Important Dates
-
Papers due:
- Notification:
18 May 2012 - Pre-proceeding version due:
23 June 2012 - Final version due:
13 July 2012
(after the workshop)
23 April 2012 (extended)
- Workshop:
29 June 2012
Accepted Papers
Accepted papers are all those in the programme, except
Using Socio-Technical and Resilience frameworks to anticipate threat Katharine Worton (University of Leeds)
exempted, with justification, from presentation.Programme
The workshop's programme is also available in PDF
08:30-08:45 | Opening of the Workshop |
08:45-09:35 | Session 1: Keynote |
Trust Engineering via Security Protocols | |
Joshua D. Guttman (Worcester Polytechnic Institute)
|
|
09:35-10:45 | Session 2: Security Ceremonies and Interactions |
SpoofKiller: You can teach people how to pay, but not how to pay attention. | |
Markus Jakobsson (PayPal USA) and Hossein Siadati (Extricatus LLC) | |
Towards A Model to Support the Reconciliation of Security Actions across Enterprises | |
Jason R. C. Nurse and Jane E. Sinclair (University of Oxford) | |
10:45-11:05 | Coffee break |
11:05-12:50 | Session 3: Security Awareness and Decision-Making |
Improved Visual Preference Authentication | |
Markus Jakobsson (PayPal USA) and Hossein Siadati (Extricatus LLC) | |
Using Information Trustworthiness Advice in Decision-Making | |
Jason R. C. Nurse, Sadie Creese, Michael Goldsmith (University of Oxford) and Koen Lamberts (University of Warwick) | |
Optimal Security Investments in Networks of Varying Size and Topology | |
Alan Nochenson and Larry Heimann (Carnegie Mellon University) | |
12:50-13:00 | Closing of the Workshop |