publications

Google Scholar profile, publications list in DBLP, ACM DL Author Profile

all Konstantin’s publications in LERSSE DL (you can download each)

generated by bibbase.org
  2024 (1)
Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada. Azadeh Mokhberi, Yue Huang, Guillaume Humbert, Borke Obada-Obieh, Masoud Mehrabi Koushki, & Konstantin Beznosov. In Proceedings of the CHI Conference on Human Factors in Computing Systems, pages 1–25, 2024.
Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada [link]Paper   link   bibtex   2 downloads  
  2022 (5)
COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention. Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, & Konstantin Beznosov. In Proceedings of the 2022 Conference on Human Information Interaction and Retrieval, of CHIIR '22, pages 12–24, New York, NY, USA, 2022. Association for Computing Machinery
COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention [link] official copy   doi   link   bibtex   abstract  
SoK: the dual nature of technology in sexual abuse. Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, & Konstantin Beznosov. In 2022 IEEE Symposium on Security and Privacy (SP), pages 2320–2343, 2022. IEEE
link   bibtex  
Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User {Access-Control} Solutions on Smartphones. Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, & Konstantin Beznosov. In 31st USENIX Security Symposium (USENIX Security 22), pages 917–935, 2022.
link   bibtex  
Users' Perceptions of Chrome Compromised Credential Notification. Yue Huang, Borke Obada-Obieh, & Konstantin Beznosov. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pages 155–174, 2022.
link   bibtex  
Users' Expectations, Experiences, and Concerns With COVID Alert, an Exposure-Notification App. Yue Huang, Borke Obada-Obieh, Satya Lokam, & Konstantin Beznosov. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW2): 1–33. 2022.
link   bibtex  
  2021 (8)
Security notifications in static analysis tools: Developers’ attitudes, comprehension, and ability to act on them. Mohammad Tahaei, Kami Vaniea, Konstantin Beznosov, & Maria K Wolters. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–17, 2021.
link   bibtex  
Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users. Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, & Rainer Böhme. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–19, 2021.
link   bibtex  
On smartphone users’ difficulty with understanding implicit authentication. Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, & Konstantin Beznosov. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–14, 2021.
link   bibtex  
The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets. Artemij Voskobojnikov, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, & Konstantin Beznosov. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–14, 2021. Honorable Mention, acceptance rate: 26%,
link   bibtex  
Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk. Artemij Voskobojnikov, Svetlana Abramova, Konstantin Beznosov, & Rainer Böhme. In ECIS, 2021.
link   bibtex  
Challenges and threats of mass telecommuting: a qualitative study of workers. Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pages 675–694, 2021.
link   bibtex  
What makes security-related code examples different. Azadeh Mokhberi, Tiffany Quon, & Konstantin Beznosov. In SOUPS Workshop on Security Information Workers (WSIW). USENIX Association, 2021.
link   bibtex  
SoK: human, organizational, and technological dimensions of developers’ challenges in engineering secure software. Azadeh Mokhberi, & Konstantin Beznosov. In Proceedings of the 2021 European Symposium on Usable Security, pages 59–75, 2021.
link   bibtex  
  2020 (7)
Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. Yue Huang, Borke Obada-Obieh, & Konstantin Beznosov. In Proceedings of the 2020 CHI conference on human factors in computing systems, pages 402:1—402:13, 2020. Honorable Mention, acceptance rate: 24%,
Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks [link]Paper   link   bibtex   1 download  
The burden of ending online account sharing. Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2020.
link   bibtex  
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users. Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov. In Joseph Bonneau, & Nadia Heninger., editor(s), International Conference on Financial Cryptography and Data Security (FC), pages 595–614, 2020. Springer International Publishing
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users [link] offical copy   Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users [link] author copy   Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users [link] presentation video   Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users [link] video summary   Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users [link] presentation slides   doi   link   bibtex   abstract   9 downloads  
Towards understanding privacy and trust in online reporting of sexual assault. Borke Obada-Obieh, Lucrezia Spagnolo, & Konstantin Beznosov. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), pages 145–164, 2020.
link   bibtex  
Is implicit authentication on smartphones really popular? On android users’ perception of “smart lock for android”. Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, & Konstantin Beznosov. In 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, pages 1–17, 2020.
link   bibtex  
End Users’ Information-sharing Behaviours and Preferences within a Multi-user Smart Home. Yue Huang, Borke Obada-Obieh, & Konstantin Beznosov. In USENIX Symposium on Usable Privacy and Security (SOUPS), 2020.
link   bibtex  
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?. Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, & Hyoungshick Kim. ACM Transactions on Privacy and Security (TOPS), 23(4): 1–32. 2020.
link   bibtex  
  2019 (4)
Forecasting suspicious account activity at large-scale online service providers. Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, & Matei Ripeanu. In Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers 23, pages 569–587, 2019. Springer International Publishing
link   bibtex  
Vulnerability & blame: Making sense of unauthorized access to smartphones. Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, & Konstantin Beznosov. In Proceedings of the 2019 chi conference on human factors in computing systems, pages 1–13, 2019.
link   bibtex  
Towards understanding the link between age and smartphone authentication. Lina Qiu, Alexander De Luca, Ildar Muslukhov, & Konstantin Beznosov. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pages 1–10, 2019.
link   bibtex  
Vulnerability & Blame. Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, & Konstantin Beznosov. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019. ACM
link   bibtex  
  2018 (4)
Contextualizing privacy decisions for better prediction (and protection). Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David Wagner, Konstantin Beznosov, & Serge Egelman. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2018.
link   bibtex  
Dynamically regulating mobile application permissions. Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, & Konstantin Beznosov. IEEE Security & Privacy, 16(1): 64–71. 2018.
link   bibtex  
Source Attribution of Cryptographic API Misuse in Android Applications. Ildar Muslukhov, Yazan Boshmaf, & Konstantin Beznosov. . 2018.
link   bibtex  
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers. Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, & Meizhu Liu. arXiv preprint arXiv:1801.08629. 2018.
link   bibtex  
  2017 (5)
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences. Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, & Konstantin Beznosov. In 2017 IEEE Symposium on Security and Privacy (SP), pages 1077–1093, 2017. IEEE
link   bibtex  
Characterizing social insider attacks on Facebook. Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago Guerreiro, & Luı́s Carriço. In Proceedings of the 2017 CHI conference on human factors in computing systems, pages 3810–3820, 2017.
link   bibtex  
I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay. Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh B Bobba, Konstantin Beznosov, & Hyoungshick Kim. In Workshop on Usable Security, San Diego, CA, 2017.
link   bibtex  
I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails. Jun Ho Huh, Hyoungshick Kim, Swathi SVP Rayala, Rakesh B Bobba, & Konstantin Beznosov. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pages 387–391, 2017.
link   bibtex  
An early warning system for suspicious accounts. Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, & Meizhu Liu. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pages 51–52, 2017.
link   bibtex  
  2016 (9)
Phishing threat avoidance behaviour: An empirical investigation. Nalin Asanka Gamagedara Arachchilage, Steve Love, & Konstantin Beznosov. Computers in Human Behavior, 60: 185–197. 2016.
link   bibtex  
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Lerı́a, Jorge, Jose Lorenzo, Matei Ripeanu, Konstantin Beznosov, & Hassan Halawa. Computers & Security, 61: 142–168. 2016.
link   bibtex  
Snooping on mobile phones: Prevalence and trends. Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luı́s Carriço, & Konstantin Beznosov. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pages 159–174, 2016. Distinguished Paper Award, acceptance rate: 25%,
link   bibtex  
Sharing health information on Facebook: Practices, preferences, and risk perceptions of North American users. Sadegh Torabi, & Konstantin Beznosov. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pages 301–320, 2016.
link   bibtex  
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, & Elizeu Santos-Neto. In Proceedings of the 2016 new security paradigms workshop, pages 11–22, 2016.
link   bibtex  
Advancing the understanding of android unlocking and usage. Lina Qiu, Ildar Muslukhov, & Konstantin Beznosov. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016.
link   bibtex  
Decoupling data-at-rest encryption and smartphone locking with wearable devices. Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, & Konstantin Beznosov. Pervasive and Mobile Computing, 32: 26–34. 2016.
link   bibtex  
Android users in the wild: Their authentication and usage behavior. Ahmed Mahfouz, Ildar Muslukhov, & Konstantin Beznosov. Pervasive and Mobile Computing, 32: 50–61. 2016.
link   bibtex  
Estimating Vulnerability Scores To Augment Enterprise Security Systems. Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, & Alex Loffler. . 2016.
link   bibtex  
  2015 (8)
On the Memorability of System-generated PINs: Can Chunking Help?. Jun Ho Huh, Hyoungshick Kim, Rakesh B Bobba, Masooda N Bashir, & Konstantin Beznosov. In eleventh symposium on usable privacy and security (SOUPS 2015), pages 197–209, 2015.
link   bibtex  
Integro: Leveraging victim prediction for robust fake account detection in OSNs. Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Lerı́a, Jorge, Jose Lorenzo, Matei Ripeanu, & Konstantin Beznosov. In NDSS, volume 15, pages 8–11, 2015.
link   bibtex  
A study on the influential neighbors to maximize information diffusion in online social networks. Hyoungshick Kim, Konstantin Beznosov, & Eiko Yoneki. Computational Social Networks, 2: 1–15. 2015.
link   bibtex  
Android permissions remystified: A field study on contextual integrity. Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, & Konstantin Beznosov. In 24th USENIX Security Symposium (USENIX Security 15), pages 499–514, 2015.
link   bibtex  
On the Impact of Touch ID on iPhone Passcodes. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, & Konstantin Beznosov. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 257–276, 2015.
link   bibtex  
Thwarting fake OSN accounts by predicting their victims. Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, & Elizeu Santos-Neto. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pages 81–89, 2015.
link   bibtex  
Surpass: System-initiated user-replaceable passwords. Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, & S Raj Rajagopalan. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 170–181, 2015.
link   bibtex  
Android rooting: Methods, detection, and evasion. San-Tsai Sun, Andrea Cuadros, & Konstantin Beznosov. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pages 3–14, 2015.
link   bibtex  
  2014 (8)
Poster: Helping users review and make sense of access policies in organizations. Pooya Jaferian, & Konstantin Beznosov. In SOUPS, volume 14, pages 301–320, 2014.
link   bibtex  
Finding influential neighbors to maximize information diffusion in twitter. Hyoungshick Kim, Konstantin Beznosov, & Eiko Yoneki. In Proceedings of the 23rd International Conference on World Wide Web, pages 701–706, 2014.
link   bibtex  
Helping users review and make sense of access policies in organizations. Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov. In CHI'14 Extended Abstracts on Human Factors in Computing Systems, pages 2017–2022. 2014.
link   bibtex  
To befriend or not? A model of friend request acceptance on Facebook. Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, & Konstantin Beznosov. In 10th Symposium On Usable Privacy and Security (SOUPS 2014), pages 285–300, 2014.
link   bibtex  
To authorize or not authorize: helping users review access policies in organizations. Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov. In 10th Symposium On Usable Privacy and Security (SOUPS 2014), pages 301–320, 2014.
link   bibtex  
A game storyboard design for avoiding phishing attacks. Nalin AG Arachchilage, Ivan Flechais, & Konstantin Beznosov. In Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS), 2014.
link   bibtex  
Cued Mnemonics for Better Security and Memorability. Primal Wijesekera, Ivan Cherapau, Ayumi Samarakoon, & Konstantin Beznosov. Who are you,1–3. 2014.
link   bibtex  
Towards Understanding and Improving IT Security Management. Kosta Beznosov. In Symposium on Usable Privacy and Security (SOUPS), pages 301–320, 2014.
link   bibtex  
  2013 (8)
Analysis of ANSI RBAC support in EJB. Wesam Darwish, & Konstantin Beznosov. In Developing and Evaluating Security-Aware Software Systems, pages 177–204. IGI Global, 2013.
link   bibtex  
Design and analysis of a social botnet. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu. Computer Networks, 57(2): 556–578. 2013.
link   bibtex  
Does my password go up to eleven? The impact of password meters on password selection. Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, & Cormac Herley. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2379–2388, 2013.
link   bibtex  
Graph-based sybil detection in social and information systems. Yazan Boshmaf, Konstantin Beznosov, & Matei Ripeanu. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 466–473, 2013. Best Paper Award, acceptance rate: 13%,
link   bibtex  
Know your enemy: the risk of unauthorized access in smartphones by insiders. Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, & Konstantin Beznosov. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 271–280, 2013.
link   bibtex  
Privacy aspects of health related information sharing in online social networks. Sadegh Torabi, & Konstantin Beznosov. In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13), 2013.
link   bibtex  
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model. San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov. ACM Transactions on Internet Technology (TOIT), 13(1): 1–35. 2013.
link   bibtex  
Efficient authentication and key management mechanisms for smart grid communications. Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, & Victor CM Leung. IEEE systems journal, 8(2): 629–640. 2013.
link   bibtex  
  2012 (8)
Retrofitting existing web applications with effective dynamic protection against sql injection attacks. San-Tsai Sun, & Konstantin Beznosov. In Security-Aware Systems Applications and Software Development Methods, pages 169–189. IGI Global, 2012.
link   bibtex  
Speculative authorization. Pranab Kini, & Konstantin Beznosov. IEEE Transactions on Parallel and Distributed Systems, 24(4): 814–824. 2012.
link   bibtex  
Understanding users' requirements for data protection in smartphones. Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, & Konstantin Beznosov. In 2012 IEEE 28th international conference on data engineering workshops, pages 228–235, 2012. IEEE
link   bibtex  
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov. Computers & Security, 31(4): 465–483. 2012.
link   bibtex  
Key challenges in defending against malicious socialbots. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu. In 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012.
link   bibtex  
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. San-Tsai Sun, & Konstantin Beznosov. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 378–390, 2012.
link   bibtex  
Augur: Aiding malware detection using large-scale machine learning. Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Kyle Zeeuwen, David Cornell, & Dmitry Samosseiko. In Proceedings of the 21st Usenix Security Symposium (Poster session)(August 2012), 2012.
link   bibtex  
Symposium On Usable Privacy and Security SOUPS 2012. Sonia Chiasson, Kirstie Hawkey, Konstantin Beznosov, Alessandro Acquisti, Lujo Bauer, Robert Biddle, L Jean Camp, Lynne Coventry, Alexander De Luca, Simson L Garfinkel, & others. . 2012.
link   bibtex  
  2011 (13)
Toward understanding distributed cognition in IT security management: the role of cues and norms. David Botta, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov. Cognition, Technology & Work, 13: 121–134. 2011.
link   bibtex  
Heuristics for evaluating IT security management tools. Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, & Konstantin Beznosov. In Proceedings of the Seventh Symposium on Usable Privacy and Security, pages 1–20, 2011. Best Paper Award, acceptance rate: 33%,
link   bibtex  
Promoting a physical security mental model for personal firewall warnings. Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, & Konstantin Beznosov. In CHI'11 Extended Abstracts on Human Factors in Computing Systems, pages 1585–1590. 2011.
link   bibtex  
The socialbot network: when bots socialize for fame and money. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu. In Proceedings of the 27th annual computer security applications conference (ACSAC), pages 93–102, 2011. Best Paper Award, acceptance rate: 25%,
doi   link   bibtex  
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings. Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the Seventh Symposium on Usable Privacy and Security, pages 1–18, 2011.
link   bibtex  
Stragegies for Monitoring Fake AV Distribution Networks. Onur Komili, Kyle Zeeuwen, Matei Ripeanu, & Konstantin Beznosov. Virus Bulletin. 2011.
link   bibtex  
OpenID-enabled browser: towards usable and secure web single sign-on. San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov. In CHI'11 Extended Abstracts on Human Factors in Computing Systems, pages 1291–1296. 2011.
link   bibtex  
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, & Konstantin Beznosov. In Proceedings of the seventh symposium on usable privacy and security, pages 1–20, 2011.
link   bibtex  
Authorization recycling in hierarchical RBAC systems. Qiang Wei, Jason Crampton, Konstantin Beznosov, & Matei Ripeanu. ACM Transactions on Information and System Security (TISSEC), 14(1): 1–29. 2011.
link   bibtex  
What makes users refuse web single sign-on? An empirical investigation of OpenID. San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the seventh symposium on usable privacy and security, pages 1–20, 2011.
link   bibtex  
Poster: Motivating users to choose better passwords through peer pressure. Andreas Sotirakopoulos, Ildar Muslukov, Konstantin Beznosov, Cormac Herley, & Serge Egelman. Proc. SOUPS 2011. 2011.
link   bibtex  
Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers. Kyle Zeeuwen, Matei Ripeanu, & Konstantin Beznosov. In Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, of WebQuality '11, pages 42–49, New York, NY, USA, 2011. Association for Computing Machinery
Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers [link]Paper   doi   link   bibtex   abstract   1 download  
A brick wall, a locked door, and a bandit. Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, & Konstantin Beznosov. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. ACM
link   bibtex  
  2010 (13)
Do Windows users follow the principle of least privilege? Investigating user account control practices. Sara Motiee, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1–13, 2010.
link   bibtex  
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours. Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.
link   bibtex  
Preparation, detection, and analysis: the diagnostic work of IT security incident response. Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov. Information Management & Computer Security. 2010.
link   bibtex  
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle. San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the 6th ACM workshop on Digital identity management, pages 49–58, 2010.
link   bibtex  
A billion keys, but few locks: the crisis of web single sign-on. San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the 2010 new security paradigms workshop, pages 61–72, 2010.
link   bibtex  
Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. Hu Xiong, Konstantin Beznosov, Zhiguang Qin, & Matei Ripeanu. In 2010 IEEE International Conference on Communications, pages 1–6, 2010. IEEE
link   bibtex  
It's too complicated, so i turned it off! expectations, perceptions, and misconceptions of personal firewalls. Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, & Kellogg S Booth. In Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pages 53–62, 2010.
link   bibtex  
Investigating an appropriate design for personal firewalls. Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, & Kellogg S Booth. In CHI'10 Extended Abstracts on Human Factors in Computing Systems, pages 4123–4128. 2010.
link   bibtex  
Poster: Validating and extending a study on the effectiveness of ssl warnings. Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov. In Poster at Symposium on Usable Privacy and Security, 2010.
link   bibtex  
Investigating user account control practices. Sara Motiee, Kirstie Hawkey, & Konstantin Beznosov. In CHI'10 Extended Abstracts on Human Factors in Computing Systems, pages 4129–4134. 2010.
link   bibtex  
Analysis of ANSI RBAC support in COM+. Wesam Darwish, & Konstantin Beznosov. Computer Standards & Interfaces, 32(4): 197–214. 2010.
link   bibtex  
The challenges of understanding users’ security-related knowledge, behaviour, and motivations. Sara Motiee, Kirstie Hawkey, & Konstantin Beznosov. In Symposium on Usable Privacy and Security (SOUPS), 2010.
link   bibtex  
Challenges in evaluating complex IT security management systems. Pooya Jaferian, Kirstie Hawkey, & Konstantin Beznosov. In Symposium on Usable Privacy and Security (SOUPS), 2010.
link   bibtex  
  2009 (16)
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports. Hafiz Abdur Rahman, Konstantin Beznosov, & Martı́, José R. International Journal of Critical Infrastructures, 5(3): 220–244. 2009.
link   bibtex  
An integrated view of human, organizational, and technological challenges of IT security management. Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov. Information Management & Computer Security. 2009.
link   bibtex  
Revealing hidden context: improving mental models of personal firewall users. Fahimeh Raja, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the 5th Symposium on Usable Privacy and Security, pages 1–12, 2009.
link   bibtex  
Secure web 2.0 content sharing beyond walled gardens. San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov. In 2009 Annual Computer Security Applications Conference, pages 409–418, 2009. IEEE
link   bibtex  
Security practitioners in context: Their activities and interactions with other stakeholders within organizations. Rodrigo Werlinger, Kirstie Hawkey, David Botta, & Konstantin Beznosov. International Journal of Human-Computer Studies, 67(7): 584–606. 2009.
link   bibtex  
Towards improving mental models of personal firewall users. Fahimeh Raja, Kirstie Hawkey, & Konstantin Beznosov. In CHI'09 Extended Abstracts on Human Factors in Computing Systems, pages 4633–4638. 2009.
link   bibtex  
Usability meets access control: challenges and research opportunities. Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, & Mary Ellen Zurko. In Proceedings of the 14th ACM symposium on Access control models and technologies, pages 73–74, 2009.
link   bibtex  
A case study of enterprise identity management system adoption in an insurance organization. Pooya Jaferian, David Botta, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the Symposium on Computer Human interaction for the Management of information Technology, pages 46–55, 2009.
link   bibtex  
Open problems in web 2.0 user content sharing. San-Tsai Sun, & Konstantin Beznosov. In iNetSec 2009–Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers, pages 37–51, 2009. Springer Berlin Heidelberg
link   bibtex  
Application-based TCP hijacking. Oliver Zheng, Jason Poon, & Konstantin Beznosov. In Proceedings of the Second European Workshop on System Security, pages 9–15, 2009.
link   bibtex  
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov. In 2009 International Conference on Computational Science and Engineering, volume 4, pages 979–984, 2009. IEEE
link   bibtex  
A multi-method approach for user-centered design of identity management systems. Pooya Jaferian, David Botta, Kirstie Hawkey, & Konstantin Beznosov. In SOUPS, 2009.
link   bibtex  
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov. In HAISA, pages 119–134, 2009.
link   bibtex  
SQLPrevent: Effective dynamic detection and prevention of SQL injection. San-Tsai Sun, & Konstantin Beznosov. Technical Report Technical report, March, 2009.
link   bibtex  
Auxiliary material for the study of security practitioners in context: their activities and interactions with other stakeholders within organizations. Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov. Technical Report Technical Report LERSSE-TR-2009-01, Laboratory for Education and Research in …, 2009.
link   bibtex  
Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens. San-Tsai Sun, & Konstantin Beznosov. 2009.
link   bibtex  
  2008 (13)
Authorization recycling in RBAC systems. Qiang Wei, Jason Crampton, Konstantin Beznosov, & Matei Ripeanu. In Proceedings of the 13th ACM symposium on Access control models and technologies, pages 63–72, 2008.
link   bibtex  
The challenges of using an intrusion detection system: is it worth the effort?. Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, & Konstantin Beznosov. In Proceedings of the 4th symposium on Usable privacy and security, pages 107–118, 2008.
link   bibtex  
Guidelines for designing it security management tools. Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie Hawkey, & Konstantin Beznosov. In Proceedings of the 2nd ACM Symposium on Computer Human interaction For Management of information Technology, pages 1–10, 2008.
link   bibtex  
Human, organizational, and technological factors of IT security. Kirstie Hawkey, David Botta, Rodrigo Werlinger, Kasia Muldner, Andre Gagne, & Konstantin Beznosov. In CHI'08 extended abstracts on Human factors in computing systems, pages 3639–3644. 2008.
link   bibtex  
Searching for the right fit: balancing IT security management model trade-offs. Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov. IEEE Internet Computing, 12(3): 22–30. 2008.
link   bibtex  
Identifying Differences between Security and other IT Professionals: a Qualitative Analysis. André Gagné, Kasia Muldner, & Konstantin Beznosov. HAISA, 8: 69–80. 2008.
link   bibtex  
Human, Organizational and Technological Challenges of Implementing Information Security in Organizations. R Werlinger, K Hawkey, & K Beznosov. In Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), pages 35–147, 2008. Lulu. com
link   bibtex  
Security practitioners in context: their activities and interactions. Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov. In CHI'08 extended abstracts on Human factors in computing systems, pages 3789–3794. 2008.
link   bibtex  
Security for the rest of us: An industry perspective on the secure-software challenge. Konstantin Beznosov, & Brian Chess. IEEE Software, 25(1): 10–12. 2008.
link   bibtex  
Authorization using the publish-subscribe model. Qiang Wei, Matei Ripeanu, & Konstantin Beznosov. In 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pages 53–62, 2008. IEEE
link   bibtex  
Protecting ASP. NET Web Services. Konstantin Beznosov. In Securing Web Services: Practical Usage of Standards and Specifications, pages 206–227. IGI Global, 2008.
link   bibtex  
Sqlprevent: Effective dynamic detection and prevention of sql injection attacks without access to the application source code. San-Tsai Sun, & Konstantin Beznosov. Technical Report Technical Report, 2008.
link   bibtex  
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov. HAISA, 8: 35–48. 2008. Best Paper Award,
link   bibtex  
  2007 (7)
Towards understanding IT security professionals and their tools. David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, & Brian Fisher. In Proceedings of the 3rd symposium on Usable privacy and security, pages 100–111, 2007.
link   bibtex  
On the imbalance of the security problem space and its expected consequences. Konstantin Beznosov, & Olga Beznosova. Information Management & Computer Security, 15(5): 420–431. 2007.
link   bibtex  
Cooperative secondary authorization recycling. Qiang Wei, Matei Ripeanu, & Konstantin Beznosov. In Proceedings of the 16th international symposium on High performance distributed computing, pages 65–74, 2007.
link   bibtex  
Detecting, analyzing and responding to security incidents: a qualitative analysis. Rodrigo Werlinger, David Botta, & Konstantin Beznosov. In Proceedings of the 3rd symposium on Usable privacy and security, pages 149–150, 2007.
link   bibtex  
Support for ANSI RBAC in CORBA. Konstantin Beznosov, & Wesam Darwish. In Technical Report LERSSE-TR-2007-01, accessible from http://lersse-dl. ece. ubc. ca/search. py? recid= 129. Laboratory for Education and Research in Secure Systems Engineering …, 2007.
link   bibtex  
Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs. Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov. Technical Report tech. report LERSSE-TR-2007-03, Laboratory for Education and Research in …, 2007.
link   bibtex  
Studying IT security professionals: research design and lessons learned. David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, & Brian Fisher. In Workshop on security user studies: methodologies and best practices, 2007.
link   bibtex  
  2006 (8)
Extending XP practices to support security requirements engineering. Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, & Philippe Kruchten. In Proceedings of the 2006 international workshop on Software engineering for secure systems, pages 11–18, 2006.
link   bibtex  
The secondary and approximate authorization model and its application to Bell-LaPadula policies. Jason Crampton, Wing Leung, & Konstantin Beznosov. In Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 111–120, 2006.
link   bibtex  
Multiple-channel security architecture and its implementation over SSL. Yong Song, Konstantin Beznosov, & Victor CM Leung. EURASIP Journal on Wireless Communications and Networking, 2006: 1–14. 2006.
link   bibtex  
A security analysis of the precise time protocol (short paper). Jeanette Tsang, & Konstantin Beznosov. In Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings 8, pages 50–59, 2006. Springer Berlin Heidelberg
link   bibtex  
Cooperative Approximate Authorization Recycling. Qiang Wei, Konstantin Beznosov, & Matei Ripeanu. . 2006.
link   bibtex  
Assessment of Interdependencies between Communication and Information Technology Infrastructure and other Critical Infrastructures from Public Failure Reports. Hafiz Abdur Rahman, & Konstantin Beznosov. . 2006.
link   bibtex  
HOT Admin: Human, Organization, and Technology Centred Improvement of IT Security Administration. David Botta, Rodrigo Werlinger, Andre Gagne, Konstantin Beznosov, Lee Iverson, Brian Fisher, & Sidney Fels. In Proceedings of the Annual Computer Security Applications Conference, 2006.
link   bibtex  
Usable Security: Quo Vadis?. Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, & Ka-Ping Yee. In 15th USENIX Security Symposium (USENIX Security 06), 2006.
link   bibtex  
  2005 (10)
Introduction to Web services and their security. Konstantin Beznosov, Donald J Flinn, Shirley Kawamoto, & Bret Hartman. Information Security Technical Report, 10(1): 2–14. 2005.
link   bibtex  
Flooding and recycling authorizations. Konstantin Beznosov. In Proceedings of the 2005 workshop on New security paradigms, pages 67–72, 2005.
link   bibtex  
Experience report: Design and implementation of a component-based protection architecture for ASP. NET web services. Konstantin Beznosov. In International Symposium on Component-Based Software Engineering, pages 337–352, 2005. Springer Berlin Heidelberg Berlin, Heidelberg
link   bibtex  
Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM). Konstantin Beznosov. University of British Columbia. 2005.
link   bibtex  
Analysis of scalable security–MC-SSL savings. Johnson Lee, Victor CM Leung, & Konstantin Beznosov. In Tech. Rep. LERSSE-TR-2005-02. Laboratory for Education and Research in Secure Systems Engineering (LERSSE …, 2005.
link   bibtex  
Future direction of access control models, architectures, and technologies. Konstantin Beznosov. In Proceedings of the tenth ACM symposium on Access control models and technologies, pages 48–48, 2005.
link   bibtex  
A Method for Assessing the Trustworthiness of an Entity by Cooperating Authorities. Konstantin Beznosov, & Ing Daniel Fischer. . 2005.
link   bibtex  
SPAPI: A security and protection architecture for physical infrastructures and its deployment strategy using wireless sensor networks. Hafiz Abdur Rahman, & Konstantin Beznosov. In 2005 IEEE Conference on Emerging Technologies and Factory Automation, volume 2, pages 8–pp, 2005. IEEE
link   bibtex  
CITI Fault Report Classification and Encoding for Vulnerability and Risk Assessment of Interconnected Infrastructures. Hafiz Abdur Rahman, & Konstantin Beznosov. . 2005.
link   bibtex  
Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data. Hafiz Abdur Rahman, & Konstantin Beznosov. . 2005.
link   bibtex  
  2004 (7)
Towards agile security assurance. Konstantin Beznosov, & Philippe Kruchten. In Proceedings of the 2004 workshop on New security paradigms, pages 47–54, 2004.
link   bibtex  
Applying Aspect-Orientation in Designing Security Systems: A Case Study. Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, & Kendra ML Cooper. In SEKE, pages 360–365, 2004.
link   bibtex  
Supporting End-To-End Security Across Proxies with Multiplechannel SSL. Yong Song, Victor CM Leung, & Konstantin Beznosov. In Security and Protection in Information Processing Systems: IFIP 18 th World Computer Congress TC11 19 th International Information Security Conference 22–27 August 2004 Toulouse, France, pages 323–337, 2004. Springer US
link   bibtex  
On the benefits of decomposing policy engines into components. Konstantin Beznosov. In Proceedings of the 3rd workshop on Adaptive and reflective middleware, pages 183–188, 2004.
link   bibtex  
Implementing Multiple Channels over SSL. Yong Song, Victor CM Leung, & Konstantin Beznosov. In ICETE (2), pages 246–256, 2004.
link   bibtex  
Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need. Konstantin Beznosov. In International Workshop on Software Engineering and Middleware, pages 3–18, 2004. Springer Berlin Heidelberg Berlin, Heidelberg
link   bibtex  
Constraints. Konstantin Beznosov. In Symposium on Access Control Models and Technologies: Proceedings of the ninth ACM symposium on Access control models and technologies, volume 2004, 2004.
link   bibtex  
  2003 (7)
Mastering web services security. Bret Hartman, Donald J Flinn, Konstantin Beznosov, & Shirley Kawamoto. 2003.
link   bibtex  
An approach for modeling and analysis of security system architectures. Yi Deng, Jiacun Wang, Jeffrey JP Tsai, & Konstantin Beznosov. IEEE Transactions on knowledge and data engineering, 15(5): 1099–1119. 2003.
link   bibtex  
Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it. Konstantin Beznosov. In First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, volume 31, 2003.
link   bibtex  
A Two-factor Authentication Mechanism Using Mobile Phones. Nima Kaviani, Kirstie Hawkey, & Konstantin Beznosov. available at, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical report LERSSE-TR-2008-03,(Aug. 20, 2008). 2003.
link   bibtex  
Securing Web services. B Hartman, DJ Flinn, K Beznosov, & S Kawamoto. APPLICATION DEVELOPMENT TRENDS, 10(2): 39–46. 2003.
link   bibtex  
eXtensible Access Control Markup. Anne Anderson, Bill Parducci, Entrust Carlisle Adams, Don Flinn, Gerald Brose, Hal Lockhart, Konstantin Beznosov, IBM Michiharu Kudo, Polar Humenn, Simon Godik, & others. language, 28: 29. 2003.
link   bibtex  
Attribute Function: an enabler for effective inexpensive application-specific security decisions. Konstantin Beznosov. . 2003.
link   bibtex  
  2002 (4)
Enterprise Security with EJB and CORBA. Bret Hartman, Donald J Flinn, & Konstantin Beznosov. 2002.
link   bibtex  
Object security attributes: Enabling application-specific access control in middleware. Konstantin Beznosov. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", pages 693–710, 2002. Springer Berlin Heidelberg Berlin, Heidelberg
link   bibtex  
Mastering Web Services Security. Konstantin Beznosov, B Hartman, DJ Flinn, & S Kawamoto. 2002.
link   bibtex  
Security Engineering for Large Scale Distributed Applications. Konstantin Beznosov. . 2002.
link   bibtex  
  2001 (1)
Engineering access control in distributed applications. Konstantin Beznosov, & Yi Deng. In Handbook of Software Engineering and Knowledge Engineering: Volume I: Fundamentals, pages 69–90. 2001.
link   bibtex  
  2000 (4)
Engineering access control for distributed enterprise applications. Konstantin Beznosov. Ph.D. Thesis, Florida International University, 2000.
link   bibtex  
Information enterprise architectures: problems and perspectives. Konstantin Beznosov. In Written for the Advanced Topics in Software Engineering seminar given by Dr. Michael Evangelist at the School of Computer Science, Florida International University, 2000.
link   bibtex  
Design and Implementation of Resource Access Decision Server. Luis Espinal, Konstantin Beznosov, & Yi Deng. Center for Advanced Distributed Systems Engineering (CADSE)-Florida International University, Miami technical report, 1. 2000.
link   bibtex  
Performance considerations for CORBA-based application authorization service. Konstantin Beznosov, Luis Espinal, & Yi Deng. In Proceedings of the Fourth IASTED International Conference Software Engineering and Applications,(Las Vegas, Nevada, USA, 2000), 2000.
link   bibtex  
  1999 (3)
Supporting relationships in access control using role based access control. John Barkley, Konstantin Beznosov, & Jinny Uppal. In Proceedings of the fourth ACM workshop on Role-based access control, pages 55–65, 1999.
link   bibtex  
A resource access decision service for CORBA-based distributed systems. Konstantin Beznosov, Yi Deng, Bob Blakley, Carol Burt, & John Barkley. In Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pages 310–319, 1999. IEEE
link   bibtex  
A framework for implementing role-based access control using CORBA security service. Konstantin Beznosov, & Yi Deng. In Proceedings of the fourth ACM workshop on Role-based access control, pages 19–30, 1999.
link   bibtex  
  1998 (4)
Requirements for access control: US healthcare domain. Konstantin Beznosov. In Proceedings of the third ACM workshop on Role-based access control, pages 43, 1998.
link   bibtex  
Architecture of information enterprises: Problems and perspectives. written for the “Advanced topics in software engineering” seminar given by dr. michael evangelist during spring of 1998 at school of computer science, florida international university. K Beznosov. 1998.
link   bibtex  
Computer and Distributed Security: Introductory Overview for Researchers. Konstantin Beznosov. . 1998.
link   bibtex  
Decoupling Authorization Logic From Application Logic in CORBA Security-Aware Applications. Konstantin Beznosov, Yi Dengy, Bob Blakleyz, Carol Burtx, & John Barkley. . 1998.
link   bibtex  
  1997 (1)
CORBAmed security white paper. Wayne Wilson, & Konstantin Beznosov. Object Management Group corbamed/97-11-03. 1997.
link   bibtex  
  undefined (27)
Realizing Service-Centric Software Systems. Konstantin Beznosov, & Brian Chess. . .
link   bibtex  
Christoph Schuba, Sun Microsystems, Inc.(Program Chair) Charles Payne, Adventium Labs (Program Co-Chair). Pierangela Samarati, Terry Benzel, Konstantin Beznosov, Germano Caronni, Ramaswamy Chandramouli, Marc Dacier, Ernesto Damianti, Gary Ellison, Dieter Gollmann, Steven J Greenwald, & others. . .
link   bibtex  
An RT-based Policy Model for Converged Networks. San-Tsai Sun, & Konstantin Beznosov. . .
link   bibtex  
Effectiveness of IT Security Tools in Practice. Fahimeh Raja, Kasia Muldner, & Konstantin Beznosov. . .
link   bibtex  
OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 7 November 2002. Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudo, Pierangela Samarati, Pirasenna Velandai Thiyagarajan, Polar Humenn, Sekhar Vajjhala, Seth Proctor, & others. . .
link   bibtex  
Evaluation of SAAMBLP. Kyle Zeeuwen, & Konstantin Beznosov. . .
link   bibtex  
Ian Marshall. Ehab Al-Shaer, Xuhui Ao, Arosha Bandara, Jean Bacon, Moritz Becker, Elisa Bertino, Konstantin Beznosov, Rakesh Bobba, Marcus Brunner, Mark Burgess, & others. . .
link   bibtex  
Understanding IT Security Administration through a Field Study. David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, & Brian Fisher. . .
link   bibtex  
UsefUl CompUTer seCUrITy. Bryan D Payne, W Keith Edwards, Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov, Sean Bechhofer, Yeliz Yesilada, Robert Stevens, Simon Jupp, & Bernard Horan. . .
link   bibtex  
Poster: OpenIDemail Enabled Browser, Towards Fixing the Broken Web Single Sign-On Triangle. San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov. . .
link   bibtex  
Poster: Expectations, Perceptions, and Misconceptions of Personal Firewalls. Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, & Kellogg S Booth. . .
link   bibtex  
Poster: OpenIDemail Enabled Browser. San-Tsai Sun, & Konstantin Beznosov. . .
link   bibtex  
Charles Payne (PC Co-Chair), Adventium Labs. Tuomas Aura, Lujo Bauer, David Elliott Bell, Terry Benzel, Konstantin Beznosov, Rafae Bhatti, Sabrina De Capitani Vimercati, Marc Dacier, Mary Denz, Jan Eloff, & others. . .
link   bibtex  
Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens. San-Tsai Sun, & Konstantin Beznosov. . .
link   bibtex  
Poster: Fine-Grained Locking System for Data and Applications in Smartphones. Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov, Cynthia Kuo, & Jonathan Lester. . .
link   bibtex  
Poster: Towards Improving Usability of Access Certification Interfaces. Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov. . .
link   bibtex  
POSTER: How Many Attackers Did You Befriend Today? An Automated Social Engineering Attack in Social Networking Sites. Yazan Boshmaf, Konstantin Beznosov, & Matei Ripeanu. . .
link   bibtex  
Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks. Sadegh Torabi, & Konstantin Beznosov. . .
link   bibtex  
Searching for the Right Fit. Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov. . .
link   bibtex  
The Socialbot Network: Are Social Botnets Possible?. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu. . .
link   bibtex  
Poster: Speculative Authorizations. Pranab Kini, & Konstantin Beznosov. . .
link   bibtex  
Resource Access Decision Facility: Overview. Konstantin Beznosov. . .
link   bibtex  
Revealing hidden context. Fahimeh Raja, K Hawkey, & K Beznosov. In Proc. 5th Symp. Usable Priv. Secur.-SOUPS, volume 9, pages 1, .
link   bibtex  
Why is it important to detect fakes?. Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Dionysios Logothetis, Georgios Siganos, Jorge Laria, & Jose Lorenzo. . .
link   bibtex  
OASIS eXtensible Access Control Markup Language (XACML) Working Draft 17, 27 September 2002. Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudoh, Pierangela Samarati, Pirs Vilandai Thiyatarajan, Polar Humenn, Sekhar Vajjhala, Steve Anderson, & others. . .
link   bibtex  
Systematization of Knowledge: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software. Azadeh Mokhberi, & Konstantin Beznosov. . .
link   bibtex  
OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 8 October 2002. Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudo, Pierangela Samarati, Piras Vilandai Thiyatarajan, Polar Humenn, Sekhar Vajjhala, Steve Anderson, & others. . .
link   bibtex