Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 35 records found  beginprevious26 - 35  jump to record: Search took 0.00 seconds. 
26. On the Imbalance of the Security Problem Space and its Expected Consequences / Konstantin Beznosov ; Olga Beznosova [LERSSE-PRESENTATION-2007-064]
This paper considers the attacker-defender game in the field of computer security as a three-dimensional phenomenon [...]
Published in Konstantin Beznosov, Olga Beznosova "On the Imbalance of the Security Problem Space and its Expected Consequences," Presented at the Symposium on Human Aspects of Information Security & Assurance (HAISA), Plymouth, UK, 10 July, 2007, pp.29.:
Transfer from CDS 0.99.7: Download fulltextPDF;
27. A Study of Security Administration Errors / Kartik Markandan [LERSSE-REPORT-2007-021]
Security administrators prevent security breaches against their infrastructure by using their tools to implement the security policy. [...]
Published in Kartik Markandan, "A Study of Security Administration Errors", Laboratory for Education and Research in Secure Systems Engineering, Vancouver, Canada, University of British Columbia, technical report LERSSE-TR-2006-03, 17 December, 2006, pp.12.:
Transfer from CDS 0.99.7: Download fulltextPDF;
28. Towards Understanding IT Security Professionals and Their Tools / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-PRESENTATION-2007-062]
It is estimated that organizations worldwide will spend around $100 Billion USD on IT Security in 2007. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools," CIPS Vancouver Security SIG Meeting, Vancouver, 13 June, 2007, pp.20.:
Transfer from CDS 0.99.7: Download fulltextPDF;
29. Detecting, Analyzing and Responding to Security Incidents: A Qualitative Analysis / Rodrigo Werlinger ; David Botta [LERSSE-RefConfPaper-2007-024]
This study develops categories of responses to security incidents, based on a grounded theory analysis of interviews with security practitioners, with a focus on the tasks performed during security incidents, and the necessary resources to perform these tasks. [...]
Published in Rodrigo Werlinger, David Botta, "Detecting, Analyzing and Responding to Security Incidents: A Qualitative Analysis," in Workshop on Usable IT Security Management (USM'07), July 18, 2007, Pittsburgh, PA, USA.:
Transfer from CDS 0.99.7: Download fulltextPDF;
30. Understanding IT Security Administration through a Field Study / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-REPORT-2007-002] [LERSSE-REPORT-2007-020]
The security administration of large organizations is exceptionally challenging due to the increasingly large numbers of application instances, resources, and users; the growing complexity and dynamics of business processes; and the spiralling volume of change that results from the interaction of the first two factors. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels and Brian Fisher, "Understanding Information Technology Security Administration through a Field Study", Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, 2007:
Transfer from CDS 0.99.7: Download fulltextPDF;
31. Towards Understanding IT Security Professionals and Their Tools / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2007-023]
We report preliminary results of our ongoing field study of IT professionals who are involved in security management. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian Fisher, "Towards Understanding IT Security Professionals and Their Tools" in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, July 18-20, 2007, pp.100-111.:
Transfer from CDS 0.99.7: Download fulltextPDF;
32. On the Imbalance of the Security Problem Space and its Expected Consequences / Konstantin Beznosov ; Olga Beznosova [LERSSE-RefConfPaper-2007-021]
This paper considers the attacker-defender game in the field of computer security as a three-dimensional phenomenon [...]
Published in Konstantin Beznosov, Olga Beznosova "On the Imbalance of the Security Problem Space and its Expected Consequences," To appear in Symposium on Human Aspects of Information Security & Assurance (HAISA), Plymouth, UK, 10 July, 2007, pp.10. :
Transfer from CDS 0.99.7: Download fulltextPDF;
33. Studying IT Security Professionals: Research Design and Lessons Learned / David Botta ; Rodrigo Werlinger ; André Gagné ; Konstantin Beznosov ; et al [LERSSE-RefConfPaper-2007-020]
The HOT Admin Field Study used qualitative methods to study information technology security administrators. [...]
Published in David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, and Brian Fisher, "Studying IT Security Professionals: Research Design and Lessons Learned" position paper at the CHI Workshop on Security User studies: Methodologies and Best Practices, San Francisco, CA, 28 April 2007, 4 pages.:
Transfer from CDS 0.99.7: Download fulltextPDF;
34. Summary of the HOT Admin Proposal / Konstantin Beznosov ; Sidney Fels ; Brian Fisher ; Lee Iverson [LERSSE-etc-2006-001]
Published in Konstantin Beznosov, Sidney Fels, Brian Fisher, Lee Iverson, "Summary of the HOT Admin Proposal," December 2005, pp. 2.:
Transfer from CDS 0.99.7: Download fulltextPDF;
35. HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration / Konstantin Beznosov ; Sid Fels ; Lee Iverson ; Brian Fisher [LERSSE-PRESENTATION-2006-055]
While cryptography, access control, accountability, and other security technologies have received a great deal of attention, to our knowledge this is the first attempt to address systematically the interaction of security administrative models and technologies with usability within an organization [...]
Published in Konstantin Beznosov, Sid Fels, Lee Iverson, Brian Fisher, "HOT Admin: Human, Organization, and Technology Centred Improvement of the IT Security Administration," CIPS Vancouver Security SIG Meeting, Vancouver, 8 March, 2006, pp.35.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 35 records found   beginprevious26 - 35  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.