default search action
Konstantin Beznosov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c102]Azadeh Mokhberi, Yue Huang, Guillaume Humbert, Borke Obada-Obieh, Masoud Mehrabi Koushki, Konstantin Beznosov:
Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada. CHI 2024: 948:1-948:25 - 2022
- [j29]Yue Huang, Borke Obada-Obieh, Satya Lokam, Konstantin Beznosov:
Users' Expectations, Experiences, and Concerns With COVID Alert, an Exposure-Notification App. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-33 (2022) - [c101]Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, Konstantin Beznosov:
COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People's Adoption Intention. CHIIR 2022: 12-24 - [c100]Yue Huang, Borke Obada-Obieh, Konstantin Beznosov:
Users' Perceptions of Chrome Compromised Credential Notification. SOUPS @ USENIX Security Symposium 2022: 155-174 - [c99]Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin Beznosov:
SoK: The Dual Nature of Technology in Sexual Abuse. SP 2022: 2320-2343 - [c98]Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov:
Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones. USENIX Security Symposium 2022: 917-935 - 2021
- [c97]Artemij Voskobojnikov, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, Konstantin Beznosov:
The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets. CHI 2021: 642:1-642:14 - [c96]Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov:
On Smartphone Users' Difficulty with Understanding Implicit Authentication. CHI 2021: 690:1-690:14 - [c95]Mohammad Tahaei, Kami Vaniea, Konstantin Beznosov, Maria K. Wolters:
Security Notifications in Static Analysis Tools: Developers' Attitudes, Comprehension, and Ability to Act on Them. CHI 2021: 691:1-691:17 - [c94]Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, Rainer Böhme:
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. CHI 2021: 692:1-692:19 - [c93]Artemij Voskobojnikov, Svetlana Abramova, Konstantin Beznosov, Rainer Böhme:
Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk. ECIS 2021 - [c92]Azadeh Mokhberi, Konstantin Beznosov:
SoK: Human, Organizational, and Technological Dimensions of Developers' Challenges in Engineering Secure Software. EuroUSEC 2021: 59-75 - [c91]Borke Obada-Obieh, Yue Huang, Konstantin Beznosov:
Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers. SOUPS @ USENIX Security Symposium 2021: 675-694 - 2020
- [j28]Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. 23(4): 22:1-22:32 (2020) - [c90]Yue Huang, Borke Obada-Obieh, Konstantin Beznosov:
Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. CHI 2020: 1-13 - [c89]Borke Obada-Obieh, Yue Huang, Konstantin Beznosov:
The Burden of Ending Online Account Sharing. CHI 2020: 1-13 - [c88]Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, Konstantin Beznosov:
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. Financial Cryptography 2020: 595-614 - [c87]Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov:
Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android". MobileHCI 2020: 20:1-20:17 - [c86]Borke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov:
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. SOUPS @ USENIX Security Symposium 2020: 145-164
2010 – 2019
- 2019
- [c85]Lina Qiu, Alexander De Luca, Ildar Muslukhov, Konstantin Beznosov:
Towards Understanding the Link Between Age and Smartphone Authentication. CHI 2019: 163 - [c84]Diogo Marques, Tiago João Guerreiro, Luís Carriço, Ivan Beschastnikh, Konstantin Beznosov:
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones. CHI 2019: 589 - [c83]Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, Matei Ripeanu:
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. Financial Cryptography 2019: 569-587 - 2018
- [j27]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. IEEE Secur. Priv. 16(1): 64-71 (2018) - [c82]Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov:
Source Attribution of Cryptographic API Misuse in Android Applications. AsiaCCS 2018: 133-146 - [c81]Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David A. Wagner, Konstantin Beznosov, Serge Egelman:
Contextualizing Privacy Decisions for Better Prediction (and Protection). CHI 2018: 268 - [i3]Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. CoRR abs/1801.08629 (2018) - 2017
- [c80]Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:
An Early Warning System for Suspicious Accounts. AISec@CCS 2017: 51-52 - [c79]Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba, Konstantin Beznosov:
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. CHI 2017: 387-391 - [c78]Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago João Vieira Guerreiro, Luís Carriço:
Characterizing Social Insider Attacks on Facebook. CHI 2017: 3810-3820 - [c77]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. IEEE Symposium on Security and Privacy 2017: 1077-1093 - [i2]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. CoRR abs/1703.02090 (2017) - 2016
- [j26]Nalin Asanka Gamagedara Arachchilage, Steve Love, Konstantin Beznosov:
Phishing threat avoidance behaviour: An empirical investigation. Comput. Hum. Behav. 60: 185-197 (2016) - [j25]Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov, Hassan Halawa:
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. Comput. Secur. 61: 142-168 (2016) - [j24]Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, Konstantin Beznosov:
Decoupling data-at-rest encryption and smartphone locking with wearable devices. Pervasive Mob. Comput. 32: 26-34 (2016) - [j23]Ahmed Mahfouz, Ildar Muslukhov, Konstantin Beznosov:
Android users in the wild: Their authentication and usage behavior. Pervasive Mob. Comput. 32: 50-61 (2016) - [c76]Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto:
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. NSPW 2016: 11-22 - [c75]Diogo Marques, Ildar Muslukhov, Tiago João Guerreiro, Luís Carriço, Konstantin Beznosov:
Snooping on Mobile Phones: Prevalence and Trends. SOUPS 2016: 159-174 - [c74]Lina Qiu, Ildar Muslukhov, Konstantin Beznosov:
Advancing the Understanding of Android Unlocking and Usage. WAY@SOUPS 2016 - [c73]Sadegh Torabi, Konstantin Beznosov:
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. SOUPS 2016: 301-320 - 2015
- [c72]San-Tsai Sun, Andrea Cuadros, Konstantin Beznosov:
Android Rooting: Methods, Detection, and Evasion. SPSM@CCS 2015: 3-14 - [c71]Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Elizeu Santos-Neto:
Thwarting Fake OSN Accounts by Predicting their Victims. AISec@CCS 2015: 81-89 - [c70]Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan:
Surpass: System-initiated User-replaceable Passwords. CCS 2015: 170-181 - [c69]Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov:
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. NDSS 2015 - [c68]Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? SOUPS 2015: 197-209 - [c67]Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov:
On the Impact of Touch ID on iPhone Passcodes. SOUPS 2015: 257-276 - [c66]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security Symposium 2015: 499-514 - [i1]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. CoRR abs/1504.03747 (2015) - 2014
- [j22]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov:
Heuristics for Evaluating IT Security Management Tools. Hum. Comput. Interact. 29(4): 311-350 (2014) - [j21]Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, Victor C. M. Leung:
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications. IEEE Syst. J. 8(2): 629-640 (2014) - [c65]Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov:
Helping users review and make sense of access policies in organizations. CHI Extended Abstracts 2014: 2017-2022 - [c64]Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov:
To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. SOUPS 2014: 285-300 - [c63]Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov:
To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations. SOUPS 2014: 301-320 - [c62]Hyoungshick Kim, Konstantin Beznosov, Eiko Yoneki:
Finding influential neighbors to maximize information diffusion in twitter. WWW (Companion Volume) 2014: 701-706 - [e5]Konstantin Beznosov, Anil Somayaji, Tom Longstaff, Paul C. van Oorschot:
Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014. ACM 2014, ISBN 978-1-4503-3062-6 [contents] - 2013
- [j20]Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Design and analysis of a social botnet. Comput. Networks 57(2): 556-578 (2013) - [j19]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model. ACM Trans. Internet Techn. 13(1): 2:1-2:35 (2013) - [j18]Pranab Kini, Konstantin Beznosov:
Speculative Authorization. IEEE Trans. Parallel Distributed Syst. 24(4): 814-824 (2013) - [c61]Yazan Boshmaf, Konstantin Beznosov, Matei Ripeanu:
Graph-based Sybil detection in social and information systems. ASONAM 2013: 466-473 - [c60]Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley:
Does my password go up to eleven?: the impact of password meters on password selection. CHI 2013: 2379-2388 - [c59]Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, Konstantin Beznosov:
Know your enemy: the risk of unauthorized access in smartphones by insiders. Mobile HCI 2013: 271-280 - [c58]Sadegh Torabi, Konstantin Beznosov:
Privacy Aspects of Health Related Information Sharing in Online Social Networks. HealthTech 2013 - [e4]Mary Ellen Zurko, Konstantin Beznosov, Tara Whalen, Tom Longstaff:
New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013. ACM 2013, ISBN 978-1-4503-2582-0 [contents] - [e3]Lujo Bauer, Konstantin Beznosov, Lorrie Faith Cranor:
Symposium On Usable Privacy and Security, SOUPS '13, Newcastle, United Kingdom, July 24-26, 2013. ACM 2013, ISBN 978-1-4503-2319-2 [contents] - 2012
- [j17]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Comput. Secur. 31(4): 465-483 (2012) - [c57]San-Tsai Sun, Konstantin Beznosov:
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. CCS 2012: 378-390 - [c56]Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, Konstantin Beznosov:
Understanding Users' Requirements for Data Protection in Smartphones. ICDE Workshops 2012: 228-235 - [c55]Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Key Challenges in Defending Against Malicious Socialbots. LEET 2012 - 2011
- [j16]David Botta, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Toward understanding distributed cognition in IT security management: the role of cues and norms. Cogn. Technol. Work. 13(2): 121-134 (2011) - [j15]Wesam Darwish, Konstantin Beznosov:
Analysis of ANSI RBAC Support in EJB. Int. J. Secur. Softw. Eng. 2(2): 25-52 (2011) - [j14]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in hierarchical RBAC systems. ACM Trans. Inf. Syst. Secur. 14(1): 3:1-3:29 (2011) - [c54]Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
The socialbot network: when bots socialize for fame and money. ACSAC 2011: 93-102 - [c53]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
OpenID-enabled browser: towards usable and secure web single sign-on. CHI Extended Abstracts 2011: 1291-1296 - [c52]Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, Konstantin Beznosov:
Promoting a physical security mental model for personal firewall warnings. CHI Extended Abstracts 2011: 1585-1590 - [c51]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Konstantin Beznosov:
Heuristics for evaluating IT security management tools. CHI Extended Abstracts 2011: 1633-1638 - [c50]Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, Konstantin Beznosov:
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. SOUPS 2011: 1 - [c49]Andreas Sotirakopoulos, Kirstie Hawkey, Konstantin Beznosov:
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. SOUPS 2011: 3 - [c48]San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov:
What makes users refuse web single sign-on?: an empirical investigation of OpenID. SOUPS 2011: 4 - [c47]Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov:
Heuristics for evaluating IT security management tools. SOUPS 2011: 7 - [c46]Kyle Zeeuwen, Matei Ripeanu, Konstantin Beznosov:
Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers. WebQuality@WWW 2011: 42-49 - 2010
- [j13]Wesam Darwish, Konstantin Beznosov:
Analysis of ANSI RBAC Support in COM+. Comput. Stand. Interfaces 32(4): 197-214 (2010) - [j12]San-Tsai Sun, Konstantin Beznosov:
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks. Int. J. Secur. Softw. Eng. 1(1): 20-40 (2010) - [j11]Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Preparation, detection, and analysis: the diagnostic work of IT security incident response. Inf. Manag. Comput. Secur. 18(1): 26-42 (2010) - [c45]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth:
Investigating an appropriate design for personal firewalls. CHI Extended Abstracts 2010: 4123-4128 - [c44]Sara Motiee, Kirstie Hawkey, Konstantin Beznosov:
Investigating user account control practices. CHI Extended Abstracts 2010: 4129-4134 - [c43]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle. Digital Identity Management 2010: 49-58 - [c42]Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication. ICC 2010: 1-6 - [c41]San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov:
A billion keys, but few locks: the crisis of web single sign-on. NSPW 2010: 61-72 - [c40]Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth:
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls. SafeConfig 2010: 53-62 - [c39]Sara Motiee, Kirstie Hawkey, Konstantin Beznosov:
Do windows users follow the principle of least privilege?: investigating user account control practices. SOUPS 2010 - [e2]Adam Moskowitz, Nicole Forsgren, Tamara Babaian, Konstantin Beznosov:
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2010, San Jose, CA, USA, November 12-13, 2010. ACM 2010, ISBN 978-1-4503-0447-4 [contents]
2000 – 2009
- 2009
- [j10]Hafiz Abdur Rahman, Konstantin Beznosov, José R. Martí:
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports. Int. J. Crit. Infrastructures 5(3): 220-244 (2009) - [j9]Rodrigo Werlinger, Kirstie Hawkey, David Botta, Konstantin Beznosov:
Security practitioners in context: Their activities and interactions with other stakeholders within organizations. Int. J. Hum. Comput. Stud. 67(7): 584-606 (2009) - [j8]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
An integrated view of human, organizational, and technological challenges of IT security management. Inf. Manag. Comput. Secur. 17(1): 4-19 (2009) - [j7]Qiang Wei, Matei Ripeanu, Konstantin Beznosov:
Cooperative Secondary Authorization Recycling. IEEE Trans. Parallel Distributed Syst. 20(2): 275-288 (2009) - [c38]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Secure Web 2.0 Content Sharing Beyond Walled Gardens. ACSAC 2009: 409-418 - [c37]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Towards improving mental models of personal firewall users. CHI Extended Abstracts 2009: 4633-4638 - [c36]Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov:
A case study of enterprise identity management system adoption in an insurance organization. CHIMIT 2009 - [c35]San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. CSE (4) 2009: 979-984 - [c34]Oliver Zheng, Jason Poon, Konstantin Beznosov:
Application-based TCP hijacking. EUROSEC 2009: 9-15 - [c33]Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. HAISA 2009: 119-134 - [c32]San-Tsai Sun, Konstantin Beznosov:
Open Problems in Web 2.0 User Content Sharing. iNetSeC 2009: 37-51 - [c31]Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko:
Usability meets access control: challenges and research opportunities. SACMAT 2009: 73-74 - [c30]Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov:
A multi-method approach for user-centered design of identity management systems. SOUPS 2009 - [c29]Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Revealing hidden context: improving mental models of personal firewall users. SOUPS 2009 - 2008
- [j6]Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov:
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. IEEE Internet Comput. 12(3): 22-30 (2008) - [j5]Konstantin Beznosov, Brian Chess:
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge. IEEE Softw. 25(1): 10-12 (2008) - [c28]Kirstie Hawkey, David Botta, Rodrigo Werlinger, Kasia Muldner, André Gagné, Konstantin Beznosov:
Human, organizational, and technological factors of IT security. CHI Extended Abstracts 2008: 3639-3644 - [c27]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
Security practitioners in context: their activities and interactions. CHI Extended Abstracts 2008: 3789-3794 - [c26]Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov:
Guidelines for designing IT security management tools. CHIMIT 2008: 7 - [c25]Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. HAISA 2008: 35-47 - [c24]André Gagné, Kasia Muldner, Konstantin Beznosov:
Identifying Differences between Security and other IT Professionals: a Qualitative Analysis. HAISA 2008: 69-79 - [c23]Qiang Wei, Matei Ripeanu, Konstantin Beznosov:
Authorization Using the Publish-Subscribe Model. ISPA 2008: 53-62 - [c22]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in RBAC systems. SACMAT 2008: 63-72 - [c21]Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov:
The challenges of using an intrusion detection system: is it worth the effort? SOUPS 2008: 107-118 - 2007
- [j4]Konstantin Beznosov, Olga Beznosova:
On the imbalance of the security problem space and its expected consequences. Inf. Manag. Comput. Secur. 15(5): 420-431 (2007) - [c20]Qiang Wei, Matei Ripeanu, Konstantin Beznosov:
Cooperative secondary authorization recycling. HPDC 2007: 65-74 - [c19]David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney S. Fels, Brian D. Fisher:
Towards understanding IT security professionals and their tools. SOUPS 2007: 100-111 - [c18]Rodrigo Werlinger, David Botta, Konstantin Beznosov:
Detecting, analyzing and responding to security incidents: a qualitative analysis. SOUPS 2007: 149-150 - [e1]Konstantin Beznosov, Angelos D. Keromytis:
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007. ACM 2007, ISBN 978-1-60558-080-7 [contents] - 2006
- [j3]Yong Song, Konstantin Beznosov, Victor C. M. Leung:
Multiple-Channel Security Architecture and its Implementation over SSL. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [c17]Jeanette Tsang, Konstantin Beznosov:
A Security Analysis of the Precise Time Protocol (Short Paper). ICICS 2006: 50-59 - [c16]Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten:
Extending XP practices to support security requirements engineering. SESS@ICSE 2006: 11-18 - [c15]Jason Crampton, Wing Leung, Konstantin Beznosov:
The secondary and approximate authorization model and its application to Bell-LaPadula policies. SACMAT 2006: 111-120 - 2005
- [j2]Konstantin Beznosov, Donald J. Flinn, Shirley Kawamoto, Bret Hartman:
Introduction to Web services and their security. Inf. Secur. Tech. Rep. 10(1): 2-14 (2005) - [c14]Konstantin Beznosov:
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services. CBSE 2005: 337-352 - [c13]Konstantin Beznosov:
Flooding and recycling authorizations. NSPW 2005: 67-72 - [c12]Konstantin Beznosov:
Future direction of access control models, architectures, and technologies. SACMAT 2005: 48 - 2004
- [c11]Yong Song, Victor C. M. Leung, Konstantin Beznosov:
Implementing Multiple Channels over SSL. ICETE (2) 2004: 246-256 - [c10]Konstantin Beznosov:
On the benefits of decomposing policy engines into components. Adaptive and Reflective Middleware 2004: 183-188 - [c9]Konstantin Beznosov, Philippe Kruchten:
Towards agile security assurance. NSPW 2004: 47-54 - [c8]Yong Song, Victor C. M. Leung, Konstantin Beznosov:
Supporting End-to-end Security across Proxies with Multiple-Channel SSL. SEC 2004: 323-338 - [c7]Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, Kendra M. L. Cooper:
Applying Aspect-Orientation in Designing Security Systems: A Case Study. SEKE 2004: 360-365 - [c6]Konstantin Beznosov:
Here's Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need. SEM 2004: 3-18 - 2003
- [j1]Yi Deng, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov:
An Approach for Modeling and Analysis of Security System Architectures. IEEE Trans. Knowl. Data Eng. 15(5): 1099-1119 (2003) - 2002
- [c5]Konstantin Beznosov:
Object Security Attributes: Enabling Application-Specific Access Control in Middleware. OTM 2002: 693-710
1990 – 1999
- 1999
- [c4]Konstantin Beznosov, Yi Deng, Bob Blakley, Carol C. Burt, John F. Barkley:
A Resource Access Decision Service for CORBA-Based Distributed Systems. ACSAC 1999: 310-319 - [c3]Konstantin Beznosov, Yi Deng:
A Framework for Implementing Role-Based Access Control Using CORBA Security Service. ACM Workshop on Role-Based Access Control 1999: 19-30 - [c2]John F. Barkley, Konstantin Beznosov, Jinny Uppal:
Supporting Relationships in Access Control Using Role Based Access Control. ACM Workshop on Role-Based Access Control 1999: 55-65 - 1998
- [c1]Konstantin Beznosov:
Requirements for Access Control: US Healthcare Domain. ACM Workshop on Role-Based Access Control 1998: 43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-27 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint