Abstract is missing.
- Practicing a Science of Security: A Philosophy of Science PerspectiveJonathan M. Spring, Tyler Moore, David J. Pym. 1-18 [doi]
- Market-based Security for Distributed ApplicationsGeorge Bissias, Brian Neil Levine, Nikunj Kapadia. 19-34 [doi]
- Beyond the pretty penny: the Economic Impact of CybercrimeCarlos Hernandez Gañán, Michael Ciere, Michel van Eeten. 35-45 [doi]
- Developer-centered security and the symmetry of ignoranceOlgierd Pieczul, Simon N. Foley, Mary Ellen Zurko. 46-56 [doi]
- Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying ImpactKaren Renaud, Merrill Warkentin. 57-69 [doi]
- Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the WorldNick Merrill, Max T. Curran, John Chuang. 70-79 [doi]
- A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information SharingSean Peisert, Matt Bishop, Edward B. Talbot. 80-89 [doi]
- Panel: Empirically-based Secure OS DesignSam Weber, Adam Shostack, Jon A. Solworth, Mary Ellen Zurko. 90-93 [doi]
- Can I believe you?: Establishing Trust in Computer Mediated IntroductionsBorke Obada-Obieh, Anil Somayaji. 94-106 [doi]
- End-to-End PasswordsScott Ruoti, Kent E. Seamons. 107-121 [doi]
- The Third Wave?: Inclusive Privacy and SecurityYang Wang. 122-130 [doi]