Important Dates

    Papers due:
    15 April 2012
    23 April 2012 (extended)
  • Notification:
    18 May 2012
  • Pre-proceeding version due:
    23 June 2012
  • Final version due:
    13 July 2012
    (after the workshop)
  • Workshop:
    29 June 2012

Supported by

SnT

SnT

UNILU

UNICT

DMU

RHUL

Accepted Papers

Accepted papers are all those in the programme, except

Using Socio-Technical and Resilience frameworks to anticipate threat
Katharine Worton (University of Leeds)

exempted, with justification, from presentation.

Programme

The workshop's programme is also available in PDF

08:30-08:45 Opening of the Workshop
08:45-09:35 Session 1: Keynote
Trust Engineering via Security Protocols
Joshua D. Guttman (Worcester Polytechnic Institute)

09:35-10:45 Session 2: Security Ceremonies and Interactions
SpoofKiller: You can teach people how to pay, but not how to pay attention.
Markus Jakobsson (PayPal USA) and Hossein Siadati (Extricatus LLC)
Towards A Model to Support the Reconciliation of Security Actions across Enterprises
Jason R. C. Nurse and Jane E. Sinclair (University of Oxford)
10:45-11:05 Coffee break
11:05-12:50 Session 3: Security Awareness and Decision-Making
Improved Visual Preference Authentication
Markus Jakobsson (PayPal USA) and Hossein Siadati (Extricatus LLC)
Using Information Trustworthiness Advice in Decision-Making
Jason R. C. Nurse, Sadie Creese, Michael Goldsmith (University of Oxford) and Koen Lamberts (University of Warwick)
Optimal Security Investments in Networks of Varying Size and Topology
Alan Nochenson and Larry Heimann (Carnegie Mellon University)
12:50-13:00 Closing of the Workshop