Abstract is missing.
- Laissez-faire file sharing: access control designed for individuals at the endpointsMaritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter. 1-10 [doi]
- Server-side detection of malware infectionMarkus Jakobsson, Ari Juels. 11-22 [doi]
- What is the shape of your security policy?: security as a classification problemSven Türpe. 23-36 [doi]
- Quantified security is a weak hypothesis: a critical survey of results and assumptionsVilhelm Verendel. 37-50 [doi]
- Generative usability: security and user centered design beyond the applianceLuke Church, Alma Whitten. 51-58 [doi]
- The sisterhood of the traveling packetsMatt Bishop, Carrie Gates, Jeffrey Hunker. 59-70 [doi]
- Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet JuvenalSean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald. 71-84 [doi]
- Musipass: authenticating me softly with "my" songMarcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple. 85-100 [doi]
- A reinforcement model for collaborative security and Its formal analysisJanardan Misra, Indranil Saha. 101-114 [doi]
- Securing data through avoidance routingErik Kline, Peter L. Reiher. 115-124 [doi]
- Fluid information systemsChristian W. Probst, René Rydhof Hansen. 125-132 [doi]
- So long, and no thanks for the externalities: the rational rejection of security advice by usersCormac Herley. 133-144 [doi]