212.
|
Evaluation of SAAM_BLP
/ Kyle Zeeuwen ; Konstantin Beznosov
[LERSSE-REPORT-2006-017]
Request response access control systems that use Policy Decision Points have their reliability and latency bounded by network communication. [...]
Published in Kyle Zeeuwen, Konstantin Beznosov, "Evaluation of SAAM_BLP" LERSSE Technical Report LERSSE-TR-2006-01, July 21, 2006.:
Transfer from CDS 0.99.7: PDF;
|
213.
|
The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies
/ Jason Crampton ; Wing Leung ; Konstantin Beznosov
[LERSSE-RefConfPaper-2006-017]
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. [...]
Published in Jason Crampton, Wing Leung, Konstantin Beznosov "The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies," In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), Lake Tahoe, California, USA, ACM, 7-9 June, 2006, pp.111-120.:
Transfer from CDS 0.99.7: PDF;
|
214.
|
Perforce Installation Guide
/ Qiang Wei
[LERSSE-etc-2006-002]
This document provides a simple guide on how to install perforce in Windows platform..
Published in Qiang Wei, "Perforce Installation Guide," Lersse, 2006.:
Transfer from CDS 0.99.7: PDF;
|
215.
|
SaamViz - Visualizer for SAAM
/ Johnson Ming-Che Tsai
[LERSSE-REPORT-2006-016]
The purpose of the project is to create a visualization component for the secondary and approximate authorization model (SAAM) simulator to assist in the study of SAAM. [...]
Published in J. Tsai, "SaamViz - Visualizer for SAAM," Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical Report LERSSE-TR-2006-XX, 2006.:
Transfer from CDS 0.99.7: PDF;
|
216.
|
Summary of the HOT Admin Proposal
/ Konstantin Beznosov ; Sidney Fels ; Brian Fisher ; Lee Iverson
[LERSSE-etc-2006-001]
Published in Konstantin Beznosov, Sidney Fels, Brian Fisher, Lee Iverson, "Summary of the HOT Admin Proposal," December 2005, pp. 2.:
Transfer from CDS 0.99.7: PDF;
|
217.
|
HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration
/ Konstantin Beznosov ; Sid Fels ; Lee Iverson ; Brian Fisher
[LERSSE-PRESENTATION-2006-055]
While cryptography, access control, accountability, and other security technologies have received a great deal of attention, to our knowledge this is the first attempt to address systematically the interaction of security administrative models and technologies with usability within an organization [...]
Published in Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration," CIPS Vancouver Security SIG Meeting, Vancouver, 8 March, 2006, pp.35.:
Transfer from CDS 0.99.7: PDF;
|
218.
|
Extending XP Practices to Support Security Requirements Engineering
/ Gustav Boström ; Jaana Wäyrynen ; Marine Bodén, ; Konstantin Beznosov ; et al
[LERSSE-RefConfPaper-2006-016]
This paper proposes a way of extending eXtreme Programming (XP) practices, in particular the original planning game and the coding guidelines, to aid the developers and the customer to engineer security requirements while maintaining the iterative and rapid feedback-driven nature of XP. [...]
Published in Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten, "Extending XP Practices to Support Security Requirements Engineering," Proceedings of Workshop on Software Engineering for Secure Systems (SESS), Shanghai, China, ACM, 20–21 May, 2006, pp.11-17.:
Transfer from CDS 0.99.7: PDF;
|
219.
|
Assessment of Interdependencies between Communication and Information Technology Infrastructure and other Critical Infrastructures from Public Failure Reports
/ Hafiz Abdur Rahman ; Konstantin Beznosov
[LERSSE-REPORT-2006-015]
Failure in Communication and Information Technology Infrastructure (CITI) can disrupt the effective functionalities of many of the critical infrastructures. [...]
Published in Hafiz Abdur Rahman, Konstantin Beznosov, "Assessment of Interdependencies between Communication and Information Technology Infrastructure and other Critical infrastructures from Public Failure Reports," Laboratory for Education and Research in Secure Systems Engineering, Vancouver, B.C., Canada, University of British Columbia, technical report LERSSE-TR-2005-03, 24 February, 2005, pp.34.:
Transfer from CDS 0.99.7: PDF;
|
220.
|
Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data
/ Hafiz Abdur Rahman ; Konstantin Beznosov
[LERSSE-PRESENTATION-2006-052]
* Objectives * Information Requirement for CITI Failure Analysis * Use of Public Domain Failure Reports * Existing Classification Methods * Our Method of Classification and Analysis * Results of our Analysis * Conclusions
Published in Hafiz Abdur Rahman and Konstantin Beznosov, "Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data," JIIRP Technical Meeting, University of British Columbia, ICICS, 27 January, 2006, pp.26. :
Transfer from CDS 0.99.7: PDF;
|
221.
|
Resource Access Decision Service for CORBA-based Distributed Systems
/ Konstantin Beznosov ; Yi Deng ; Bob Blakley ; Carol Burt ; et al
[LERSSE-PRESENTATION-2006-051]
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are used in authorization decisions as well as access control models, no matter how dynamic those polices and factors are [...]
Published in Barkley, "A Resource Access Decision Service for CORBA-based Distributed
Systems," presented at the Annual Computer Security Applications Conference
(ACSAC), Phoenix, Arizona, U.S.A., 10 December, 1999, pp.13. :
Transfer from CDS 0.99.7: PDF;
|