Theses

Latest additions:
2015-08-03
06:54
Towards understanding how Touch ID impacts users’ authentication secrets selection for iPhone lock. / Ivan Cherapau [LERSSE-THESIS-2015-004]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-THESIS-2015-003:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2015-05-13
07:22
Security Analysis of Malicious Socialbots on the Web / Yazan Boshmaf [LERSSE-THESIS-2015-002]
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. [...]
Published in Yazan Boshmaf, Security Analysis of Malicious Socialbots on the Web, PhD Dissertation, UBC, 2015:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2015-01-19
00:48
Engineering Access Control For Distributed Enterprise Systems / Konstantin Beznosov [LERSSE-THESIS-2015-001]
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. [...]
Published in Florida International University, 2000:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2014-12-04
15:56
Towards understanding how users decide about friendship requests in Online Social Networks / Hootan Rashtian [LERSSE-THESIS-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Hootan Rashtian, "Towards understanding how users decide about friendship requests in Online Social Networks," MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2014, pp.108:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2014-12-04
15:49
User-centered design of identity and access management systems / Pooya Jaferian [LERSSE-THESIS-2014-001]
IT security management (ITSM) technologies are important components of IT security in organizations. [...]
Published in Pooya Jaferian, "User-centered design of identity and access management systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, December, 2014, pp.314:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2013-11-20
13:55
Towards Improving the Usability and Security of Web Single Sign-On Systems / San-Tsai Sun [LERSSE-THESIS-2013-001]
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and millions of relying party (RP) websites. [...]
Published in San-Tsai Sun, "Towards Improving the Usability and Security of Web Single Sign-On Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, November, 2013, pp.216:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2011-12-05
15:41
Influencing User Password Choice Through Peer Pressure / Andreas Sotirakopoulos [LERSSE-THESIS-2011-004]
Passwords are the main means of authenticating users in most systems today. [...]
Published in UBC Thesis:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2011-10-31
14:00
Towards Supporting Users in Assessing the Risk in Privilege Elevation / Sara Motiee [LERSSE-THESIS-2011-003]
To better protect users from security incidents, the principle of least privilege (PLP) requires that users and programs be granted the most restrictive set of privileges possible to perform the required tasks. [...]
Published in Sara Motiee, "Towards Supporting Users in Assessing the Risk in Privilege Elevation", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2011-10-14
20:35
Optimizing Re-Evaluation of Malware Distribution Networks / Kyle Zeeuwen [LERSSE-THESIS-2011-002]
The retrieval and analysis of malicious content is an essential task for security researchers. [...]
Published in Kyle Zeeuwen, "Optimizing Re-Evaluation of Malware Distribution Networks", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2011-02-24
19:51
Towards Improving the Usability of Personal Firewalls / Fahimeh Raja [LERSSE-THESIS-2011-001]
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. [...]
Published in Fahimeh Raja, "Towards Improving the Usability of Personal Firewalls," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, January 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records