25.
|
Security Engineering for Large Scale Distributed Applications
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-039]
The way security mechanisms for large-scale distributed applications are engineered today has a number of serious drawbacks. [...]
Published in Konstantin Beznosov, "Security Engineering for Large Scale Distributed Applications," Talk given at severall organizations. See the abstract for details., 2003. :
Transfer from CDS 0.99.7: PDF;
|
26.
|
Resource Names for Resource Access Decision (Facility)
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-038]
Presentation given to the joint SecSIG/CORBAmed session on Resource Access Decision facility, as part of the presentation on the revised submission to the OMG Healthcare Resource Access Control RFP [...]
Published in Konstantin Beznosov, "Resource Names for Resource Access Decision (Facility)," presentation given to the joint SecSIG/CORBAmed, OMG, OMG doc # corbamed/99-03-11, 22 March, 1999, pp.18. :
Transfer from CDS 0.99.7: PDF;
|
27.
|
Requirements for Access Control: US Healthcare Domain
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-035]
Roles are important factors in authorization rules. [...]
Published in Konstantin Beznosov, "Requirements for Access Control: US Healthcare Domain," panel presentation givent at the Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM, October, 1998.:
Transfer from CDS 0.99.7: PDF;
|
28.
|
Requirements for Access Control: US Healthcare Domain
/ Konstantin Beznosov
[LERSSE-UnrefConfPaper-2005-003]
Roles are important factors in authorization rules. [...]
Published in Konstantin Beznosov, "Requirements for Access Control: US Healthcare Domain," in Proceedings of the Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM, pp.43: (October, 1998)
Transfer from CDS 0.99.7: PDF;
|
29.
|
Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM)
/ Konstantin Beznosov
[LERSSE-REPORT-2005-012]
In large and complex enterprises, obtaining authorizations could be communicationally and/or computationally expensive, and, due to infrastructure failures, some times even impossible. [...]
Published in Konstantin Beznosov, "Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM)," LERSSE technical report, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, LERSSE-TR-2005-01, pp.15: (March, 2005)
Transfer from CDS 0.99.7: PDF;
|
30.
|
On the Benefits of Decomposing Policy Engines into Components
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-031]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov, "On the Benefits of Decomposing Policy Engines into Components," talk given at The 3rd Workshop on Reflective and Adaptive Middleware, Toronto, Canada, 19 October, 2004. :
Transfer from CDS 0.99.7: PDF;
|
31.
|
Object Security Attributes: Enabling Application-specific Access Control in Middleware
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-030]
This presentation makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. [...]
Published in Konstantin Beznosov, "Object Security Attributes: Enabling Application-specific Access Control in Middleware," presented at the 4th International Symposium on Distributed Objects Applications (DOA), Irvine, California, 29 October, 2002. :
Transfer from CDS 0.99.7: PDF;
|
32.
|
Object Security Attributes: Enabling Application-specific Access Control in Middleware
/ Konstantin Beznosov
[LERSSE-RefConfPaper-2005-011]
This paper makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. [...]
Published in Proceedings of 4th International Symposium on
Distributed Objects and Applications (DOA), Irvine,
California: (October 28 - November 1, 2002) pp. 693-710
Transfer from CDS 0.99.7: PDF;
|
33.
|
JAMES: Junk Authorizations for Massive-scale Enterprise Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: PDF;
|
34.
|
Improving Practical Security Engineering: Overview of the Ongoing Research
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|