Talks/Presentations

Talks/Presentations 88 records found  beginprevious61 - 70nextend  jump to record: Search took 0.00 seconds. 
61. JAMES: Junk Authorizations for Massive-scale Enterprise Services / Konstantin Beznosov [LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: Download fulltextPDF;
62. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Konstantin Beznosov [LERSSE-PRESENTATION-2005-026]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," presentation given at Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, Object Management Group, 7 May, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
63. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Beznosov, K [LERSSE-PRESENTATION-2005-025]
We discuss issues in CPR enterprise security architecture. [...]
Transfer from CDS 0.99.7: Download fulltextPDF;
64. Introduction to Cryptography, Part II / Konstantin Beznosov [LERSSE-PRESENTATION-2005-024]
Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Introduction to Cryptography, Part II," presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 7 April, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
65. Introduction to Cryptography, Part I: Probabilistic Encryption / Konstantin Beznosov [LERSSE-PRESENTATION-2005-023]
Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks
Published in Konstantin Beznosov, "Introduction to Cryptography, Part I: Probabilistic Encryption," presentation given at the class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 2 April, 1998.:
Transfer from CDS 0.99.7: Download fulltextPDF;
66. Improving Practical Security Engineering: Overview of the Ongoing Research / Konstantin Beznosov [LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;
67. Human Factor in Security Administration: Brainstorming the Research Directions / Konstantin Beznosov [LERSSE-PRESENTATION-2005-021]
Although usability has been acknowledged by the security community as one of the design goals back in 1970s, there is dearth of applications of HCI methods to the domain of computer security in general and security administration in particular. [...]
Published in Konstantin Beznosov, "Human Factor in Security Administration: Brainstorming the Research Directions," presentation given at SEEDS, Vancouver, BC, Canada, SEEDS, ECE, UBC, 2 December, 2003. :
Transfer from CDS 0.99.7: Download fulltextPDF;
68. HIPAA and CPR Architecture / Konstantin Beznosov [LERSSE-PRESENTATION-2005-020]
The presentation that describes Health Insurance Portability and Accountability Act (HIPAA) from the perspective of the Computerized Patient Record (CPR) Architecture [...]
Published in Konstantin Beznosov, "HIPAA and CPR Architecture," presentation given to IT leadership of the Baptist Health Systems, Miami, FL, USA, Baptist Health Systems of South Florida, 19 April, 1999, pp.17.:
Transfer from CDS 0.99.7: Download fulltextPDF;
69. Handouts: Introduction to Cryptography / Konstantin Beznosov [LERSSE-PRESENTATION-2005-019]
Outline: - Probabilistic encryption - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Handouts: Introduction to Cryptography," handouts for the presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, April, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
70. Flooding and Recycling Authorizations / Konstantin Beznosov [LERSSE-PRESENTATION-2005-018]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations," presentation given at the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, 22 September, 2005, pp.25. :
Transfer from CDS 0.99.7: Download fulltextPDF;

Talks/Presentations : 88 records found   beginprevious61 - 70nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.