2009 |
29 | EE | Fahimeh Raja,
Kirstie Hawkey,
Konstantin Beznosov:
Towards improving mental models of personal firewall users.
CHI Extended Abstracts 2009: 4633-4638 |
28 | EE | Qiang Wei,
Matei Ripeanu,
Konstantin Beznosov:
Cooperative Secondary Authorization Recycling.
IEEE Trans. Parallel Distrib. Syst. 20(2): 275-288 (2009) |
2008 |
27 | EE | Kirstie Hawkey,
David Botta,
Rodrigo Werlinger,
Kasia Muldner,
André Gagné,
Konstantin Beznosov:
Human, organizational, and technological factors of IT security.
CHI Extended Abstracts 2008: 3639-3644 |
26 | EE | Rodrigo Werlinger,
Kirstie Hawkey,
Konstantin Beznosov:
Security practitioners in context: their activities and interactions.
CHI Extended Abstracts 2008: 3789-3794 |
25 | EE | Pooya Jaferian,
David Botta,
Fahimeh Raja,
Kirstie Hawkey,
Konstantin Beznosov:
Guidelines for designing IT security management tools.
CHIMIT 2008: 7 |
24 | EE | Qiang Wei,
Matei Ripeanu,
Konstantin Beznosov:
Authorization Using the Publish-Subscribe Model.
ISPA 2008: 53-62 |
23 | EE | Qiang Wei,
Jason Crampton,
Konstantin Beznosov,
Matei Ripeanu:
Authorization recycling in RBAC systems.
SACMAT 2008: 63-72 |
22 | EE | Rodrigo Werlinger,
Kirstie Hawkey,
Kasia Muldner,
Pooya Jaferian,
Konstantin Beznosov:
The challenges of using an intrusion detection system: is it worth the effort?
SOUPS 2008: 107-118 |
21 | EE | Kirstie Hawkey,
Kasia Muldner,
Konstantin Beznosov:
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
IEEE Internet Computing 12(3): 22-30 (2008) |
20 | EE | Konstantin Beznosov,
Brian Chess:
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge.
IEEE Software 25(1): 10-12 (2008) |
2007 |
19 | EE | Qiang Wei,
Matei Ripeanu,
Konstantin Beznosov:
Cooperative secondary authorization recycling.
HPDC 2007: 65-74 |
18 | EE | David Botta,
Rodrigo Werlinger,
André Gagné,
Konstantin Beznosov,
Lee Iverson,
Sidney Fels,
Brian D. Fisher:
Towards understanding IT security professionals and their tools.
SOUPS 2007: 100-111 |
17 | EE | Rodrigo Werlinger,
David Botta,
Konstantin Beznosov:
Detecting, analyzing and responding to security incidents: a qualitative analysis.
SOUPS 2007: 149-150 |
2006 |
16 | EE | Jeanette Tsang,
Konstantin Beznosov:
A Security Analysis of the Precise Time Protocol (Short Paper).
ICICS 2006: 50-59 |
15 | EE | Jason Crampton,
Wing Leung,
Konstantin Beznosov:
The secondary and approximate authorization model and its application to Bell-LaPadula policies.
SACMAT 2006: 111-120 |
2005 |
14 | EE | Konstantin Beznosov:
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services.
CBSE 2005: 337-352 |
13 | EE | Konstantin Beznosov:
Future direction of access control models, architectures, and technologies.
SACMAT 2005: 48 |
2004 |
12 | EE | Konstantin Beznosov:
On the benefits of decomposing policy engines into components.
Adaptive and Reflective Middleware 2004: 183-188 |
11 | | Yong Song,
Victor C. M. Leung,
Konstantin Beznosov:
Implementing Multiple Channels over SSL.
ICETE (2) 2004: 246-256 |
10 | EE | Konstantin Beznosov,
Philippe Kruchten:
Towards agile security assurance.
NSPW 2004: 47-54 |
9 | | Yong Song,
Victor C. M. Leung,
Konstantin Beznosov:
Supporting End-to-end Security across Proxies with Multiple-Channel SSL.
SEC 2004: 323-338 |
8 | | Shu Gao,
Yi Deng,
Huiqun Yu,
Xudong He,
Konstantin Beznosov,
Kendra Cooper:
Applying Aspect-Orientation in Designing Security Systems: A Case Study.
SEKE 2004: 360-365 |
7 | EE | Konstantin Beznosov:
Here's Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need.
SEM 2004: 3-18 |
2003 |
6 | EE | Yi Deng,
Jiacun Wang,
Jeffrey J. P. Tsai,
Konstantin Beznosov:
An Approach for Modeling and Analysis of Security System Architectures.
IEEE Trans. Knowl. Data Eng. 15(5): 1099-1119 (2003) |
2002 |
5 | EE | Konstantin Beznosov:
Object Security Attributes: Enabling Application-Specific Access Control in Middleware.
CoopIS/DOA/ODBASE 2002: 693-710 |
1999 |
4 | EE | Konstantin Beznosov,
Yi Deng:
A Framework for Implementing Role-Based Access Control Using CORBA Security Service.
ACM Workshop on Role-Based Access Control 1999: 19-30 |
3 | EE | John F. Barkley,
Konstantin Beznosov,
Jinny Uppal:
Supporting Relationships in Access Control Using Role Based Access Control.
ACM Workshop on Role-Based Access Control 1999: 55-65 |
2 | EE | Konstantin Beznosov,
Yi Deng,
Bob Blakley,
C. Burt,
John F. Barkley:
A Resource Access Decision Service for CORBA-Based Distributed Systems.
ACSAC 1999: 310-319 |
1998 |
1 | EE | Konstantin Beznosov:
Requirements for Access Control: US Healthcare Domain.
ACM Workshop on Role-Based Access Control 1998: 43 |