Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 12 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
1.
Management of IT Security in Organizations: What Makes It Hard? / Konstantin Beznosov [LERSSE-PRESENTATION-2008-073]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. [...]
Published in Konstantin Beznosov, “Management of IT Security in Organizations: What Makes It Hard?” talk given at the SAP Research, Campus-based Engineering Center, Karlsruhe, Germany, 08 July 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
2.
Toward Understanding the Workplace of IT Security Practitioners / Konstantin Beznosov [LERSSE-PRESENTATION-2008-070]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after security breaches. [...]
Published in Konstantin Beznosov, “Toward Understanding the Workplace of IT Security Practitioners” talk given at the Computer Science Department, College University London, 04 July 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
3.
A Broad Empirical Study of IT Security Practioners / Konstantin Beznosov [LERSSE-PRESENTATION-2008-068]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after a security breach [...]
Published in Konstantin Beznosov, "A Broad Empirical Study of IT Security Practioners," talk given at the Coast to Coast Seminar Series, 2008-03-18.:
Transfer from CDS 0.99.7: Download fulltextPDF;
4.
HOT Admin Research Project: Overview and Results to Date / Konstantin Beznosov [LERSSE-PRESENTATION-2008-067]
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after a security breach [...]
Published in Konstantin Beznosov, "HOT Admin Research Project: Overview and Results to Date," presented at the seminar series of GONDWANA (Towards Quantitative Security Metrics) research project, 41 pages, École Polytechnique de Montréal, February 21, 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
5.
Android Rooting: Methods, Detection, and Evasion / San-Tsai Sun ; Andrea Cuadros ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-007]
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. [...]
Published in San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
6.
Towards understanding how Touch ID impacts users’ authentication secrets selection for iPhone lock. / Ivan Cherapau [LERSSE-THESIS-2015-004]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-THESIS-2015-003:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
7.
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model / San-Tsai Sun ; Eric Pospisil ; Ildar Muslukhov ; Nuray Dindar ; et al [LERSSE-RefJnlPaper-2013-001]
OpenID and OAuth are open and simple web single sign-on (SSO) protocols that have been adopted by major service providers, and millions of supporting websites. [...]
Published in San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. Investigating users' perspectives of web single sign-on: Conceptual gaps and acceptance model. Accepted for publication in ACM Transactions on Internet Technology (TOIT) on June 4th, 2013.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
8.
On the Impact of Touch ID on iPhone Passcodes / Ivan Cherapau ; Ildar Muslukhov ; Nalin Asanka ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-001]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-RefConfPaper-2015-001:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
9.
Towards Improving the Usability and Security of Web Single Sign-On Systems / San-Tsai Sun [LERSSE-THESIS-2013-001]
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and millions of relying party (RP) websites. [...]
Published in San-Tsai Sun, "Towards Improving the Usability and Security of Web Single Sign-On Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, November, 2013, pp.216:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
10.
"I did it because I trusted you": Challenges with the Study Environment Biasing Participant Behaviours / Andreas Sotirakopoulos ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefConfPaper-2010-003]
We recently replicated and extended a 2009 study that investigated the effectiveness of SSL warnings. [...]
Published in A. Sotirakopoulos, K. Hawkey, and K. Beznosov. "I did it because I trusted you": Challenges with the study environment biasing participant behaviours. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.:
Transfer from CDS 0.99.7: Download fulltextPDF;