Abstract is missing.
- A move in the security measurement stalemate: elo-style ratings to quantify vulnerabilityWolter Pieters, Sanne H. G. van der Ven, Christian W. Probst. 1-14 [doi]
- Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systemsSean Peisert, Edward B. Talbot, Matt Bishop. 15-26 [doi]
- Point-and-shoot security design: can we build better tools for developers?Sven Türpe. 27-42 [doi]
- Argumentation logic to assist in security administrationJeff Rowe, Karl N. Levitt, Simon Parsons, Elizabeth Sklar, Andy Applebaum, Sharmin Jalal. 43-52 [doi]
- Beyond the blacklist: modeling malware spread and the effect of interventionsBenjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest. 53-66 [doi]
- Someone to watch over meHeather Richter Lipford, Mary Ellen Zurko. 67-76 [doi]
- Pools, clubs and security: designing for a party not a personZheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia. 77-86 [doi]
- Privacy is a process, not a PET: a theory for effective privacy practiceAnthony Morton, Martina Angela Sasse. 87-104 [doi]
- All your base are belong to USRichard Ford, Liam M. Mayron. 105-114 [doi]
- The need for application-aware access control evaluationWilliam C. Garrison III, Adam J. Lee, Timothy L. Hinrichs. 115-126 [doi]
- Video-passwords: advertising while authenticatingJulie Thorpe, Amirali Salehi-Abari, Robert Burden. 127-140 [doi]
- Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundariesJedidiah R. Crandall, Daniela A. S. de Oliveira. 141-152 [doi]