Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 7 records found  Search took 0.00 seconds. 
1.
Heuristics for Evaluating IT Security Management Tools / Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Konstantin Beznosov [LERSSE-RefConfPaper-2011-002]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, and Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, In Proceedings of the 29th international conference extended abstracts on Human factors in computing systems (CHI '11), Vancouver, Canada, 2011. :
Transfer from CDS 0.99.7: Download fulltextPDF;
2.
Heuristics for Evaluating IT Security Management Tools / Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Maria Velez-Rojas ; et al [LERSSE-RefConfPaper-2011-006]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, July 20-22, 2011. :
Transfer from CDS 0.99.7: Download fulltextPDF;
3.
To authorize or not authorize: helping users review access policies in organizations / Pooya Jaferian ; Hootan Rashtian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-003]
This work addresses the problem of reviewing complex access policies in an organizational context using two studies [...]
Published in Pooya Jaferian, Hootan Rashtian, and Konstantin Beznosov. 2014. To authorize or not authorize: helping users review access policies in organizations. SOUPS'14: Symposium On Usable Privacy and Security. Menlo Park, CA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
4.
User-centered design of identity and access management systems / Pooya Jaferian [LERSSE-THESIS-2014-001]
IT security management (ITSM) technologies are important components of IT security in organizations. [...]
Published in Pooya Jaferian, "User-centered design of identity and access management systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, December, 2014, pp.314:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
5.
Accountability and Availability / Konstantin Beznosov [LERSSE-PRESENTATION-2005-002]
Learning objectives: Comprehend the principles of security accountability and availability. [...]
Published in Konstantin Beznosov, "Accountability and Availability," lecture given at the secure application development course SecAppDev course, Brussels, Belgium, Katholieke Universiteit Leuven, 1 March, 2005, pp.43. :
Transfer from CDS 0.99.7: Download fulltextPDF;
6.
Towards Improving the Usability of Personal Firewalls / Fahimeh Raja [LERSSE-THESIS-2011-001]
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. [...]
Published in Fahimeh Raja, "Towards Improving the Usability of Personal Firewalls," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, January 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
7.
Access Review Survey Report / Pooya Jaferian ; Konstantin Beznosov [LERSSE-REPORT-2014-001]
To further understand the state of the practice in access review, and collect quantitative results on how companies perform access review, we conducted a survey of security practitioners [...]
Published in P. Jaferian and K. Beznosov. Access Review Survey Report. Technical Report LERSSE-TR-2014-001, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, May 2014.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);