11.
|
Towards Investigating User Account Control Practices in Windows Vista
/ Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
[LERSSE-POSTER-2009-009]
This poster presents the research plan for investigating user account control practices in Windows Vista. [...]
Published in S. Motiee, K. Hawkey and K. Beznosov, Towards Investigating User Account Control Practices in Windows Vista. Poster in18th USENIX Security Symposium, August 2009.:
Transfer from CDS 0.99.7: PDF;
|
12.
|
A Multi-method Approach for User-centered Design of Identity Management Systems
/ Pooya Jaferian ; David Botta ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-POSTER-2009-006]
Identity management (IdM) comprises the processes and infrastructure for the creation, maintenance, and use of digital identities. [...]
Published in Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov, A multi-method approach for user-centered design of identity management systems. Poster at SOUPS 2009, Mountain View, CA, 2009. :
Transfer from CDS 0.99.7: PDF;
|
13.
|
Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-POSTER-2009-005]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the USENIX Security 2009, August 13th 2009.:
Transfer from CDS 0.99.7: PDF;
|
14.
|
Speculative Authorizations
/ Pranab Kini ; Konstantin (Kosta) Beznosov
[LERSSE-POSTER-2009-003]
In a large-scale enterprise system, making authorization decisions is often computationally expensive due to the complexity of the policies involved and the large size of the resource and user populations [...]
Transfer from CDS 0.99.7: PDF;
|
15.
|
Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-POSTER-2009-002]
Web 2.0 users need usable mechanisms for sharing
their content with each other in a controlled manner across
boundaries of content-hosting or application-service providers
(CSPs) [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the IEEE Security and Privacy 2009, May 17th 2009.:
Transfer from CDS 0.99.7: PDF;
|
16.
|
Towards Improving Mental Models of Personal Firewall Users
/ Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-POSTER-2009-001]
Windows Vista’s personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Fahimeh Raja, Kirstie Hawkey, and Konstantin Beznosov, "Towards Improving Mental Models of Personal Firewall Users," in Proceedings of CHI 2009 (Work in Progress), Boston, USA, 4-9 April, 2009, 6 pages.:
Transfer from CDS 0.99.7: PDF;
|
17.
|
A Two-Factor Authentication System using Mobile Phones
/ Nima Kaviani ; Konstantin Beznosov
[LERSSE-POSTER-2008-003]
The use of untrusted computers to access critical information introduces one of the main challenges in protecting the security of users’ confidential information. [...]
Published in Nima Kaviani, Konstantin Beznosov, "A Two-Factor Authentication System using Mobile Phones", Poster Presentation in the National Privacy and Security Conference, Victoria, Canada, February 2008.:
Transfer from CDS 0.99.7: PDF;
|
18.
|
Security Practitioners in Context: Their Activities and Collaborative Interactions
/ Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-POSTER-2008-002]
This study develops the context of interactions of IT security practitioners [...]
Published in Werlinger, R., Hawkey, K., and Beznosov, K. Poster presented at "Security and Privacy Conference", Victoria, BC, Canada, February 2008.:
Transfer from CDS 0.99.7: PDF;
|
19.
|
Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs
/ Kirstie Hawkey, Kasia Muldner and Konstantin Beznosov
[LERSSE-POSTER-2008-004]
The effectiveness of IT security professionals in an organization is influenced not only by the usability of security management tools, but also by the fit of an organization's security management model (SMM). [...]
Published in Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov, "Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs", Poster presented at the 7th Annual Conference & Exposition Privacy & Security Conference, Victoria, B.C., February 7-8, 2008.:
Transfer from CDS 0.99.7: PDF;
|
20.
|
Cooperative Secondary Authorization Recycling
/ Qiang Wei ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-POSTER-2006-001]
As distributed enterprise systems scale up and become increasingly complex their authorization infrastructures are facing new challenges [...]
Published in Qiang Wei, Konstantin Beznosov, Matei Ripeanu, "Cooperative Approximate Authorization Recycling", Poster, 15th USENIX Security Symposium, August 2006.:
Transfer from CDS 0.99.7: PDF;
|