Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing all 14 articles
Browse latest View live

Experience Report: Design and Implementation of a Component-Based Protection...

This report reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services. The limitations of Microsoft ASP.NET...

View Article



Architectural Separation of Authorization and Application Logic in...

Security is an essential feature and foremost concern to enterprise software systems. Today, application-level access control (and other security) functions are based on complex, fine-grain and/or...

View Article

Design and Implementation of Resource Access Decision Server

Decoupling authorization decision logic enables implementation of complex and consistent access control policies across heterogeneous systems. However, this is difficult, if not impossible to implement...

View Article

Engineering Application-level Access Control in Distributed Systems

This chapter discusses issues of engineering access control solutions in distributed applications for enterprise computing environments. It reviews application-level access control available in...

View Article

Experience Report: Design and Implementation of a Component-Based Protection...

This presentation reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services. The limitations of Microsoft ASP.NET...

View Article


Here’s Your Lego™ Security Kit: How to Give Developers All Protection...

By presenting a protection architecture for ASP.NET Web services, this paper demonstrates the feasibility of creating middleware mechanisms in the form of composable, flexible, and extensible building...

View Article

Improving Practical Security Engineering: Overview of the Ongoing Research

Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the...

View Article

Performance Considerations for a CORBA-based Application Authorization Service

Resource Access Decision (RAD) Service allows separation of authorization from application functionality in distributed application systems by providing a logically centralized authorization control...

View Article


Software Engineering at ECE

This talk gives a brief overview of the Software Engineering teaching and research at the Department of Electrical and Computer Engineering, the University of British Columbia.

View Article


Towards Agile Security Assurance

Agile development methods are promising to become the next generation replacing water-fall development. They could eventually replace the plan-driven methodologies not only in pure software solutions...

View Article

Towards Agile Security Assurance

Agile development methods are promising to become the next generation replacing water-fall development. They could eventually replace the plan-driven methodologies not only in pure software solutions...

View Article

Towards Agile Security Assurance

Agile development methods are promising to become the next generation replacing water-fall development. They could eventually replace the plan-driven methodologies not only in pure software solutions...

View Article

Extending XP Practices to Support Security Requirements Engineering

This paper proposes a way of extending eXtreme Programming (XP) practices, in particular the original planning game and the coding guidelines, to aid the developers and the customer to engineer...

View Article


Towards Agile Security Assurance

Agile development methods are promising to become the next generation replacing waterfall development. They could eventually replace the plan-driven methodologies not only in pure software solutions in...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images