Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 269 records found  beginprevious219 - 228nextend  jump to record: Search took 0.01 seconds. 
219. JAMES: Junk Authorizations for Massive-scale Enterprise Services / Konstantin Beznosov [LERSSE-PRESENTATION-2005-027]
The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls [...]
Published in Konstantin Beznosov, "JAMES: Junk Authorizations for Massive-scale Enterprise Services," given at the School of Computing and Information Sciences, Florida International University, Miami, Florida, USA, August 15, 2005, pp.29. :
Transfer from CDS 0.99.7: Download fulltextPDF;
220. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Konstantin Beznosov [LERSSE-PRESENTATION-2005-026]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," presentation given at Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, Object Management Group, 7 May, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
221. Issues in the Security Architecture of the Computerized Patient Record Enterprise / Konstantin Beznosov [LERSSE-UnrefConfPaper-2005-002]
We discuss issues in CPR enterprise security architecture. [...]
Published in Konstantin Beznosov, "Issues in the Security Architecture of the Computerized Patient Record Enterprise," in Proceedings of the Second Workshop on Distributed Object Computing Security (DOCSec), Baltimore, Maryland, USA, pp.5: (May, 1998)
Transfer from CDS 0.99.7: Download fulltextPDF;
222. Introduction to Cryptography, Part II / Konstantin Beznosov [LERSSE-PRESENTATION-2005-024]
Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
Published in Konstantin Beznosov, "Introduction to Cryptography, Part II," presentation given at class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 7 April, 1998. :
Transfer from CDS 0.99.7: Download fulltextPDF;
223. Introduction to Cryptography, Part I: Probabilistic Encryption / Konstantin Beznosov [LERSSE-PRESENTATION-2005-023]
Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks
Published in Konstantin Beznosov, "Introduction to Cryptography, Part I: Probabilistic Encryption," presentation given at the class COT 6421, Theory of Computation II, Miami, FL, USA, School of Computer Science, Florida International University, 2 April, 1998.:
Transfer from CDS 0.99.7: Download fulltextPDF;
224. Improving Practical Security Engineering: Overview of the Ongoing Research / Konstantin Beznosov [LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;
225. Implementing Multiple Channels over SSL / Yong Song ; Victor C.M. Leung ; Konstantin Beznosov [LERSSE-RefConfPaper-2005-010]
Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. [...]
Published in Yong Song, Victor C.M. Leung, and Konstantin Beznosov. Implementing multiple channels over SSL. In Proceedings of the 1st International Conference on E-business and Telecom-munication Networks, pages 246–253, Setubal, Portugal, 25-28 August 2004.:
Transfer from CDS 0.99.7: Download fulltextPDF;
226. Human Factor in Security Administration: Brainstorming the Research Directions / Konstantin Beznosov [LERSSE-PRESENTATION-2005-021]
Although usability has been acknowledged by the security community as one of the design goals back in 1970s, there is dearth of applications of HCI methods to the domain of computer security in general and security administration in particular. [...]
Published in Konstantin Beznosov, "Human Factor in Security Administration: Brainstorming the Research Directions," presentation given at SEEDS, Vancouver, BC, Canada, SEEDS, ECE, UBC, 2 December, 2003. :
Transfer from CDS 0.99.7: Download fulltextPDF;
227. HIPAA and CPR Architecture / Konstantin Beznosov [LERSSE-PRESENTATION-2005-020]
The presentation that describes Health Insurance Portability and Accountability Act (HIPAA) from the perspective of the Computerized Patient Record (CPR) Architecture [...]
Published in Konstantin Beznosov, "HIPAA and CPR Architecture," presentation given to IT leadership of the Baptist Health Systems, Miami, FL, USA, Baptist Health Systems of South Florida, 19 April, 1999, pp.17.:
Transfer from CDS 0.99.7: Download fulltextPDF;
228. Here’s Your Lego™ Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need / Konstantin Beznosov [LERSSE-RefConfPaper-2005-009]
By presenting a protection architecture for ASP.NET Web services, this paper demonstrates the feasibility of creating middleware mechanisms in the form of composable, flexible, and extensible building blocks. [...]
Published in Konstantin Beznosov, “Here’s Your Lego! Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need,” in Proceedings of Software Engineering and Middleware (SEM) Workshop, pp. 3-18, Linz, Austria, 20-21 September 2004.:
Transfer from CDS 0.99.7: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 269 records found   beginprevious219 - 228nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.