Refereed Conference Papers

Refereed Conference Papers 105 records found  beginprevious83 - 92nextend  jump to record: Search took 0.00 seconds. 
83. Towards Understanding IT Security Professionals and Their Tools / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2007-023]
We report preliminary results of our ongoing field study of IT professionals who are involved in security management. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools" in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, July 18-20, 2007, pp.100-111.:
Transfer from CDS 0.99.7: Download fulltextPDF;
84. Cooperative Secondary Authorization Recycling / Qiang Wei ; Matei Ripeanu ; Konstantin Beznosov [LERSSE-RefConfPaper-2007-022]
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-response paradigm—are facing challenges in terms of fragility and poor scalability. [...]
Published in Qiang Wei, Matei Ripeanu, and Konstantin Beznosov, "Cooperative Secondary Authorization Recycling," in Proceedings of the 16th Symposium on High Performance Distributed Computing (HPDC'07), June 25–29, 2007, Monterey, California, USA. pp.65-74:
Transfer from CDS 0.99.7: Download fulltextPDF;
85. On the Imbalance of the Security Problem Space and its Expected Consequences / Konstantin Beznosov ; Olga Beznosova [LERSSE-RefConfPaper-2007-021]
This paper considers the attacker-defender game in the field of computer security as a three-dimensional phenomenon [...]
Published in Konstantin Beznosov, Olga Beznosova "On the Imbalance of the Security Problem Space and its Expected Consequences," To appear in Symposium on Human Aspects of Information Security & Assurance (HAISA), Plymouth, UK, 10 July, 2007, pp.10. :
Transfer from CDS 0.99.7: Download fulltextPDF;
86. Studying IT Security Professionals: Research Design and Lessons Learned / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2007-020]
The HOT Admin Field Study used qualitative methods to study information technology security administrators. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, and Brian Fisher, "Studying IT Security Professionals: Research Design and Lessons Learned" position paper at the CHI Workshop on Security User studies: Methodologies and Best Practices, San Francisco, CA, 28 April 2007, 4 pages.:
Transfer from CDS 0.99.7: Download fulltextPDF;
87. A Security Analysis of the Precise Time Protocol (Short Paper) / Jeanette Tsang ; Konstantin Beznosov [LERSSE-RefConfPaper-2006-019]
This paper reports on a security analysis of the IEEE 1588 standard, a.k.a [...]
Published in Jeanette Tsang, Konstantin Beznosov "A Security Analysis of the Precise Time Protocol (Short Paper)," In Proceedings of Eighth International Conference on Information and Communications Security (ICICS), Raleigh, North Carolina, USA, Springer-Verlag Berlin Heidelberg, LNCS 4307, 4-7 December, 2006, pp.50-59. :
Transfer from CDS 0.99.7: Download fulltextPDF;
88. The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies / Jason Crampton ; Wing Leung ; Konstantin Beznosov [LERSSE-RefConfPaper-2006-017]
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. [...]
Published in Jason Crampton, Wing Leung, Konstantin Beznosov "The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies," In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), Lake Tahoe, California, USA, ACM, 7-9 June, 2006, pp.111-120.:
Transfer from CDS 0.99.7: Download fulltextPDF;
89. Extending XP Practices to Support Security Requirements Engineering / Gustav Boström ; Jaana Wäyrynen ; Marine Bodén, ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2006-016]
This paper proposes a way of extending eXtreme Programming (XP) practices, in particular the original planning game and the coding guidelines, to aid the developers and the customer to engineer security requirements while maintaining the iterative and rapid feedback-driven nature of XP. [...]
Published in Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten, "Extending XP Practices to Support Security Requirements Engineering," Proceedings of Workshop on Software Engineering for Secure Systems (SESS), Shanghai, China, ACM, 20–21 May, 2006, pp.11-17.:
Transfer from CDS 0.99.7: Download fulltextPDF;
90. Towards Agile Security Assurance / Konstantin Beznosov ; Philippe Kruchten [LERSSE-RefConfPaper-2005-015]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54
Transfer from CDS 0.99.7: Download fulltextPDF;
91. Supporting Relationships in Access Control Using Role Based Access Control / John Barkley ; Konstantin Beznosov ; Jinny Uppal ; John Barkley ; et al [LERSSE-RefConfPaper-2005-014]
The Role Based Access Control (RBAC) model and mechanism have proven to be useful and effective. [...]
Published in Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA: (October, 1999) pp. 55-65
Transfer from CDS 0.99.7: Download fulltextPDF;
92. SPAPI: A Security and Protection Architecture for Physical Infrastructures and Its Deployment Strategy Using Sensor Networks / Hafiz Rahman ; Konstantin Beznosov [LERSSE-RefConfPaper-2005-013]
In recent years, concerns about the safety and security of critical infrastructures have increased enormously. [...]
Published in Proceedings of 10th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2005), Catania, Italy: (19-22 September, 2005) pp. 885-892
Transfer from CDS 0.99.7: Download fulltextPDF;

Refereed Conference Papers : 105 records found   beginprevious83 - 92nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.