Abstract is missing.
- Foreword from the Programme Chairs - STAST 2012Lizzie Coles-Kemp, Peter Y. A. Ryan. [doi]
- Foreword from the Workshop Chairs - STAST 2012Giampaolo Bella, Gabriele Lenzini. [doi]
- Trust Engineering via Security ProtocolsJoshua D. Guttman. 1-2 [doi]
- SpoofKiller: You Can Teach People How to Pay, but Not How to Pay AttentionMarkus Jakobsson, Hossein Siadati. 3-10 [doi]
- Towards a Model to Support the Reconciliation of Security Actions across EnterprisesJason R. C. Nurse, Jane E. Sinclair. 11-18 [doi]
- Using Socio-Technical and Resilience Frameworks to Anticipate ThreatKatharine E. Worton. 19-26 [doi]
- Improved Visual Preference AuthenticationMarkus Jakobsson, Hossein Siadati. 27-34 [doi]
- Using Information Trustworthiness Advice in Decision MakingJason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts. 35-42 [doi]
- Optimal Security Investments in Networks of Varying Size and TopologyAlan Nochenson, C. F. Larry Heimann. 43-47 [doi]