The way security mechanisms for distributed applications are engineered today has a number of serious drawbacks. As a result, secure distributed applications are (a) very expensive and error-prone to build, deploy, and integrate, (b) complex and error-prone to operate and administer, and still (c) far from being adequate to the real-life problems. I discuss recent developments at the Laboratory for Education and Research in Secure Systems Engineering (LERSSE), University of British Columbia. We have been investigating improvements in the way security mechanisms for distributed IT systems are engineered and managed. I will specifically talk about - an ongoing study of how IT security is managed in today organizations, and what makes it chall...
Abstract—Attacks against networked system are common and increasing, therefore, IT practitioners nee...
[[abstract]]This article uses qualitative research and grounded theories, to explore information sec...
Security is the foundation of any systems or organizations based on Information Technology(IT), e.g....
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Security has become one of the most urgent issues for many organizations. It is an essential require...
Information security is no longer just about security. Today, security is about resource and informa...
§This and other LERSSE publications can be found at lersse-dl.ece.ubc.ca In today’s world, IT securi...
International audienceIn our era of the service industry, information systems play a major place, ev...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
Security engineering is about creating viable solutions to real-world security problems-solutions th...
Middleware is referred to as computer software that can connect various software components or appli...
Security and trust issues have been catapulted to the forefront with the dramatic developments in te...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
With the rapid growth of the information age, electronic activities of many kinds are becoming more ...
network layer. Most annual security reports demonstrate insuffi-cient application security measures ...
Abstract—Attacks against networked system are common and increasing, therefore, IT practitioners nee...
[[abstract]]This article uses qualitative research and grounded theories, to explore information sec...
Security is the foundation of any systems or organizations based on Information Technology(IT), e.g....
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Security has become one of the most urgent issues for many organizations. It is an essential require...
Information security is no longer just about security. Today, security is about resource and informa...
§This and other LERSSE publications can be found at lersse-dl.ece.ubc.ca In today’s world, IT securi...
International audienceIn our era of the service industry, information systems play a major place, ev...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
Security engineering is about creating viable solutions to real-world security problems-solutions th...
Middleware is referred to as computer software that can connect various software components or appli...
Security and trust issues have been catapulted to the forefront with the dramatic developments in te...
Cybercrime continues to grow, and more effort should be put into defending capabilities against crim...
With the rapid growth of the information age, electronic activities of many kinds are becoming more ...
network layer. Most annual security reports demonstrate insuffi-cient application security measures ...
Abstract—Attacks against networked system are common and increasing, therefore, IT practitioners nee...
[[abstract]]This article uses qualitative research and grounded theories, to explore information sec...
Security is the foundation of any systems or organizations based on Information Technology(IT), e.g....