94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LimogesNHB94, author = {Charles G. Limoges and Ruth R. Nelson and John H. Heimann and David S. Becker}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Versatile integrity and security environment {(VISE)} for computer systems}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {109--118}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656252}, doi = {10.1109/NSPW.1994.656252}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LimogesNHB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Lin94, author = {T. Y. Lin}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Anomaly detection: a soft computing approach}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {44--53}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656226}, doi = {10.1109/NSPW.1994.656226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Lin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Lincoln94, author = {Thomas L. Lincoln}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {"HIS-Treck - the next generation": an introduction to future hospital information systems}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {28--31}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656222}, doi = {10.1109/NSPW.1994.656222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Lincoln94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Nelson94, author = {Ruth Nelson}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {What is a secret - and - what does that have to do with computer security?}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {74--79}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656234}, doi = {10.1109/NSPW.1994.656234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Nelson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Ovchinnikov94, author = {Sergei Ovchinnikov}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Fuzzy sets and secure computer systems}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {54--62}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656230}, doi = {10.1109/NSPW.1994.656230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Ovchinnikov94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Schneier94, author = {Bruce Schneier}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Designing encryption algorithms for real people}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {98--101}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656244}, doi = {10.1109/NSPW.1994.656244}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Schneier94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Spalka94, author = {Adrian Spalka}, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Formal semantics of confidentiality in multilevel logic databases}, booktitle = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, pages = {64--73}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://doi.org/10.1109/NSPW.1994.656232}, doi = {10.1109/NSPW.1994.656232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Spalka94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1994, editor = {Hilary H. Hosmer and John E. Dobson and Eric Leighninger}, title = {Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994}, publisher = {{IEEE} Computer Society Press}, year = {1994}, url = {https://ieeexplore.ieee.org/xpl/conhome/5272/proceeding}, isbn = {0-8186-6335-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Bailey93, author = {David Bailey}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Managing complexity in secure networks}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {2--6}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283762}, doi = {10.1145/283751.283762}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Bailey93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Baker93, author = {Dixie B. Baker}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {The evolved threat paradigm: look who's wearing the black hats!}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {126--130}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283804}, doi = {10.1145/283751.283804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Baker93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Denning93, author = {Dorothy E. Denning}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {A new paradigm for trusted systems}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {36--41}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283772}, doi = {10.1145/283751.283772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Denning93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Desmedt93, author = {Yvo Desmedt}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Computer security by redefining what a computer is}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {160--166}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283834}, doi = {10.1145/283751.283834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Desmedt93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Dobson93, author = {John Dobson}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {New security paradigms: what other concepts do we need as well?}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {7--18}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283765}, doi = {10.1145/283751.283765}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Dobson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hammonds93, author = {Grace L. Hammonds}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Confidentiality, integrity, assured service: tying security all together}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {48--52}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283775}, doi = {10.1145/283751.283775}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hammonds93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hosmer93, author = {Hilary H. Hosmer}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {The multipolicy paradigm for trusted systems}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {19--32}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283768}, doi = {10.1145/283751.283768}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hosmer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Hosmer93a, author = {Hilary H. Hosmer}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {175--184}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283845}, doi = {10.1145/283751.283845}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Hosmer93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Howe93, author = {Donald M. Howe}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Information system security engineering: a spiral approach to revolution}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {53--56}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283777}, doi = {10.1145/283751.283777}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Howe93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LaPadula93, author = {Leonard J. LaPadula}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Prospect on security paradigms}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {62--68}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283781}, doi = {10.1145/283751.283781}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LaPadula93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LaPadulaW93, author = {Leonard J. LaPadula and James G. Williams}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {External consistency in a network environment}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {131--137}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283808}, doi = {10.1145/283751.283808}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/LaPadulaW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Lin93, author = {T. Y. Lin}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Bell and LaPadula axioms: a "new" paradigm for an "old" model}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {82--93}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283789}, doi = {10.1145/283751.283789}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Lin93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Lin93a, author = {T. Y. Lin}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {94--104}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283792}, doi = {10.1145/283751.283792}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Lin93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McLean93, author = {John McLean}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {New paradigms for high assurance software}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {42--47}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283773}, doi = {10.1145/283751.283773}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McLean93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows93, author = {Catherine Meadows}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {An outline of a taxonomy of computer security research and development}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {33--35}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283770}, doi = {10.1145/283751.283770}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MichaelSL93, author = {James Bret Michael and Edgar H. Sibley and David C. Littman}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {69--75}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283784}, doi = {10.1145/283751.283784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/MichaelSL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Rooker93, author = {Terry Rooker}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Application level security using an object-oriented graphical user interface}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {105--108}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283796}, doi = {10.1145/283751.283796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Rooker93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Rooker93a, author = {Terry Rooker}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {The reference monitor: an idea whose time has come}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {192--197}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283847}, doi = {10.1145/283751.283847}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Rooker93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Schaefer93, author = {Marvin Schaefer}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {We need to think about the foundations of computer security}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {120--125}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283801}, doi = {10.1145/283751.283801}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Schaefer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Shockley93, author = {W. R. Shockley}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Identification and authentication when users have multiple accounts}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {185--191}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283846}, doi = {10.1145/283751.283846}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Shockley93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Slack93, author = {James M. Slack}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Security in an object-oriented database}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {155--159}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283831}, doi = {10.1145/283751.283831}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Slack93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Smith93, author = {Mark Smith}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {The no-policy paradigm: towards a policy-free protocol supporting a secure {X} Window System}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {109--117}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283798}, doi = {10.1145/283751.283798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Smith93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/StrensD93, author = {Ros Strens and John E. Dobson}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {How responsibility modelling leads to security requirements}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {143--149}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283828}, doi = {10.1145/283751.283828}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/StrensD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Towards a task-based paradigm for flexible and adaptable access control in distributed applications}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {138--142}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283810}, doi = {10.1145/283751.283810}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Thuraisingham93, author = {Bhavani Thuraisingham}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Secure computing with the actor paradigm}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {76--81}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283788}, doi = {10.1145/283751.283788}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Thuraisingham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Vazquez-Gomez93, author = {Jos{\'{e}} de J. V{\'{a}}zquez{-}G{\'{o}}mez}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Modelling multidomain security}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {167--174}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283842}, doi = {10.1145/283751.283842}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Vazquez-Gomez93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Williams93, author = {James G. Williams}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {A shift in security modeling paradigms}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {57--61}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283780}, doi = {10.1145/283751.283780}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/Williams93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/YazdanianC93, author = {Kioumars Yazdanian and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Neighborhood data and database security}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {150--154}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283829}, doi = {10.1145/283751.283829}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/YazdanianC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1993, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751}, doi = {10.1145/283751}, isbn = {0-8186-5430-9}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.