260.
|
A Framework for Implementing Role-based Access Control Using CORBA Security Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-005]
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," presentation given at CADSE, Miami, FL, USA, Center for Advanced Distributed Systems Engineering (CADSE), School of Computer Science (SCS), Florida International University (FIU), 14, 21 May, 1999, pp.53. :
Transfer from CDS 0.99.7: PDF;
|
261.
|
A Framework for Implementing Role-based Access Control Using CORBA Security Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-004]
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," presented at the Fourth ACM Workshop on Role-Based Access Control (RBAC), Fairfax, Virginia, USA, ACM, 28 October, 1999, pp.29. :
Transfer from CDS 0.99.7: PDF;
|
262.
|
A Design of An Authorization Service
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-003]
Outline: • CORBA security model • What CORBA Access Model does[ not] Cover • Healthcare Resource Access Control (H-RAC) high level view • Authorization Service framework design details
Published in Konstantin Beznosov, "A Design of An Authorization Service," presentation given at CADSE, Miami, FL, USA, SCS, FIU, 12 February, 1999, pp.16. :
Transfer from CDS 0.99.7: PDF;
|
263.
|
A Framework for Implementing Role-based Access Control Using CORBA Security Service
/ Konstantin Beznosov ; Yi Deng
[LERSSE-RefConfPaper-2005-002]
The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service [...]
Published in Konstantin Beznosov, Yi Deng, "A Framework for Implementing Role-based Access Control Using CORBA Security Service," in Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, ACM, October, 1999, pp.19-30.:
Transfer from CDS 0.99.7: PDF;
|
264.
|
Accountability and Availability
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-002]
Learning objectives: Comprehend the principles of security accountability and availability. [...]
Published in Konstantin Beznosov, "Accountability and Availability," lecture given at the secure application development course SecAppDev course, Brussels, Belgium, Katholieke Universiteit Leuven, 1 March, 2005, pp.43. :
Transfer from CDS 0.99.7: PDF;
|
265.
|
CITI Fault Report Classification and Encoding for Vulnerability and Risk Assessment of Interconnected Infrastructures
/ Hafiz Abdur Rahman ; Konstantin Beznosov
[TEST-REPORT-2005-001]
Effective functionalities of many of the critical infrastructures depend on Communication and Information Technology Infrastructure (CITI). [...]
Published in Hafiz Abdur Rahman, Konstantin Beznosov, "CITI Fault Report Classification and Encoding for Vulnerability and Risk Assessment of Interconnected Infrastructures," Laboratory for Education and Research in Secure Systems Engineering, Vancouver, B.C., Canada, University of British Columbia, technical report LERSSE-TR-2005-03, 4 October, 2005, pp.40.:
Transfer from CDS 0.99.7: PDF;
|
266.
|
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services
/ Konstantin Beznosov
[TEST-RefConfPaper-2005-001]
This report reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services [...]
Published in Konstantin Beznosov, "Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services," in Proceedings of the Eighth International SIGSOFT Symposium on Component-based Software Engineering (CBSE), St. Louis, Missouri, USA, SIGSOFT, 15-21 May, 2005, pp.337-352.:
Transfer from CDS 0.99.7: PDF;
|
267.
|
A Security Analysis of the IEEE 1588 Standard
/ Jeanette Tsang ; Konstantin Beznosov
[TEST-PRESENTATION-2005-001]
Published in Jeanette Tsang, Konstantin Beznosov, "A Security Analysis of the IEEE 1588 Standard", presented at the 2005 Conference on IEEE-1588 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, October 2005.:
Transfer from CDS 0.99.7: PDF;
|
268.
|
On the Benefits of Decomposing Policy Engines into Components
/ Konstantin Beznosov
[TEST-ARTICLE-2005-004]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov. Flooding and recycling authorizations. In Proceedings of the New
Security Paradigms Workshop (NSPW’05), pages 67–72, Lake Arrowhead, CA, USA, 20-23
September 2005. ACM Press.
:
Transfer from CDS 0.99.7: PDF;
|
269.
|
Flooding and Recycling Authorizations
/ Konstantin Beznosov
[TEST-ARTICLE-2005-003]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations", in Proceedings of New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, ACM, 20-23 September, 2005, pp.67-72.:
Transfer from CDS 0.99.7: PDF;
|