Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 311 records found  beginprevious255 - 264nextend  jump to record: Search took 0.00 seconds. 
255. Method and System for Authorization and Access to Protected Resources / Konstantin Beznoso ; Jennifer Carter ; James Mwaura ; Hieu Nguyen [LERSSE-PATENT-2005-001]
The present invention relates to the access of data resources using a Resource Access Decision Facility (RAD), preferably a CORBA RAD. [...]
Published in Konstantin Beznosov, Jennifer Carter, James Mwaura, Hieu Nguyen, "Method and System for Authorization and Access to Protected Resources," Sprint Communications Company L.P., United States Application Serial Number 10/132,838, 25 April, 2002.:
Transfer from CDS 0.99.7: Download fulltextPDF;
256. Mastering Web Services Security / Bret Hartman ; Donald J. Flinn ; Konstantin Beznosov ; Shirley Kawamoto [LERSSE-BOOK-2005-003]
We present material on how to use the architectures and technologies and how to understand the specifications that are available to build a secure Web Services system. [...]
Published in Bret Hartman, Donald J. Flinn, Konstantin Beznosov, Shirley Kawamoto, "Mastering Web Services Security," New York, New York, USA, John Wiley Sons, Inc., ISBN 0-471-26716-3, January, 2003, pp.464. :
Transfer from CDS 0.99.7: Download fulltextPDF;
257. KOZEL: Kernel Organization Zappy Environment for Linux / Konstantin Beznosov ; Sergey Fedorishin [LERSSE-REPORT-2005-010]
This report describes application domain, design and usage of Kernel Organization Zappy Environment for Linux (KOZEL, pronounced “kozz’jol”) developed during a term project for Expert Systems cource CEN5120 tought by Dr. [...]
Published in KOZEL: Kernel Organization Zappy Environment for Linux," term project report for CEN 5120 course Expert Systems, School of Computer Science, Florida International University, Miami, FL, USA: (28 April, 1997)
Transfer from CDS 0.99.7: Download fulltextPDF;
258. JAMES: Junk Authorizations for Massive-scale Enterprise Services / Konstantin Beznosov [LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: Download fulltextPDF;
259. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Konstantin Beznosov [LERSSE-PRESENTATION-2005-026]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," presentation given at Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, Object Management Group, 7 May, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
260. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Konstantin Beznosov [LERSSE-UnrefConfPaper-2005-002]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," in Proceedings of the Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, pp.5: (May, 1998)
Transfer from CDS 0.99.7: Download fulltextPDF;
261. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Beznosov, K [LERSSE-PRESENTATION-2005-025]
We discuss issues in CPR enterprise security architecture. [...]
Transfer from CDS 0.99.7: Download fulltextPDF;
262. Introduction to Cryptography, Part II / Konstantin Beznosov [LERSSE-PRESENTATION-2005-024]
Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Introduction to Cryptography, Part II," presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 7 April, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
263. Introduction to Cryptography, Part I: Probabilistic Encryption / Konstantin Beznosov [LERSSE-PRESENTATION-2005-023]
Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks
Published in Konstantin Beznosov, "Introduction to Cryptography, Part I: Probabilistic Encryption," presentation given at the class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 2 April, 1998.:
Transfer from CDS 0.99.7: Download fulltextPDF;
264. Improving Practical Security Engineering: Overview of the Ongoing Research / Konstantin Beznosov [LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 311 records found   beginprevious255 - 264nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.