11.
|
Towards understanding how users decide about friendship requests in Online Social Networks
/ Hootan Rashtian
[LERSSE-THESIS-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Hootan Rashtian, "Towards understanding how users decide about friendship requests in Online Social Networks," MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2014, pp.108:
Fulltext: PDF PDF (PDFA);
|
12.
|
User-centered design of identity and access management systems
/ Pooya Jaferian
[LERSSE-THESIS-2014-001]
IT security management (ITSM) technologies are important components of IT security in organizations. [...]
Published in Pooya Jaferian, "User-centered design of identity and access management systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, December, 2014, pp.314:
Fulltext: PDF PDF (PDFA);
|
13.
|
Towards Improving the Usability and Security of Web Single Sign-On Systems
/ San-Tsai Sun
[LERSSE-THESIS-2013-001]
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and millions of relying party (RP) websites. [...]
Published in San-Tsai Sun, "Towards Improving the Usability and Security of Web Single Sign-On Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, November, 2013, pp.216:
Fulltext: PDF PDF (PDFA);
|
14.
|
Influencing User Password Choice Through Peer Pressure
/ Andreas Sotirakopoulos
[LERSSE-THESIS-2011-004]
Passwords are the main means of authenticating users in most systems today. [...]
Published in UBC Thesis:
Transfer from CDS 0.99.7: PDF;
|
15.
|
Towards Supporting Users in Assessing the Risk in Privilege Elevation
/ Sara Motiee
[LERSSE-THESIS-2011-003]
To better protect users from security incidents, the principle of least privilege (PLP) requires that users and programs be granted the most restrictive set of privileges possible to perform the required tasks. [...]
Published in Sara Motiee, "Towards Supporting Users in Assessing the Risk in Privilege Elevation", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: PDF;
|
16.
|
Optimizing Re-Evaluation of Malware Distribution Networks
/ Kyle Zeeuwen
[LERSSE-THESIS-2011-002]
The retrieval and analysis of malicious content is an essential task for security researchers. [...]
Published in Kyle Zeeuwen, "Optimizing Re-Evaluation of Malware Distribution Networks", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: PDF;
|
17.
|
Towards Improving the Usability of Personal Firewalls
/ Fahimeh Raja
[LERSSE-THESIS-2011-001]
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. [...]
Published in Fahimeh Raja, "Towards Improving the Usability of Personal Firewalls," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, January 2011.:
Transfer from CDS 0.99.7: PDF;
|
18.
|
Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization
/ Pranab Kini
[LERSSE-THESIS-2010-001]
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. [...]
Published in Pranab Kini, "Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization" Masters thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, October, 2010 :
Transfer from CDS 0.99.7: PDF;
|
19.
|
Towards Improving the Availability and Performance of Enterprise Authorization Systems
/ Qiang Wei
[LERSSE-THESIS-2009-006]
Authorization protects application resources by allowing only authorized entities to access them. [...]
Published in Qiang Wei, "Towards Improving the Availability and Performance of Enterprise Authorization Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, October, 2009, pp.141.:
Transfer from CDS 0.99.7: PDF;
|
20.
|
Analysis of ANSI RBAC Support in Commercial Middleware
/ Wesam M. Darwish
[LERSSE-THESIS-2009-001]
This thesis analyzes the access control architectures of three middleware technologies: Common
Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component
Object Model (COM+) [...]
Published in Wesam M. Darwish, "Analysis of ANSI RBAC Support in Commercial Middleware," Master thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, April, 2009, pp.124. :
Transfer from CDS 0.99.7: PDF;
|