1.
|
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
/ Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al
[LERSSE-PRESENTATION-2015-001]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: PDF PDF (PDFA);
|
2.
|
Thwarting fake accounts by predicting their victims
/ Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Matei Ripeanu ; et al
[LERSSE-PRESENTATION-2014-001]
Traditional fake account detection systems employed by today's online social networks rely on either features extracted from user activities, or ranks computed from the underlying social graph. [...]
Published in Boshmaf et al. Thwarting fake accounts by predicting their victims. Invited talk at AAAI 2014 Spring Symposia, Social Hacking and Cognitive Security on the Internet and New Media, Stanford, CA, March, 2014.:
Fulltext: PDF PDF (PDFA);
|
3.
|
Security and Privacy in Online Social Networks
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2013-001]
Facebook has more monthly active users than almost any nation in the world. [...]
Published in Konstantin Beznosov, "Security and Privacy in Online Social Networks," Presentation, 2013, 81p.:
Fulltext: PDF PDF (PDFA);
|
4.
|
Key Challenges in Defending Against Malicious Socialbots
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-PRESENTATION-2012-001]
The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. [...]
Published in Usenix 5th Workshop on Large-scale Exploits and Emerging Threats (LEET'12), San Jose, CA, USA.:
Transfer from CDS 0.99.7: PDF;
|
5.
|
Automated Social Engineering Attacks in OSNs
/ Yazan Boshmaf ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-PRESENTATION-2011-003]
In this presentation, we outline the latest automated social engineering attacks in Online Social Networks (OSNs) such as Facebook [...]
Published in Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu. Automated social engineering attacks in OSNs. The Office of the Privacy Commissioner of Canada (Ottawa), May 2010:
Transfer from CDS 0.99.7: PPT;
|
6.
|
Password Managers, Single Sign-On, Federated ID: Have users signed up?
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2011-002]
Users have not signed up for OpenId. [...]
Published in Konstantin Beznosov, "Password Managers, Single Sign-On, Federated ID: Have users signed up?," panel presentation given at "Workshop on The Future of User Authentication and Authorization on the Web: Challenges in Current Practice, New Threats, and Research Directions," 4 March 2011, 23 pages.:
Transfer from CDS 0.99.7: PDF;
|
7.
|
Is OpenID too Open? Technical, Business, and Human Issues That Get in the Way of OpenID and Ways of Addressing Them
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-PRESENTATION-2011-001]
The web is essential for business and personal activities well beyond information retrieval, such online banking, financial transactions, and payment authorization, but reliable user authentication remains a challenge. [...]
Published in San-Tsai Sun and Konstantin Beznosov, "Is OpenID too Open? Technical, Business, and Human Issues That Get in the Way of OpenID and Ways of Addressing Them," presented at Eurecom, February 24, 2011. 57 pages.:
Transfer from CDS 0.99.7: PDF;
|
8.
|
OpenID Security Analysis and Evaluation
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-PRESENTATION-2010-002]
OpenID is a promising user-centric Web single sign-on protocol. [...]
Published in San-Tsai Sun and Konstantin Beznosov, "OpenID Security Analysis and Evaluation," presented at the OWASP Chapter Meeting, Vancouver, Canada, October 21th 2010:
Transfer from CDS 0.99.7: PDF;
|
9.
|
Open problems in Web 2.0 user content sharing
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-PRESENTATION-2010-001]
Users need useful mechanisms for sharing their Web 2.0 content with each other in a controlled manner across boundaries of content-hosting and service providers (CSPs). [...]
Published in San-Tsai Sun and Konstantin Beznosov, "Open problems in Web 2.0 user content sharing," presented at the iNetSec Workshop, Zurich, Switzerland, April 23th 2009, 44 pages.:
Transfer from CDS 0.99.7: PDF;
|
10.
|
Security Research Advances in 2009
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2009-083]
This presentation reviews latest scientific conference reports on the cutting edge research in computer security. [...]
Published in Konstantin Beznosov, "Security Research Advances in 2009," presented at Vancouver International Security Conference, November 30-December 1, 2009, 56 pages.:
Transfer from CDS 0.99.7: PDF;
|
11.
|
Authorization Using the Publish-Subscribe Model
/ Qiang Wei ; Matei Ripeanu ; Konstantin Beznosov
[LERSSE-PRESENTATION-2009-080]
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers. [...]
Published in Qei Wei, Konstantin Beznosov, and Matei Ripeanu, “Authorization Using Publish/Subscribe Models,” In Proceedings of the 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'08), 10-12 December, 2008, Sydney, Australia. IEEE Computer Society, pp.53-62.:
Transfer from CDS 0.99.7: PDF;
|
12.
|
Authorization Recycling in RBAC Systems
/ Qiang Wei ; Jason Crampton ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-PRESENTATION-2009-079]
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. [...]
Published in Qiang Wei, Jason Crampton, Konstantin Beznosov, and Matei Ripeanu, “Authorization Recycling in RBAC Systems,” in the Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT’08), Estes Park, Colorado, 11-13 June, 2008, pp.63-72.:
Transfer from CDS 0.99.7: PDF;
|
13.
|
Revealing Hidden Context: Improving Users' Mental Models of Personal Firewalls
/ Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-PRESENTATION-2009-078]
Windows Vista’s personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Talk given at Symposium On Usable Privacy and Security (SOUPS), July 2009, at Google in Mountain View, California, US.:
Transfer from CDS 0.99.7: PDF;
|
14.
|
Revealing Hidden Context: Improving Mental Models of Personal Firewall Users
/ Fahimeh Raja ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-PRESENTATION-2009-076]
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada.:
Transfer from CDS 0.99.7: PDF;
|
15.
|
Towards Web 2.0 Content Sharing Beyond Walled Gardens
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-PRESENTATION-2009-075]
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). [...]
Published in Talk given at NSERC ISSNet Workshop 2009, Carleton University, Ottawa, Canada:
Transfer from CDS 0.99.7: PPT;
|
16.
|
Toward Improving Availability and Performance of Enterprise Authorization Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2009-001]
In currently deployed large enterprise systems, policy enforcement points (PDPs) are commonly implemented as logically centralized authorization servers [...]
Published in Talk given at the Faculty of Computer Science, Technical University of Dortmund.:
Transfer from CDS 0.99.7: PDF;
|
17.
|
Management of IT Security in Organizations: What Makes It Hard?
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-073]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. [...]
Published in Konstantin Beznosov, “Management of IT Security in Organizations: What Makes It Hard?” talk given at the SAP Research, Campus-based Engineering Center, Karlsruhe, Germany, 08 July 2008.:
Transfer from CDS 0.99.7: PDF;
|
18.
|
Why (Managing) IT Security is Hard and Some Ideas for Making It Easier
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-072]
The way security mechanisms for distributed applications are engineered today has a number of serious drawbacks. [...]
Published in Konstantin Beznosov, “Why (Managing) IT Security is Hard and Some Ideas for Making It Easier” talk given at the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, 2 June 2008.:
Transfer from CDS 0.99.7: PDF;
|
19.
|
The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-071]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, “The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies” talk given at the Computer Science Department, IBM Research Laboratory, Rüeschlikon, Switzerland, 5 June 2008.:
Transfer from CDS 0.99.7: PDF;
|
20.
|
Toward Understanding the Workplace of IT Security Practitioners
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-070]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. [...]
Published in Konstantin Beznosov, “Toward Understanding the Workplace of IT Security Practitioners” talk given at the Computer Science Department, College University London, 04 July 2008.:
Transfer from CDS 0.99.7: PDF;
|
21.
|
Responding to security incidents: are security tools everything you need?
/ Rodrigo Werlinger ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-PRESENTATION-2008-069]
Presentation given at FIRST'08 conference [...]
Published in Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov, "Responding to security incidents: are security tools everything you need?", presented at FIRST, Vancouver, Canada, June 23-27, 2008.:
Transfer from CDS 0.99.7: PDF;
|
22.
|
A Broad Empirical Study of IT Security Practioners
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-068]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after a security breach [...]
Published in Konstantin Beznosov, "A Broad Empirical Study of IT Security Practioners," talk given at the Coast to Coast Seminar Series, 2008-03-18.:
Transfer from CDS 0.99.7: PDF;
|
23.
|
HOT Admin Research Project: Overview and Results to Date
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2008-067]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after a security breach [...]
Published in Konstantin Beznosov, "HOT Admin Research Project: Overview and Results to Date," presented at the seminar series of GONDWANA (Towards Quantitative Security Metrics) research project, 41 pages, École Polytechnique de Montréal, February 21, 2008.:
Transfer from CDS 0.99.7: PDF;
|
24.
|
On the Imbalance of the Security Problem Space and its Expected Consequences
/ Konstantin Beznosov ; Olga Beznosova
[LERSSE-PRESENTATION-2007-064]
This paper considers the attacker-defender game in the field of computer security as a three-dimensional phenomenon [...]
Published in Konstantin Beznosov, Olga Beznosova "On the Imbalance of the Security Problem Space and its Expected Consequences," Presented at the Symposium on Human Aspects of Information Security & Assurance (HAISA), Plymouth, UK, 10 July, 2007, pp.29.:
Transfer from CDS 0.99.7: PDF;
|
25.
|
Cooperative Secondary Authorization Recycling
/ Qiang Wei ; Matei Ripeanu ; Konstantin Beznosov
[LERSSE-PRESENTATION-2007-063]
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-response paradigm—are facing challenges in terms of fragility and poor scalability [...]
Published in Qiang Wei, Matei Ripeanu, and Konstantin Beznosov, "Cooperative Secondary Authorization Recycling," presented at the 16th Symposium on High Performance Distributed Computing (HPDC'07), June 27, 2007, Monterey, California, USA. pp.24. :
Transfer from CDS 0.99.7: PDF;
|
26.
|
Towards Understanding IT Security Professionals and Their Tools
/ David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al
[LERSSE-PRESENTATION-2007-062]
It is estimated that organizations worldwide will spend around $100 Billion USD on IT Security in 2007. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools," CIPS Vancouver Security SIG Meeting, Vancouver, 13 June, 2007, pp.20.:
Transfer from CDS 0.99.7: PDF;
|
27.
|
A Security Analysis of the Precise Time Protocol
/ Jeanette Tsang ; Konstantin Beznosov
[LERSSE-PRESENTATION-2006-061]
We present a security analysis of the IEEE 1588 standard, a.k.a [...]
Published in Jeanette Tsang, Konstantin Beznosov, "A Security Analysis of the Precise Time Protocol", presented at the Eighth International Conference on Information and Communications Security (ICICS), Raleigh, North Carolina, USA, 5 December, 2006.:
Transfer from CDS 0.99.7: PDF;
|
28.
|
Employing Secondary and Approximate Authorizations to Improve Access Control Systems
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-060]
The request-response paradigm used for developing access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov "Employing Secondary and Approximate Authorizations to Improve Access Control Systems," Halifax, NS, Canada, Faculty of Computer Science, Dalhousie University, 12 October, 2006, pp.43.:
Transfer from CDS 0.99.7: PDF;
|
29.
|
The Secondary and Approximate Authorization Model and its Application to BellLaPadula Policies
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-059]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov "The Secondary and Approximate Authorization Model and its Application to BellLaPadula Policies," Marina del Rey, Clifornia, USA, Computer Networks Division, Information Sciences Institute, the University of Southern California, 6 February, 2006, pp.35.:
Transfer from CDS 0.99.7: PDF;
|
30.
|
Issues in the Security Architecture of the Computerized Patient Record Enterprise
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-058]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov "Issues in the Security Architecture of the Computerized Patient Record Enterprise," presented at the Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, 7 May, 1998, pp.11.:
Transfer from CDS 0.99.7: PDF;
|
31.
|
Towards Agile Security Assurance
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-057]
Agile development methods are promising to become the next generation replacing waterfall development. [...]
Published in Konstantin Beznosov "Towards Agile Security Assurance," presentation given at the Calgary Agile Methods User Group (CAMUG), Calgary, Alberta, Canada, University of Calgary, 3 October, 2006.:
Transfer from CDS 0.99.7: PDF;
|
32.
|
Usable Security: Quo Vadis?
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-056]
The presentation discusses the current state of HCISec and challanges for future research..
Published in Konstantin Beznosov "Usable Security: Quo Vadis?," presented at the USENIX Security panel on usability and security, Vancouver, BC, Canada, USENIX, 2 August, 2006, pp.9.:
Transfer from CDS 0.99.7: PDF;
|
33.
|
HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration
/ Konstantin Beznosov ; Sid Fels ; Lee Iverson ; Brian Fisher
[LERSSE-PRESENTATION-2006-055]
While cryptography, access control, accountability, and other security technologies have received a great deal of attention, to our knowledge this is the first attempt to address systematically the interaction of security administrative models and technologies with usability within an organization [...]
Published in Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration," CIPS Vancouver Security SIG Meeting, Vancouver, 8 March, 2006, pp.35.:
Transfer from CDS 0.99.7: PDF;
|
34.
|
Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data
/ Hafiz Abdur Rahman ; Konstantin Beznosov
[LERSSE-PRESENTATION-2006-052]
* Objectives * Information Requirement for CITI Failure Analysis * Use of Public Domain Failure Reports * Existing Classification Methods * Our Method of Classification and Analysis * Results of our Analysis * Conclusions
Published in Hafiz Abdur Rahman and Konstantin Beznosov, "Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data," JIIRP Technical Meeting, University of British Columbia, ICICS, 27 January, 2006, pp.26. :
Transfer from CDS 0.99.7: PDF;
|
35.
|
Resource Access Decision Service for CORBA-based Distributed Systems
/ Konstantin Beznosov ; Yi Deng ; Bob Blakley ; Carol Burt ; et al
[LERSSE-PRESENTATION-2006-051]
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are used in authorization decisions as well as access control models, no matter how dynamic those polices and factors are [...]
Published in Barkley, "A Resource Access Decision Service for CORBA-based Distributed
Systems," presented at the Annual Computer Security Applications Conference
(ACSAC), Phoenix, Arizona, U.S.A., 10 December, 1999, pp.13. :
Transfer from CDS 0.99.7: PDF;
|
36.
|
Secondary and Approximate Authorization Model (SAAM) and its Application to Bell-LaPadula Policies
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2006-050]
The talk defines the secondary and approximate authorization model (SAAM) [...]
Published in Authorization Model (SAAM) and its Application to Bell-LaPadula Policies," Los
Angeles, Information Sciences Institute, 6 February, 2006, pp.35. :
Transfer from CDS 0.99.7: PDF;
|
37.
|
Usability of Security Administration vs. Usability of End-user Security
/ Mary Ellen Zurko ; Steve Chan ; Greg Conti ; Konstantin Beznosov
[LERSSE-PRESENTATION-2005-049]
Having recently received increasing attention, usable security is implicitly all about the end user who employs a computer system to accomplish security-unrelated business or personal goals [...]
Published in Mary Ellen Zurko, Steve Chan, Greg Conti, Konstantin Beznosov, "Usability of Security Administration vs. Usability of End-user Security," slides of the corresponding panel at the Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, 8 July, 2005, pp.35.:
Transfer from CDS 0.99.7: PDF;
|
38.
|
Update on Security Domain Membership RFP Proposal
/ Konstantin Beznosov ; Tadashi Kaji
[LERSSE-PRESENTATION-2005-048]
Presentation explains structural design proposed by the SDMM proposal, as it was standing on December 2000..
Published in Konstantin Beznosov, Tadashi Kaji, "Update on Security Domain Membership RFP Proposal," presented to the OMG ORB/OS PTF, OMG docuement orbos/00-12-07, 12 December, 2000, pp.23. :
Transfer from CDS 0.99.7: PDF;
|
39.
|
Upcoming OMG HealthCare Resource Access Control Facility
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-047]
Outline: • CORBA in 5 minutes • CORBA security model • Why HRAC • HRAC concepts • HRAC framework design • Work status
Published in Konstantin Beznosov, "Upcoming OMG HealthCare Resource Access Control Facility," presentation on Resource Access Decision facility given to SIG Secure at HL7 meeting, Orlando, FL, USA, SIG Secure, HL7, 26 January, 1999, pp.14.:
Transfer from CDS 0.99.7: PDF;
|
40.
|
Towards Agile Security Assurance
/ Konstantin Beznosov ; Philippe Kruchten
[LERSSE-PRESENTATION-2005-046]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Konstantin Beznosov, Philippe Kruchten, "Towards Agile Security Assurance," presentation given at The New Security Paradigms Workshop (NSPW), White Point Beach Resort, Nova Scotia, Canada, 20 September, 2004. :
Transfer from CDS 0.99.7: PDF;
|
41.
|
Towards Agile Security Assurance
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-045]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Konstantin Beznosov, "Towards Agile Security Assurance," presentation given at the Department of Computer Science, Waterloo, Ontario, Canada, University of Waterloo, 18 October, 2004. :
Transfer from CDS 0.99.7: PDF;
|
42.
|
Toward Usable Security Administration
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-044]
Administration of protection mechanisms for large networked information enterprises is challenging due to large numbers of application instances resources and users, complex and dynamic business processes, and high (and always growing) volume of change because of the first two (large scale and dynamics). [...]
Published in Konstantin Beznosov, "Toward Usable Security Administration," presented at the 4th Annual Advanced Networks Conference, Vancouver, Canada, 27 April, 2004.:
Transfer from CDS 0.99.7: PDF;
|
43.
|
Toward Usable Security Administration
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-043]
Administration of protection mechanisms for large networked information enterprises is challenging due to large numbers of application instances resources and users, complex and dynamic business processes, and high (and always growing) volume of change because of the first two (large scale and dynamics). [...]
Published in Konstantin Beznosov, "Toward Usable Security Administration," presentation given at the 4th Annual Advanced Networks Conference, Vancouver, BC, Canada, 27 April, 2004.:
Transfer from CDS 0.99.7: PDF;
|
44.
|
Software Engineering at ECE
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-042]
This talk gives a brief overview of the Software Engineering teaching and research at the Department of Electrical and Computer Engineering, the University of British Columbia..
Published in Konstantin Beznosov, "Software Engineering at ECE," brief update given at the UBC\'s ECE Advisory Council meeting, Vancouver, B.C., Canada, 2 November, 2003. :
Transfer from CDS 0.99.7: PDF;
|
45.
|
Security Requirements in Healthcare
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-041]
Presentation on requirements in US healthcare organizations to security vendors, given to the joint SecSIG/CORBAmed session [...]
Published in Konstantin Beznosov, "Security Requirements in Healthcare," presentation given to the joint SecSIG/CORBAmed, OMG, OMG doc # corbamed/99-03-16, 23 March, 1999, pp.16. :
Transfer from CDS 0.99.7: PDF;
|
46.
|
Security Engineering for Large Scale Distributed Applications
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-040]
The way security mechanisms for large-scale distributed applications are engineered today has a number of serious drawbacks. [...]
Published in Konstantin Beznosov, "Security Engineering for Large Scale Distributed Applications," Talk given at the Department of Computer Science, Vrije University, Amsterdam, 17 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|
47.
|
Security Engineering for Large Scale Distributed Applications
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-039]
The way security mechanisms for large-scale distributed applications are engineered today has a number of serious drawbacks. [...]
Published in Konstantin Beznosov, "Security Engineering for Large Scale Distributed Applications," Talk given at severall organizations. See the abstract for details., 2003. :
Transfer from CDS 0.99.7: PDF;
|
48.
|
Resource Names for Resource Access Decision (Facility)
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-038]
Presentation given to the joint SecSIG/CORBAmed session on Resource Access Decision facility, as part of the presentation on the revised submission to the OMG Healthcare Resource Access Control RFP [...]
Published in Konstantin Beznosov, "Resource Names for Resource Access Decision (Facility)," presentation given to the joint SecSIG/CORBAmed, OMG, OMG doc # corbamed/99-03-11, 22 March, 1999, pp.18. :
Transfer from CDS 0.99.7: PDF;
|
49.
|
Resource Access Decision Server: Design and Performance Considerations
/ Konstantin Beznosov ; Luis Espinal
[LERSSE-PRESENTATION-2005-037]
Presentation on the design and the conducted performance measurements of RAD server prototype built at CADSE [...]
Published in Konstantin Beznosov, Luis Espinal, "Resource Access Decision Server: Design and Performance Considerations," presentation given at CADSE, Miami, FL, USA, CADSE, SCS, FIU, 22 October, 5 November, 1999, pp.25.:
Transfer from CDS 0.99.7: PDF;
|
50.
|
Resource Access Decision Facility: Overview
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-036]
Outline: • Why you need Resource Access Decision Facility • Main aspects of RAD specification design • Main design decisions made by RAD submission team
Published in Konstantin Beznosov, "Resource Access Decision Facility: Overview," presentation given at DOCsec Workshop, Baltimore, Maryland, USA, OMG, 15 July, 1999, pp.21.:
Transfer from CDS 0.99.7: PDF;
|
51.
|
Requirements for Access Control: US Healthcare Domain
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-035]
Roles are important factors in authorization rules. [...]
Published in Konstantin Beznosov, "Requirements for Access Control: US Healthcare Domain," panel presentation givent at the Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM, October, 1998.:
Transfer from CDS 0.99.7: PDF;
|
52.
|
Preview: Mastering Web Services Security
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-034]
This presentation gives an overview of the upcoming book on Mastering Web Services Security that I co-authored with my colleagues at Quadrasis..
Published in Konstantin Beznosov, "Preview: Mastering Web Services Security," presentation given at Computer Science department, Zurich, Switzerland, IBM Research Laboratory, 16 September, 2002. :
Transfer from CDS 0.99.7: PDF;
|
53.
|
Overview of Reference Model of Open Distributed Processing (RM-ODP)
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-033]
Outline: - Why Languages for Enterprises? - Introduction - RM-ODP goal - What it de nes - Viewpoints - Modeling in RM-ODP - Languages - Analysis of RM-ODP - Summary - Additional Information
Published in Konstantin Beznosov, "Overview of Reference Model of Open Distributed Processing (RM-ODP)," presentation given at CADSE, Miami, FL, USA, School of Computer Science, FIU, 17 July, 1998, pp.25. :
Transfer from CDS 0.99.7: PDF;
|
54.
|
Overview of CORBA Security
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-032]
Outline: • Introduction into computer security • Security in OO systems • CORBA security model overview • Application access control in CORBA • Resource Access Decision Facility • Further Information
Published in Konstantin Beznosov, "Overview of CORBA Security," lecture given to he students of graduate class CEN6502, Topics in Concurrent and Distributed Systems, Miami, FL, USA, SCS, FIU, 8 March, 2000, pp.27.:
Transfer from CDS 0.99.7: PDF;
|
55.
|
On the Benefits of Decomposing Policy Engines into Components
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-031]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov, "On the Benefits of Decomposing Policy Engines into Components," talk given at The 3rd Workshop on Reflective and Adaptive Middleware, Toronto, Canada, 19 October, 2004. :
Transfer from CDS 0.99.7: PDF;
|
56.
|
Object Security Attributes: Enabling Application-specific Access Control in Middleware
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-030]
This presentation makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. [...]
Published in Konstantin Beznosov, "Object Security Attributes: Enabling Application-specific Access Control in Middleware," presented at the 4th International Symposium on Distributed Objects Applications (DOA), Irvine, California, 29 October, 2002. :
Transfer from CDS 0.99.7: PDF;
|
57.
|
Middleware and Web Services Security Mechanisms
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-029]
Learning objectives: Gain a working knowledge of the security mechanisms of current Middleware and Web Services technologies. [...]
Published in Konstantin Beznosov, "Middleware and Web Services Security Mechanisms," lecture given at the secure application development course SecAppDev course, Brussels, Belgium, Katholieke Universiteit Leuven, 2 March, 2005, pp.65. :
Transfer from CDS 0.99.7: PDF;
|
58.
|
Middleware and Web Services Security
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-028]
Challenges of designing secure distributed applications are due to distribution, scale and object orientation. [...]
Published in Konstantin Beznosov, "Middleware and Web Services Security," tutorial given at JavaPolis University, Antwerp, Belgium, Belgium Java Users Group, 14 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|
59.
|
JAMES: Junk Authorizations for Massive-scale Enterprise Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: PDF;
|
60.
|
Issues in the Security Architecture of the Computerized Patient Record Enterprise
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-026]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," presentation given at Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, Object Management Group, 7 May, 1998. :
Transfer from CDS 0.99.7: PDF;
|
61.
|
Issues in the Security Architecture of the Computerized Patient Record Enterprise
/ Beznosov, K
[LERSSE-PRESENTATION-2005-025]
We discuss issues in CPR enterprise security architecture. [...]
Transfer from CDS 0.99.7: PDF;
|
62.
|
Introduction to Cryptography, Part II
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-024]
Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Introduction to Cryptography, Part II," presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 7 April, 1998. :
Transfer from CDS 0.99.7: PDF;
|
63.
|
Introduction to Cryptography, Part I: Probabilistic Encryption
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-023]
Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks
Published in Konstantin Beznosov, "Introduction to Cryptography, Part I: Probabilistic Encryption," presentation given at the class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 2 April, 1998.:
Transfer from CDS 0.99.7: PDF;
|
64.
|
Improving Practical Security Engineering: Overview of the Ongoing Research
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|
65.
|
Human Factor in Security Administration: Brainstorming the Research Directions
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-021]
Although usability has been acknowledged by the security community as one of the design goals back in 1970s, there is dearth of applications of HCI methods to the domain of computer security in general and security administration in particular. [...]
Published in Konstantin Beznosov, "Human Factor in Security Administration: Brainstorming the Research Directions," presentation given at SEEDS, Vancouver, BC, Canada, SEEDS, ECE, UBC, 2 December, 2003. :
Transfer from CDS 0.99.7: PDF;
|
66.
|
HIPAA and CPR Architecture
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-020]
The presentation that describes Health Insurance Portability and Accountability Act (HIPAA) from the perspective of the Computerized Patient Record (CPR) Architecture [...]
Published in Konstantin Beznosov, "HIPAA and CPR Architecture," presentation given to IT leadership of the Baptist Health Systems, Miami, FL, USA, Baptist Health Systems of South Florida, 19 April, 1999, pp.17.:
Transfer from CDS 0.99.7: PDF;
|
67.
|
Handouts: Introduction to Cryptography
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-019]
Outline: - Probabilistic encryption - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Handouts: Introduction to Cryptography," handouts for the presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, April, 1998. :
Transfer from CDS 0.99.7: PDF;
|
68.
|
Flooding and Recycling Authorizations
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-018]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations," presentation given at the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, 22 September, 2005, pp.25. :
Transfer from CDS 0.99.7: PDF;
|
69.
|
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-016]
This presentation reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services. [...]
Published in Konstantin Beznosov, "Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services," presented at the Eighth International SIGSOFT Symposium on Component-based Software Engineering (CBSE), St. Louis, Missouri, USA, 15 May, 2005. :
Transfer from CDS 0.99.7: PDF;
|
70.
|
Design
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-006]
Learning objectives: * understand the principles of engineering secure systems. [...]
Published in
application development course SecAppDev course, Brussels, Belgium, Katholieke
Universiteit Leuven, 2, 3 March, 2005, pp.55. :
Transfer from CDS 0.99.7: PDF;
|
71.
|
Computer and Distributed Security: Introductory Overview for Researchers
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-015]
Outline: - What is security of computer systems - Security and usability - The main challenge for security - Threats, Vulnerabilities, and Attacks - Security Concerns - Distributed Security - Security Functionalities - Summary - References
Published in Konstantin Beznosov, "Computer and Distributed Security: Introductory Overview for Researchers," presentation given at the CADSE, Miami, FL, USA, CADSE, School of Computer Science, FIU, 2 October, 1998, pp.25. :
Transfer from CDS 0.99.7: PDF;
|
72.
|
BHS Information Enterprise Architecture
/ Konstantin Beznosov ; Eric Butler ; Eric Navarro
[LERSSE-PRESENTATION-2005-014]
Published in Konstantin Beznosov, Eric Butler, Eric Navarro, "BHS Information Enterprise Architecture," presentation given at CADSE, Miami, FL, USA, CADSE, SCS, FIU, 22 January, 1999, pp.21. :
Transfer from CDS 0.99.7: PDF;
|
73.
|
Attribute Function: an Enabler for Effective Inexpensive Application-specific Security Decisions
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-013]
Security is an essential feature and foremost concern to Internet and enterprise distributed software applications. [...]
Published in Konstantin Beznosov, "Attribute Function: an Enabler for Effective Inexpensive Application-specific Security Decisions," presentation given to the SEEDS, ECE, UBC, Vancouver, BC, Canada, ECE, UBC, 16 September, 2003. :
Transfer from CDS 0.99.7: PDF;
|
74.
|
Architecture-Centered Composition of Adaptive and Dependable Enterprise Security Services
/ Yi Deng ; Konstantin Beznosov
[LERSSE-PRESENTATION-2005-012]
Security is an essential feature and foremost concern to enterprise software systems. [...]
Published in Yi Deng, Konstantin Beznosov, "Architecture-Centered Composition of Adaptive and Dependable Enterprise Security Services," presented at IBM T. J. Watson Research Center, NY, USA, 14 February, 2000, pp.32. :
Transfer from CDS 0.99.7: PDF;
|
75.
|
Architecture of Information Enterprises: Problems and Perspectives
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-011]
Current problems, constrains, goals, and approaches in developing architecture of information enterprises are reviewed [...]
Published in Konstantin Beznosov, "Architecture of Information Enterprises: Problems and Perspectives," term paper for graduate course in Advanced Software Engineering, Miami, FL, School of Computer Science, Florida International University, 15 April, 1998, pp.12.:
Transfer from CDS 0.99.7: PDF;
|
76.
|
Architectural Separation of Authorization and Application Logic in Distributed Systems
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-010]
Security is an essential feature and foremost concern to enterprise software systems [...]
Published in Konstantin Beznosov, "Architectural Separation of Authorization and Application Logic in Distributed Systems," talk given at several organizations, see abstract for details, April--May, 2000. :
Transfer from CDS 0.99.7: PDF;
|
77.
|
An Overview of The Ongoing Research at LERSSE
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-009]
This presentation provides an overview of the research projects undergoing at the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) [...]
Published in Konstantin Beznosov, "An Overview of The Ongoing Research at LERSSE," KTH, Stockholm, 9 June, 2005, pp.76. :
Transfer from CDS 0.99.7: PDF;
|
78.
|
Access Control Architectures: COM+ vs. EJB
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-008]
This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. [...]
Published in Konstantin Beznosov, "Access Control Architectures: COM+ vs. EJB," tutorial has been given at the JavaPolis, Antwerpen, Belgium, 16 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|
79.
|
Access Control
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-007]
Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\\'s: * operating systems, * middleware, * virtual machines. [...]
Published in Konstantin Beznosov, "Access Control," lecture given at the secure application development course SecAppDev course, Brussels, Belgium, Katholieke Universiteit Leuven, 28 February, 2005, pp.46. :
Transfer from CDS 0.99.7: PDF;
|
80.
|
A Study of Three Workstation-Server Architectures for Object Oriented Database Systems
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-006]
It presents a paper by David DeWitt, et al \"A Study of Three Workstation-Server Architectures for Object Oriented Database Systems\" [...]
Published in Architectures for Object Oriented Database Systems," presentation at graduate
course COP 6545 \"Advanced Database Systems\", Miami, FL, School of Computer
Science, Florida International University, 23 October, 1996, pp.11.
:
Transfer from CDS 0.99.7: PDF;
|
81.
|
A Framework for Implementing Role-based Access Control Using CORBA Security Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-005]
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," presentation given at CADSE, Miami, FL, USA, Center for Advanced Distributed Systems Engineering (CADSE), School of Computer Science (SCS), Florida International University (FIU), 14, 21 May, 1999, pp.53. :
Transfer from CDS 0.99.7: PDF;
|
82.
|
A Framework for Implementing Role-based Access Control Using CORBA Security Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-004]
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," presented at the Fourth ACM Workshop on Role-Based Access Control (RBAC), Fairfax, Virginia, USA, ACM, 28 October, 1999, pp.29. :
Transfer from CDS 0.99.7: PDF;
|
83.
|
A Design of An Authorization Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-003]
Outline: • CORBA security model • What CORBA Access Model does[ not] Cover • Healthcare Resource Access Control (H-RAC) high level view • Authorization Service framework design details
Published in Konstantin Beznosov, "A Design of An Authorization Service," presentation given at CADSE, Miami, FL, USA, SCS, FIU, 12 February, 1999, pp.16. :
Transfer from CDS 0.99.7: PDF;
|
84.
|
Accountability and Availability
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-002]
Learning objectives: Comprehend the principles of security accountability and availability. [...]
Published in Konstantin Beznosov, "Accountability and Availability," lecture given at the secure application development course SecAppDev course, Brussels, Belgium, Katholieke Universiteit Leuven, 1 March, 2005, pp.43. :
Transfer from CDS 0.99.7: PDF;
|
85.
|
A Security Analysis of the IEEE 1588 Standard
/ Jeanette Tsang ; Konstantin Beznosov
[TEST-PRESENTATION-2005-001]
Published in Jeanette Tsang, Konstantin Beznosov, "A Security Analysis of the IEEE 1588 Standard", presented at the 2005 Conference on IEEE-1588 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, October 2005.:
Transfer from CDS 0.99.7: PDF;
|