Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 45 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
11. Authorization Using the Publish-Subscribe Model / Qiang Wei ; Matei Ripeanu ; Konstantin Beznosov [LERSSE-RefConfPaper-2008-031]
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers. [...]
Published in Qiang Wei, Matei Ripeanu, and Konstantin Beznosov. Authorization using the publishsubscribe model. In Proceedings of the 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA), pages 53-62, Sydney, Australia, December 10-12 2008. IEEE Computer Society.:
Transfer from CDS 0.99.7: Download fulltextPDF;
12. The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies / Konstantin Beznosov [LERSSE-PRESENTATION-2008-071]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, “The Secondary and Approximate Authorization Model and its Application to BLP and RBAC Policies” talk given at the Computer Science Department, IBM Research Laboratory, Rüeschlikon, Switzerland, 5 June 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
13. Authorization Recycling in RBAC Systems / Qiang Wei ; Jason Crampton ; Konstantin Beznosov ; Matei Ripeanu [LERSSE-RefConfPaper-2008-026]
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. [...]
Published in Qiang Wei, Jason Crampton, Konstantin Beznosov, and Matei Ripeanu. Authorization recycling in RBAC systems. In SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, Estes Park, Colorado, USA, June 11-13 2008, pp. 63-72. :
Transfer from CDS 0.99.7: Download fulltextPDF;
14. Proceedings of the Second EECE 512 Mini-Conference on Computer Security / Brett Cannon ; Jeremy Hilliker ; Maryam Najafian Razavi ; Rodrigo Werlinger [LERSSE-REPORT-2007-022]
The proceedings of the second mini-conference of the EECE 512 course on Topics in Computer Security include four papers: 1. [...]
Published in Brett Cannon and Jeremy Hilliker and Maryam Najafian Razavi and Rodrigo Werlinger, "Proceedings of the Second EECE 512 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-03, 2007, http://lersse-dl.ece.ubc.ca:
Transfer from CDS 0.99.7: Download fulltextPDF;
15. Support for ANSI RBAC in CORBA / Konstantin Beznosov ; Wesam Darwish [LERSSE-REPORT-2007-019]
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language than the CORBA Security specification (CORBASec). [...]
Published in Konstantin Beznosov, Wesam Darwish "Support for ANSI RBAC in CORBA," Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2007-01, 26 July, 2007, pp.42.:
Transfer from CDS 0.99.7: Download fulltextPDF;
16. Employing Secondary and Approximate Authorizations to Improve Access Control Systems / Konstantin Beznosov [LERSSE-PRESENTATION-2006-060]
The request-response paradigm used for developing access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov "Employing Secondary and Approximate Authorizations to Improve Access Control Systems," Halifax, NS, Canada, Faculty of Computer Science, Dalhousie University, 12 October, 2006, pp.43.:
Transfer from CDS 0.99.7: Download fulltextPDF;
17. The Secondary and Approximate Authorization Model and its Application to BellLaPadula Policies / Konstantin Beznosov [LERSSE-PRESENTATION-2006-059]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov "The Secondary and Approximate Authorization Model and its Application to BellLaPadula Policies," Marina del Rey, Clifornia, USA, Computer Networks Division, Information Sciences Institute, the University of Southern California, 6 February, 2006, pp.35.:
Transfer from CDS 0.99.7: Download fulltextPDF;
18. The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies / Jason Crampton ; Wing Leung ; Konstantin Beznosov [LERSSE-RefConfPaper-2006-017]
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. [...]
Published in Jason Crampton, Wing Leung, Konstantin Beznosov "The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies," In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), Lake Tahoe, California, USA, ACM, 7-9 June, 2006, pp.111-120.:
Transfer from CDS 0.99.7: Download fulltextPDF;
19. Resource Access Decision Service for CORBA-based Distributed Systems / Konstantin Beznosov ; Yi Deng ; Bob Blakley ; Carol Burt ; et al [LERSSE-PRESENTATION-2006-051]
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are used in authorization decisions as well as access control models, no matter how dynamic those polices and factors are [...]
Published in Barkley, "A Resource Access Decision Service for CORBA-based Distributed Systems," presented at the Annual Computer Security Applications Conference (ACSAC), Phoenix, Arizona, U.S.A., 10 December, 1999, pp.13. :
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Secondary and Approximate Authorization Model (SAAM) and its Application to Bell-LaPadula Policies / Konstantin Beznosov [LERSSE-PRESENTATION-2006-050]
The talk defines the secondary and approximate authorization model (SAAM) [...]
Published in Authorization Model (SAAM) and its Application to Bell-LaPadula Policies," Los Angeles, Information Sciences Institute, 6 February, 2006, pp.35. :
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 45 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.