Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 12 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
1. The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies / Konstantin Beznosov [LERSSE-PRESENTATION-2008-071]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, “The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies” talk given at the Computer Science Department, IBM Research Laboratory, Rüeschlikon, Switzerland, 5 June 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
2. Proceedings of the Second EECE 512 Mini-Conference on Computer Security / Brett Cannon ; Jeremy Hilliker ; Maryam Najafian Razavi ; Rodrigo Werlinger [LERSSE-REPORT-2007-022]
The proceedings of the second mini-conference of the EECE 512 course on Topics in Computer Security include four papers: 1. [...]
Published in Brett Cannon and Jeremy Hilliker and Maryam Najafian Razavi and Rodrigo Werlinger, "Proceedings of the Second EECE 512 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-03, 2007, http://lersse-dl.ece.ubc.ca:
Transfer from CDS 0.99.7: Download fulltextPDF;
3. Performance Considerations for a CORBA-based Application Authorization Service / Konstantin Beznosov ; Luis Espinal ; Yi Deng [LERSSE-RefConfPaper-2005-012]
Resource Access Decision (RAD) Service allows separation of authorization from application functionality in distributed application systems by providing a logically centralized authorization control mechanism. [...]
Published in Proceedings of IASTED International Conference Software Engineering and Applications, Las Vegas, Nevada: (November, 2000)
Transfer from CDS 0.99.7: Download fulltextPDF;
4. On the Benefits of Decomposing Policy Engines into Components / Konstantin Beznosov [LERSSE-PRESENTATION-2005-031]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov, "On the Benefits of Decomposing Policy Engines into Components," talk given at The 3rd Workshop on Reflective and Adaptive Middleware, Toronto, Canada, 19 October, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;
5. Object Security Attributes: Enabling Application-specific Access Control in Middleware / Konstantin Beznosov [LERSSE-PRESENTATION-2005-030]
This presentation makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. [...]
Published in Konstantin Beznosov, "Object Security Attributes: Enabling Application-specific Access Control in Middleware," presented at the 4th International Symposium on Distributed Objects Applications (DOA), Irvine, California, 29 October, 2002. :
Transfer from CDS 0.99.7: Download fulltextPDF;
6. Object Security Attributes: Enabling Application-specific Access Control in Middleware / Konstantin Beznosov [LERSSE-RefConfPaper-2005-011]
This paper makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. [...]
Published in Proceedings of 4th International Symposium on Distributed Objects and Applications (DOA), Irvine, California: (October 28 - November 1, 2002) pp. 693-710
Transfer from CDS 0.99.7: Download fulltextPDF;
7. JAMES: Junk Authorizations for Massive-scale Enterprise Services / Konstantin Beznosov [LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: Download fulltextPDF;
8. Flooding and Recycling Authorizations / Konstantin Beznosov [LERSSE-PRESENTATION-2005-018]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations," presentation given at the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, 22 September, 2005, pp.25. :
Transfer from CDS 0.99.7: Download fulltextPDF;
9. Engineering Application-level Access Control in Distributed Systems / Konstantin Beznosov ; Yi Deng [LERSSE-BOOK-2005-001]
This chapter discusses issues of engineering access control solutions in distributed applications for enterprise computing environments. [...]
Published in Konstantin Beznosov, Yi Deng, "Engineering Application-level Access Control in Distributed Systems," in Handbook of Software Engineering And Knowledge Engineering, World Scientific Publishing, vol. 1, ISBN 981-02-4973-X, January, 2002, pp.20. :
Transfer from CDS 0.99.7: Download fulltextPDF;
10. Design and Implementation of Resource Access Decision Server / Luis Espinal ; Konstantin Beznosov ; Yi Deng [LERSSE-REPORT-2005-009]
Decoupling authorization decision logic enables implementation of complex and consistent access control policies across heterogeneous systems. [...]
Published in Luis Espinal, Konstantin Beznosov, Yi. Deng, "Design and Implementation of Resource Access Decision Server," Center for Advanced Distributed Systems Engineering (CADSE). Florida International University, technical report #2000-01, pp.18: (21 January, 2000)
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.