Technical Reports

Technical Reports 38 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
11. Usability Study of Windows Vista’s Firewall / Pooya Jaferian [LERSSE-REPORT-2009-029]
Windows Vista is shipped with a built-in personal firewall. [...]
Published in Pooya Jaferian,"Usability Study of Windows Vista’s Firewall", EECE 512 term report, Spring 2008, University of British Columbia, Canada:
Transfer from CDS 0.99.7: Download fulltextPDF;
12. Auxiliary Material for the Study of Security Practitioners in Context: Their Activities and Interactions with Other Stakeholders Within Organizations / Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-REPORT-2009-028]
This technical report contains additional material for the study, which investigated the context of interactions of IT security practitioners..
Published in Rodrigo Werlinger, Kirstie Hawkey, and Konstantin Beznosov, "Auxiliary Material for the Study of Security Practitioners in Context: Their Activities and Interactions with Other Stakeholders Within Organizations," Tech. Rep. LERSSE-TR-2009-01, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Jan 2009:
Transfer from CDS 0.99.7: Download fulltextPDF;
13. A Two-factor Authentication Mechanism Using Mobile Phones / Nima Kaviani ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-REPORT-2008-027]
Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. [...]
Published in Nima Kaviani and Kirstie Hawkey and Konstantin Beznosov, "A Two-factor Authentication Mechanism Using Mobile Phones," Tech. Rep. LERSSE-TR-2008-03, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, August 2008:
Transfer from CDS 0.99.7: Download fulltextPDF;
14. Cooperative Secondary Authorization Recycling / Qiang Wei ; Matei Ripeanu ; Konstantin Beznosov [LERSSE-REPORT-2008-026]
As enterprise systems, Grids, and other distributed applications scale up and become increasingly complex, their authorization infrastructures---based predominantly on the request-response paradigm---are facing challenges of fragility and poor scalability. [...]
Published in Qiang Wei, Matei Ripeanu, and Konstantin Beznosov, "Cooperative Secondary Authorization Recycling," Tech. Rep. LERSSE-TR-2008-02, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, April 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
15. SQLPrevent: Effective Dynamic Detection and Prevention of SQL Injection Attacks Without Access to the Application Source Code / San-Tsai Sun ; Konstantin Beznosov [LERSSE-REPORT-2008-025]
This paper presents an effective approach for detecting and preventing known as well as novel SQL injection attacks. [...]
Published in San-Tsai Sun and Konstantin Beznosov, "SQLPrevent: Effective dynamic detection and prevention of SQL injection attacks without access to the application source code," Tech. Rep. LERSSE-TR-2008-01, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, February 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
16. Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs / Kirstie Hawkey ; Kasia Muldner ; Konstantin Beznosov [LERSSE-REPORT-2007-024]
The usability of security systems within an organization is impacted not only by tool interfaces but also by the security management model (SMM) of the IT security team. [...]
Published in Kirstie Hawkey, Kasia Muldnery, and Konstantin Beznosov, "Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-03, 16 November, 2007, pp.23.:
Transfer from CDS 0.99.7: Download fulltextPDF;
17. Proceedings of the Third EECE 412 Mini-Conference on Computer Security / André Gagné [LERSSE-REPORT-2007-023]
Published in André Gagné, "Proceedings of the Third EECE 412 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-04, 2007, http://lersse-dl.ece.ubc.ca:
Transfer from CDS 0.99.7: Download fulltextPDF;
18. Proceedings of the Second EECE 512 Mini-Conference on Computer Security / Brett Cannon ; Jeremy Hilliker ; Maryam Najafian Razavi ; Rodrigo Werlinger [LERSSE-REPORT-2007-022]
The proceedings of the second mini-conference of the EECE 512 course on Topics in Computer Security include four papers: 1. [...]
Published in Brett Cannon and Jeremy Hilliker and Maryam Najafian Razavi and Rodrigo Werlinger, "Proceedings of the Second EECE 512 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-03, 2007, http://lersse-dl.ece.ubc.ca:
Transfer from CDS 0.99.7: Download fulltextPDF;
19. A Study of Security Administration Errors / Kartik Markandan [LERSSE-REPORT-2007-021]
Security administrators prevent security breaches against their infrastructure by using their tools to implement the security policy. [...]
Published in Kartik Markandan, "A Study of Security Administration Errors", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2006-03, 17 December, 2006, pp.12.:
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Understanding IT Security Administration through a Field Study / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-REPORT-2007-002] [LERSSE-REPORT-2007-020]
The security administration of large organizations is exceptionally challenging due to the increasingly large numbers of application instances, resources, and users; the growing complexity and dynamics of business processes; and the spiralling volume of change that results from the interaction of the first two factors. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels and Brian Fisher, "Understanding Information Technology Security Administration through a Field Study", Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, 2007:
Transfer from CDS 0.99.7: Download fulltextPDF;

Technical Reports : 38 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.