dblp.uni-trier.dewww.uni-trier.de

Konstantin Beznosov

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEFahimeh Raja, Kirstie Hawkey, Konstantin Beznosov: Towards improving mental models of personal firewall users. CHI Extended Abstracts 2009: 4633-4638
28EEQiang Wei, Matei Ripeanu, Konstantin Beznosov: Cooperative Secondary Authorization Recycling. IEEE Trans. Parallel Distrib. Syst. 20(2): 275-288 (2009)
2008
27EEKirstie Hawkey, David Botta, Rodrigo Werlinger, Kasia Muldner, André Gagné, Konstantin Beznosov: Human, organizational, and technological factors of IT security. CHI Extended Abstracts 2008: 3639-3644
26EERodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov: Security practitioners in context: their activities and interactions. CHI Extended Abstracts 2008: 3789-3794
25EEPooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov: Guidelines for designing IT security management tools. CHIMIT 2008: 7
24EEQiang Wei, Matei Ripeanu, Konstantin Beznosov: Authorization Using the Publish-Subscribe Model. ISPA 2008: 53-62
23EEQiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu: Authorization recycling in RBAC systems. SACMAT 2008: 63-72
22EERodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov: The challenges of using an intrusion detection system: is it worth the effort? SOUPS 2008: 107-118
21EEKirstie Hawkey, Kasia Muldner, Konstantin Beznosov: Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. IEEE Internet Computing 12(3): 22-30 (2008)
20EEKonstantin Beznosov, Brian Chess: Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge. IEEE Software 25(1): 10-12 (2008)
2007
19EEQiang Wei, Matei Ripeanu, Konstantin Beznosov: Cooperative secondary authorization recycling. HPDC 2007: 65-74
18EEDavid Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian D. Fisher: Towards understanding IT security professionals and their tools. SOUPS 2007: 100-111
17EERodrigo Werlinger, David Botta, Konstantin Beznosov: Detecting, analyzing and responding to security incidents: a qualitative analysis. SOUPS 2007: 149-150
2006
16EEJeanette Tsang, Konstantin Beznosov: A Security Analysis of the Precise Time Protocol (Short Paper). ICICS 2006: 50-59
15EEJason Crampton, Wing Leung, Konstantin Beznosov: The secondary and approximate authorization model and its application to Bell-LaPadula policies. SACMAT 2006: 111-120
2005
14EEKonstantin Beznosov: Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services. CBSE 2005: 337-352
13EEKonstantin Beznosov: Future direction of access control models, architectures, and technologies. SACMAT 2005: 48
2004
12EEKonstantin Beznosov: On the benefits of decomposing policy engines into components. Adaptive and Reflective Middleware 2004: 183-188
11 Yong Song, Victor C. M. Leung, Konstantin Beznosov: Implementing Multiple Channels over SSL. ICETE (2) 2004: 246-256
10EEKonstantin Beznosov, Philippe Kruchten: Towards agile security assurance. NSPW 2004: 47-54
9 Yong Song, Victor C. M. Leung, Konstantin Beznosov: Supporting End-to-end Security across Proxies with Multiple-Channel SSL. SEC 2004: 323-338
8 Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, Kendra Cooper: Applying Aspect-Orientation in Designing Security Systems: A Case Study. SEKE 2004: 360-365
7EEKonstantin Beznosov: Here's Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need. SEM 2004: 3-18
2003
6EEYi Deng, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov: An Approach for Modeling and Analysis of Security System Architectures. IEEE Trans. Knowl. Data Eng. 15(5): 1099-1119 (2003)
2002
5EEKonstantin Beznosov: Object Security Attributes: Enabling Application-Specific Access Control in Middleware. CoopIS/DOA/ODBASE 2002: 693-710
1999
4EEKonstantin Beznosov, Yi Deng: A Framework for Implementing Role-Based Access Control Using CORBA Security Service. ACM Workshop on Role-Based Access Control 1999: 19-30
3EEJohn F. Barkley, Konstantin Beznosov, Jinny Uppal: Supporting Relationships in Access Control Using Role Based Access Control. ACM Workshop on Role-Based Access Control 1999: 55-65
2EEKonstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley: A Resource Access Decision Service for CORBA-Based Distributed Systems. ACSAC 1999: 310-319
1998
1EEKonstantin Beznosov: Requirements for Access Control: US Healthcare Domain. ACM Workshop on Role-Based Access Control 1998: 43

Coauthor Index

1John F. Barkley [2] [3]
2Bob Blakley [2]
3David Botta [17] [18] [25] [27]
4C. Burt [2]
5Brian Chess [20]
6Kendra Cooper [8]
7Jason Crampton [15] [23]
8Yi Deng [2] [4] [6] [8]
9Sidney Fels (S. Sidney Fels) [18]
10Brian D. Fisher [18]
11André Gagné [18] [27]
12Shu Gao [8]
13Kirstie Hawkey [21] [22] [25] [26] [27] [29]
14Xudong He [8]
15Lee Iverson [18]
16Pooya Jaferian [22] [25]
17Philippe Kruchten [10]
18Victor C. M. Leung [9] [11]
19Wing Leung [15]
20Kasia Muldner [21] [22] [27]
21Fahimeh Raja [25] [29]
22Matei Ripeanu [19] [23] [24] [28]
23Yong Song [9] [11]
24Jeffrey J. P. Tsai [6]
25Jeanette Tsang [16]
26Jinny Uppal [3]
27Jiacun Wang [6]
28Qiang Wei [19] [23] [24] [28]
29Rodrigo Werlinger [17] [18] [22] [26] [27]
30Huiqun Yu [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)