The SCEAS System
Navigation Menu

Search the dblp DataBase


Konstantin Beznosov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley
    A Resource Access Decision Service for CORBA-Based Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:310-319 [Conf]
  2. Konstantin Beznosov
    Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services. [Citation Graph (0, 0)][DBLP]
    CBSE, 2005, pp:337-352 [Conf]
  3. Konstantin Beznosov
    Object Security Attributes: Enabling Application-Specific Access Control in Middleware. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2002, pp:693-710 [Conf]
  4. Yong Song, Victor C. M. Leung, Konstantin Beznosov
    Implementing Multiple Channels over SSL. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:246-256 [Conf]
  5. Jeanette Tsang, Konstantin Beznosov
    A Security Analysis of the Precise Time Protocol (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:50-59 [Conf]
  6. Konstantin Beznosov
    On the benefits of decomposing policy engines into components. [Citation Graph (0, 0)][DBLP]
    Adaptive and Reflective Middleware, 2004, pp:183-188 [Conf]
  7. Konstantin Beznosov, Philippe Kruchten
    Towards agile security assurance. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:47-54 [Conf]
  8. John F. Barkley, Konstantin Beznosov, Jinny Uppal
    Supporting Relationships in Access Control Using Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:55-65 [Conf]
  9. Konstantin Beznosov
    Requirements for Access Control: US Healthcare Domain. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:43- [Conf]
  10. Konstantin Beznosov, Yi Deng
    A Framework for Implementing Role-Based Access Control Using CORBA Security Service. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:19-30 [Conf]
  11. Konstantin Beznosov
    Future direction of access control models, architectures, and technologies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:48- [Conf]
  12. Jason Crampton, Wing Leung, Konstantin Beznosov
    The secondary and approximate authorization model and its application to Bell-LaPadula policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:111-120 [Conf]
  13. Yong Song, Victor C. M. Leung, Konstantin Beznosov
    Supporting End-to-end Security across Proxies with Multiple-Channel SSL. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:323-338 [Conf]
  14. Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, Kendra Cooper
    Applying Aspect-Orientation in Designing Security Systems: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEKE, 2004, pp:360-365 [Conf]
  15. Konstantin Beznosov
    Here's Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need. [Citation Graph (0, 0)][DBLP]
    SEM, 2004, pp:3-18 [Conf]
  16. Yi Deng, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov
    An Approach for Modeling and Analysis of Security System Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:5, pp:1099-1119 [Journal]
  17. Qiang Wei, Matei Ripeanu, Konstantin Beznosov
    Cooperative secondary authorization recycling. [Citation Graph (0, 0)][DBLP]
    HPDC, 2007, pp:65-74 [Conf]

  18. Secure Web 2.0 Content Sharing Beyond Walled Gardens. [Citation Graph (, )][DBLP]

  19. Security practitioners in context: their activities and interactions. [Citation Graph (, )][DBLP]

  20. Human, organizational, and technological factors of IT security. [Citation Graph (, )][DBLP]

  21. Towards improving mental models of personal firewall users. [Citation Graph (, )][DBLP]

  22. Investigating user account control practices. [Citation Graph (, )][DBLP]

  23. Investigating an appropriate design for personal firewalls. [Citation Graph (, )][DBLP]

  24. Authorization Using the Publish-Subscribe Model. [Citation Graph (, )][DBLP]

  25. Authorization recycling in RBAC systems. [Citation Graph (, )][DBLP]

  26. Usability meets access control: challenges and research opportunities. [Citation Graph (, )][DBLP]

  27. Detecting, analyzing and responding to security incidents: a qualitative analysis. [Citation Graph (, )][DBLP]

  28. Towards understanding IT security professionals and their tools. [Citation Graph (, )][DBLP]

  29. The challenges of using an intrusion detection system: is it worth the effort? [Citation Graph (, )][DBLP]

  30. A multi-method approach for user-centered design of identity management systems. [Citation Graph (, )][DBLP]

  31. Revealing hidden context: improving mental models of personal firewall users. [Citation Graph (, )][DBLP]

  32. Do windows users follow the principle of least privilege?: investigating user account control practices. [Citation Graph (, )][DBLP]

  33. Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. [Citation Graph (, )][DBLP]

  34. Guidelines for designing IT security management tools. [Citation Graph (, )][DBLP]

  35. A case study of enterprise identity management system adoption in an insurance organization. [Citation Graph (, )][DBLP]

  36. Application-based TCP hijacking. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002