141.
|
Towards Web 2.0 Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-PRESENTATION-2009-075]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada:
Transfer from CDS 0.99.7: PPT;
|
142.
|
Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-POSTER-2009-005]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the USENIX Security 2009, August 13th 2009.:
Transfer from CDS 0.99.7: PDF;
|
143.
|
Revealing Hidden Context: Improving Mental Models of Personal Firewall Users
/ Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-RefConfPaper-2009-034]
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details [...]
Published in Fahimeh Raja, Kirstie Hawkey, and Konstantin Beznosov. Revealing hidden context: Improving
mental models of personal firewall users. In SOUPS '09: Proceedings of the 5th
symposium on Usable privacy and security, New York, NY, USA, 2009. ACM, pp 1-12.
:
Transfer from CDS 0.99.7: PDF;
|
144.
|
Toward Improving Availability and Performance of Enterprise Authorization Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2009-001]
In currently deployed large enterprise systems, policy enforcement points (PDPs) are commonly implemented as logically centralized authorization servers [...]
Published in Talk given at the Faculty of Computer Science, Technical University of Dortmund.:
Transfer from CDS 0.99.7: PDF;
|
145.
|
Analysis of ANSI RBAC Support in Commercial Middleware
/ Wesam M. Darwish
[LERSSE-THESIS-2009-001]
This thesis analyzes the access control architectures of three middleware technologies: Common
Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component
Object Model (COM+) [...]
Published in Wesam M. Darwish, "Analysis of ANSI RBAC Support in Commercial Middleware," Master thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, April, 2009, pp.124. :
Transfer from CDS 0.99.7: PDF;
|
146.
|
Speculative Authorizations
/ Pranab Kini ; Konstantin (Kosta) Beznosov
[LERSSE-POSTER-2009-003]
In a large-scale enterprise system, making authorization decisions is often computationally expensive due to the complexity of the policies involved and the large size of the resource and user populations [...]
Transfer from CDS 0.99.7: PDF;
|
147.
|
Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-POSTER-2009-002]
Web 2.0 users need usable mechanisms for sharing
their content with each other in a controlled manner across
boundaries of content-hosting or application-service providers
(CSPs) [...]
Published in San-Tsai Sun and Konstantin Beznosov. "Poster: Towards enabling secure Web 2.0 user content sharing beyond walled gardens," poster at the IEEE Security and Privacy 2009, May 17th 2009.:
Transfer from CDS 0.99.7: PDF;
|
148.
|
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports
/ Hafiz Abdur Rahman ; Konstantin Beznosov ; José R. Martí
[LERSSE-RefJnlPaper-2009-010]
Understanding the origin of infrastructure failures and their propagation patterns in critical infrastructures can provide important information for secure and reliable infrastructure design. [...]
Published in Hafiz Abdur Rahman, Konstantin Beznosov and José R. Martí, "Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports ", International Journal of Critical Infrastructures 2009 - Vol. 5, No.3 pp. 220 - 244:
Transfer from CDS 0.99.7: PDF;
|
149.
|
Application-Based TCP Hijacking
/ Oliver Zheng ; Jason Poon ; Konstantin Beznosov
[LERSSE-RefConfPaper-2009-033]
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data into an application session without either server or client applications noticing the spoofing attack. [...]
Published in Oliver Zheng, Jason Poon, Konstantin Beznosov, "Application-Based TCP Hijacking," in Proceedings of the 2009 European Workshop on System Security, Nuremberg, Germany, ACM, 31 March 2009, pp. 9-15.:
Transfer from CDS 0.99.7: PDF;
|
150.
|
Usability Meets Access Control: Challenges and Research Opportunities
/ Konstantin Beznosov ; Philip Inglesant ; Jorge Lobo ; Rob Reeder ; et al
[LERSSE-UnrefConfPaper-2009-005]
This panel discusses specific challenges in the usability of access control technologies and new opportunities for research [...]
Published in Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, and Mary Ellen Zurko, "Usability Meets Access Control: Challenges and Research Opportunities," in Proceedings of the ACM Symposium on Access Control Models and Aechnologies (SACMAT), Stresa, Italy, ACM, 3-5 June, 2009 :
Transfer from CDS 0.99.7: PDF;
|