Posters

Posters 20 records found  previous11 - 20  jump to record: Search took 0.00 seconds. 
11. Towards Investigating User Account Control Practices in Windows Vista / Sara Motiee, Kirstie Hawkey, Konstantin Beznosov [LERSSE-POSTER-2009-009]
This poster presents the research plan for investigating user account control practices in Windows Vista. [...]
Published in S. Motiee, K. Hawkey and K. Beznosov, Towards Investigating User Account Control Practices in Windows Vista. Poster in18th USENIX Security Symposium, August 2009.:
Transfer from CDS 0.99.7: Download fulltextPDF;
12. A Multi-method Approach for User-centered Design of Identity Management Systems / Pooya Jaferian ; David Botta ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-POSTER-2009-006]
Identity management (IdM) comprises the processes and infrastructure for the creation, maintenance, and use of digital identities. [...]
Published in Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov, A multi-method approach for user-centered design of identity management systems. Poster at SOUPS 2009, Mountain View, CA, 2009. :
Transfer from CDS 0.99.7: Download fulltextPDF;
13. Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens / San-Tsai Sun ; Konstantin Beznosov [LERSSE-POSTER-2009-005]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the USENIX Security 2009, August 13th 2009.:
Transfer from CDS 0.99.7: Download fulltextPDF;
14. Speculative Authorizations / Pranab Kini ; Konstantin (Kosta) Beznosov [LERSSE-POSTER-2009-003]
In a large-scale enterprise system, making authorization decisions is often computationally expensive due to the complexity of the policies involved and the large size of the resource and user populations [...]
Transfer from CDS 0.99.7: Download fulltextPDF;
15. Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens / San-Tsai Sun ; Konstantin Beznosov [LERSSE-POSTER-2009-002]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs) [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the IEEE Security and Privacy 2009, May 17th 2009.:
Transfer from CDS 0.99.7: Download fulltextPDF;
16. Towards Improving Mental Models of Personal Firewall Users / Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-POSTER-2009-001]
Windows Vista’s personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Fahimeh Raja, Kirstie Hawkey, and Konstantin Beznosov, "Towards Improving Mental Models of Personal Firewall Users," in Proceedings of CHI 2009 (Work in Progress), Boston, USA, 4-9 April, 2009, 6 pages.:
Transfer from CDS 0.99.7: Download fulltextPDF;
17. A Two-Factor Authentication System using Mobile Phones / Nima Kaviani ; Konstantin Beznosov [LERSSE-POSTER-2008-003]
The use of untrusted computers to access critical information introduces one of the main challenges in protecting the security of users’ confidential information. [...]
Published in Nima Kaviani, Konstantin Beznosov, "A Two-Factor Authentication System using Mobile Phones", Poster Presentation in the National Privacy and Security Conference, Victoria, Canada, February 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
18. Security Practitioners in Context: Their Activities and Collaborative Interactions / Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-POSTER-2008-002]
This study develops the context of interactions of IT security practitioners [...]
Published in Werlinger, R., Hawkey, K., and Beznosov, K. Poster presented at "Security and Privacy Conference", Victoria, BC, Canada, February 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
19. Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs / Kirstie Hawkey, Kasia Muldner and Konstantin Beznosov [LERSSE-POSTER-2008-004]
The effectiveness of IT security professionals in an organization is influenced not only by the usability of security management tools, but also by the fit of an organization's security management model (SMM). [...]
Published in Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov, "Searching for the Right Fit: Considerations when Balancing IT Security Management Model Tradeoffs", Poster presented at the 7th Annual Conference & Exposition Privacy & Security Conference, Victoria, B.C., February 7-8, 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Cooperative Secondary Authorization Recycling / Qiang Wei ; Konstantin Beznosov ; Matei Ripeanu [LERSSE-POSTER-2006-001]
As distributed enterprise systems scale up and become increasingly complex their authorization infrastructures are facing new challenges [...]
Published in Qiang Wei, Konstantin Beznosov, Matei Ripeanu, "Cooperative Approximate Authorization Recycling", Poster, 15th USENIX Security Symposium, August 2006.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Posters : 20 records found   previous11 - 20  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.