Technical Reports

Technical Reports 38 records found  beginprevious18 - 27nextend  jump to record: Search took 0.01 seconds. 
18. Proceedings of the Second EECE 512 Mini-Conference on Computer Security / Brett Cannon ; Jeremy Hilliker ; Maryam Najafian Razavi ; Rodrigo Werlinger [LERSSE-REPORT-2007-022]
The proceedings of the second mini-conference of the EECE 512 course on Topics in Computer Security include four papers: 1. [...]
Published in Brett Cannon and Jeremy Hilliker and Maryam Najafian Razavi and Rodrigo Werlinger, "Proceedings of the Second EECE 512 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-03, 2007, http://lersse-dl.ece.ubc.ca:
Transfer from CDS 0.99.7: Download fulltextPDF;
19. A Study of Security Administration Errors / Kartik Markandan [LERSSE-REPORT-2007-021]
Security administrators prevent security breaches against their infrastructure by using their tools to implement the security policy. [...]
Published in Kartik Markandan, "A Study of Security Administration Errors", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2006-03, 17 December, 2006, pp.12.:
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Understanding IT Security Administration through a Field Study / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-REPORT-2007-002] [LERSSE-REPORT-2007-020]
The security administration of large organizations is exceptionally challenging due to the increasingly large numbers of application instances, resources, and users; the growing complexity and dynamics of business processes; and the spiralling volume of change that results from the interaction of the first two factors. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels and Brian Fisher, "Understanding Information Technology Security Administration through a Field Study", Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, 2007:
Transfer from CDS 0.99.7: Download fulltextPDF;
21. Support for ANSI RBAC in CORBA / Konstantin Beznosov ; Wesam Darwish [LERSSE-REPORT-2007-019]
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language than the CORBA Security specification (CORBASec). [...]
Published in Konstantin Beznosov, Wesam Darwish "Support for ANSI RBAC in CORBA," Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-01, 26 July, 2007, pp.42.:
Transfer from CDS 0.99.7: Download fulltextPDF;
22. A Security Analysis of the Precise Time Protocol / Jeanette Tsang ; Konstantin Beznosov [LERSSE-REPORT-2006-018]
This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. [...]
Published in Jeanette Tsang, Konstantin Beznosov, "A Security Analysis of the Precise Time Protocol" LERSSE Technical Report LERSSE-TR-2006-02, December 04, 2006.:
Transfer from CDS 0.99.7: Download fulltextPDF;
23. Evaluation of SAAM_BLP / Kyle Zeeuwen ; Konstantin Beznosov [LERSSE-REPORT-2006-017]
Request response access control systems that use Policy Decision Points have their reliability and latency bounded by network communication. [...]
Published in Kyle Zeeuwen, Konstantin Beznosov, "Evaluation of SAAM_BLP" LERSSE Technical Report LERSSE-TR-2006-01, July 21, 2006.:
Transfer from CDS 0.99.7: Download fulltextPDF;
24. SaamViz - Visualizer for SAAM / Johnson Ming-Che Tsai [LERSSE-REPORT-2006-016]
The purpose of the project is to create a visualization component for the secondary and approximate authorization model (SAAM) simulator to assist in the study of SAAM. [...]
Published in J. Tsai, "SaamViz - Visualizer for SAAM," Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical Report LERSSE-TR-2006-XX, 2006.:
Transfer from CDS 0.99.7: Download fulltextPDF;
25. Assessment of Interdependencies between Communication and Information Technology Infrastructure and other Critical Infrastructures from Public Failure Reports / Hafiz Abdur Rahman ; Konstantin Beznosov [LERSSE-REPORT-2006-015]
Failure in Communication and Information Technology Infrastructure (CITI) can disrupt the effective functionalities of many of the critical infrastructures. [...]
Published in Hafiz Abdur Rahman, Konstantin Beznosov, "Assessment of Interdependencies between Communication and Information Technology Infrastructure and other Critical infrastructures from Public Failure Reports," Laboratory for Education and Research in Secure Systems Engineering, Vancouver, B.C., Canada, University of British Columbia, technical report LERSSE-TR-2005-03, 24 February, 2005, pp.34.:
Transfer from CDS 0.99.7: Download fulltextPDF;
26. Taxonomy of CPR Enterprise Security Concerns at Baptist Health Systems of South Florida / Konstantin Beznosov [LERSSE-REPORT-2005-013]
This document categorizes security concerns of Computerized Patient Record enterprise according to federal and Florida state legal requirements, as well as to the internal security policies of Baptist Health Systems of South Florida..
Published in Konstantin Beznosov, "Taxonomy of CPR Enterprise Security Concerns at Baptist Health Systems of South Florida," Object Technology Group, Miami, FL, USA, Baptist Health Systems of South Florida.: (December, 1997)
Transfer from CDS 0.99.7: Download fulltextPDF;
27. Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM) / Konstantin Beznosov [LERSSE-REPORT-2005-012]
In large and complex enterprises, obtaining authorizations could be communicationally and/or computationally expensive, and, due to infrastructure failures, some times even impossible. [...]
Published in Konstantin Beznosov, "Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM)," LERSSE technical report, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, LERSSE-TR-2005-01, pp.15: (March, 2005)
Transfer from CDS 0.99.7: Download fulltextPDF;

Technical Reports : 38 records found   beginprevious18 - 27nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.