Refereed Conference Papers

Refereed Conference Papers 82 records found  beginprevious73 - 82  jump to record: Search took 0.01 seconds. 
73. Here’s Your Lego™ Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need / Konstantin Beznosov [LERSSE-RefConfPaper-2005-009]
By presenting a protection architecture for ASP.NET Web services, this paper demonstrates the feasibility of creating middleware mechanisms in the form of composable, flexible, and extensible building blocks. [...]
Published in Konstantin Beznosov, “Here’s Your Lego! Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need,” in Proceedings of Software Engineering and Middleware (SEM) Workshop, pp. 3-18, Linz, Austria, 20-21 September 2004.:
Transfer from CDS 0.99.7: Download fulltextPDF;
74. eXtreme Security Engineering: On Employing XP Practices to Achieve “Good Enough Security” without Defining It / Konstantin Beznosov [LERSSE-RefConfPaper-2005-008]
This paper examines practices of eXtreme Programming (XP) on the subject of their application to the development of security solutions. [...]
Published in Konstantin Beznosov. Extreme security engineering: On employing xp practices to achieve "good enough security" without defining it. In First ACM Workshop on Business Driven Security Engineering (BizSec), Faiffax, VA, USA, 2003. :
Transfer from CDS 0.99.7: Download fulltextPDF;
75. Supporting End-to-end security Across Proxies with Multiple-channel SSL / Yong Song ; Victor C.M. Leung ; Konstantin Beznosov [LERSSE-RefConfPaper-2005-005]
Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate with servers [...]
Published in Yong Song, Victor C.M. Leung, and Konstantin Beznosov. Supporting end-to-end security across proxies with multiple-channel SSL. In Proceedings of the 19th IFIP International Information Security Conference, pages 246–253, Toulouse, France, 23-26 August 2004.:
Transfer from CDS 0.99.7: Download fulltextPDF;
76. Architecting a Computerized Patient Record with Distributed Objects / Kent Wreder ; Konstantin Beznosov ; A. Bramblett ; Eric Butler ; et al [LERSSE-RefConfPaper-2005-004]
Published in Kent Wreder, Konstantin Beznosov, A. Bramblett, Eric Butler, A. D-Empaire, E. Hernandez, Eric Navarro, A. Romano, M. Tortolini-Taylor, E. Urzais, R. Ventura, "Architecting a Computerized Patient Record with Distributed Objects," in Proceedings of Healthcare Information and Management Systems Society Conference, Orange County Convention Center, Orlando, FL, USA, HIMSS, February, 1998, pp.149-158.:
Transfer from CDS 0.99.7: Download fulltextPDF;
77. Applying Aspect-Orientation in Designing Security Systems: A Case Study / Shu Gao ; Yi Deng ; Huiqun Yu ; Xudong He ; et al [LERSSE-RefConfPaper-2005-003]
As a security policy model evolves, the design of security systems using that model could become increasingly complicated [...]
Published in Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, Kendra Cooper, "Applying Aspect-Orientation in Designing Security Systems: A Case Study," in Proceedings of The Sixteenth International Conference on Software Engineering and Knowledge Engineering (SEKE 04), Banff, Alberta, Canada, June 20-24, 2004, pp.360-365.:
Transfer from CDS 0.99.7: Download fulltextPDF;
78. A Resource Access Decision Service for CORBA-based Distributed Systems / Konstantin Beznosov ; Yi Deng ; Bob Blakley ; Carol Burt ; et al [LERSSE-RefJnlPaper-2005-001]
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are used in authorization decisions as well as access control models, no matter how dynamic those polices and factors are [...]
Published in Konstantin Beznosov, Yi Deng, Bob Blakley, Carol Burt, John Barkley, "A Resource Access Decision Service for CORBA-based Distributed Systems," in Proceedings of the Annual Computer Security Applications Conference (ACSAC), Phoenix, Arizona, U.S.A., 6-10 December, 1999, pp.310-319.:
Transfer from CDS 0.99.7: Download fulltextPDF;
79. A Framework for Implementing Role-based Access Control Using CORBA Security Service / Konstantin Beznosov ; Yi Deng [LERSSE-RefConfPaper-2005-002]
The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, Yi Deng, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," in Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM, October, 1999, pp.19-30.:
Transfer from CDS 0.99.7: Download fulltextPDF;
80. Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services / Konstantin Beznosov [TEST-RefConfPaper-2005-001]
This report reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services [...]
Published in Konstantin Beznosov, "Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services," in Proceedings of the Eighth International SIGSOFT Symposium on Component-based Software Engineering (CBSE), St. Louis, Missouri, USA, SIGSOFT, 15-21 May, 2005, pp.337-352.:
Transfer from CDS 0.99.7: Download fulltextPDF;
81. On the Benefits of Decomposing Policy Engines into Components / Konstantin Beznosov [TEST-ARTICLE-2005-004]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov. Flooding and recycling authorizations. In Proceedings of the New Security Paradigms Workshop (NSPW’05), pages 67–72, Lake Arrowhead, CA, USA, 20-23 September 2005. ACM Press. :
Transfer from CDS 0.99.7: Download fulltextPDF;
82. Flooding and Recycling Authorizations / Konstantin Beznosov [TEST-ARTICLE-2005-003]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations", in Proceedings of New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, ACM, 20-23 September, 2005, pp.67-72.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Refereed Conference Papers : 82 records found   beginprevious73 - 82  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.