[Front cover] (PDF)
[Copyright notice] (PDF)
Table of contents (PDF)
Program Committee (PDF)
Additional Reviewers and Tutorial Reviewers (PDF)
Sponsor: Applied Computer Security Associates (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Welcome from the Conference Chair (PDF)
Welcome from the Program Chairs (PDF)
Conference Committee (PDF)
ACSAC Steering Committee (PDF)
PinUP: Pinning User Files to Known Applications (Abstract)
YAGP: Yet Another Graphical Password Strategy (Abstract)
ProActive Access Control for Business Process-Driven Environments (Abstract)
Implementing ACL-Based Policies in XACML (Abstract)
Execution Trace-Driven Automated Attack Signature Generation (Abstract)
[Roster] (PDF)
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks (Abstract)
The Evolution of System-Call Monitoring (Abstract)
DARE: A Framework for Dynamic Authentication of Remote Executions (Abstract)
A Survey to Guide Group Key Protocol Development (Abstract)
Author Index (PDF)