Konstantin Beznosov

According to our database1, Konstantin Beznosov authored at least 108 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Towards Understanding the Link Between Age and Smartphone Authentication.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Dynamically Regulating Mobile Application Permissions.
IEEE Security & Privacy, 2018

Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Source Attribution of Cryptographic API Misuse in Android Applications.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Characterizing Social Insider Attacks on Facebook.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

An Early Warning System for Suspicious Accounts.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

2016
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Pervasive and Mobile Computing, 2016

Android users in the wild: Their authentication and usage behavior.
Pervasive and Mobile Computing, 2016

Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs.
Computers & Security, 2016

Phishing threat avoidance behaviour: An empirical investigation.
Computers in Human Behavior, 2016

Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Advancing the Understanding of Android Unlocking and Usage.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Snooping on Mobile Phones: Prevalence and Trends.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

2015
Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

On the Impact of Touch ID on iPhone Passcodes.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Android Rooting: Methods, Detection, and Evasion.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Thwarting Fake OSN Accounts by Predicting their Victims.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications.
IEEE Systems Journal, 2014

Finding influential neighbors to maximize information diffusion in twitter.
Proceedings of the 23rd International World Wide Web Conference, 2014

To Befriend Or Not? A Model of Friend Request Acceptance on Facebook.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Helping users review and make sense of access policies in organizations.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Speculative Authorization.
IEEE Trans. Parallel Distrib. Syst., 2013

Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013

Design and analysis of a social botnet.
Computer Networks, 2013

Privacy Aspects of Health Related Information Sharing in Online Social Networks.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Know your enemy: the risk of unauthorized access in smartphones by insiders.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Graph-based Sybil detection in social and information systems.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures.
Computers & Security, 2012

Key Challenges in Defending Against Malicious Socialbots.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Understanding Users' Requirements for Data Protection in Smartphones.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Authorization recycling in hierarchical RBAC systems.
ACM Trans. Inf. Syst. Secur., 2011

Analysis of ANSI RBAC Support in EJB.
IJSSE, 2011

Toward understanding distributed cognition in IT security management: the role of cues and norms.
Cognition, Technology & Work, 2011

What makes users refuse web single sign-on?: an empirical investigation of OpenID.
Proceedings of the Symposium On Usable Privacy and Security, 2011

On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011

A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Heuristics for evaluating IT security management tools.
Proceedings of the Symposium On Usable Privacy and Security, 2011

OpenID-enabled browser: towards usable and secure web single sign-on.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Promoting a physical security mental model for personal firewall warnings.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Heuristics for evaluating IT security management tools.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

The socialbot network: when bots socialize for fame and money.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Preparation, detection, and analysis: the diagnostic work of IT security incident response.
Inf. Manag. Comput. Security, 2010

Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks.
IJSSE, 2010

Analysis of ANSI RBAC Support in COM+.
Computer Standards & Interfaces, 2010

Do windows users follow the principle of least privilege?: investigating user account control practices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A billion keys, but few locks: the crisis of web single sign-on.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010

OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Investigating an appropriate design for personal firewalls.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Investigating user account control practices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
An integrated view of human, organizational, and technological challenges of IT security management.
Inf. Manag. Comput. Security, 2009

Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Int. J. Hum.-Comput. Stud., 2009

Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports.
IJCIS, 2009

Revealing hidden context: improving mental models of personal firewall users.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A multi-method approach for user-centered design of identity management systems.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Usability meets access control: challenges and research opportunities.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Open Problems in Web 2.0 User Content Sharing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Application-based TCP hijacking.
Proceedings of the Second European Workshop on System Security, 2009

Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009

Towards improving mental models of personal firewall users.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Secure Web 2.0 Content Sharing Beyond Walled Gardens.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge.
IEEE Software, 2008

Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
IEEE Internet Computing, 2008

The challenges of using an intrusion detection system: is it worth the effort?
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Authorization recycling in RBAC systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Authorization Using the Publish-Subscribe Model.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Identifying Differences between Security and other IT Professionals: a Qualitative Analysis.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Guidelines for designing IT security management tools.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

Security practitioners in context: their activities and interactions.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Human, organizational, and technological factors of IT security.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
On the imbalance of the security problem space and its expected consequences.
Inf. Manag. Comput. Security, 2007

Detecting, analyzing and responding to security incidents: a qualitative analysis.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Towards understanding IT security professionals and their tools.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Cooperative secondary authorization recycling.
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007

2006
Multiple-Channel Security Architecture and its Implementation over SSL.
EURASIP J. Wireless Comm. and Networking, 2006

The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Extending XP practices to support security requirements engineering.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

A Security Analysis of the Precise Time Protocol (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Introduction to Web services and their security.
Inf. Sec. Techn. Report, 2005

Future direction of access control models, architectures, and technologies.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Flooding and recycling authorizations.
Proceedings of the New Security Paradigms Workshop 2005, 2005

Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services.
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005

2004
Here's Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need.
Proceedings of the Software Engineering and Middleware, 4th International Workshop, 2004

Applying Aspect-Orientation in Designing Security Systems: A Case Study.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

Supporting End-to-end Security across Proxies with Multiple-Channel SSL.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Towards agile security assurance.
Proceedings of the New Security Paradigms Workshop 2004, 2004

On the benefits of decomposing policy engines into components.
Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware, 2004

Implementing Multiple Channels over SSL.
Proceedings of the ICETE 2004, 2004

2003
An Approach for Modeling and Analysis of Security System Architectures.
IEEE Trans. Knowl. Data Eng., 2003

2002
Object Security Attributes: Enabling Application-Specific Access Control in Middleware.
Proceedings of the On the Move to Meaningful Internet Systems, 2002, 2002

1999
A Framework for Implementing Role-Based Access Control Using CORBA Security Service.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

Supporting Relationships in Access Control Using Role Based Access Control.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

A Resource Access Decision Service for CORBA-Based Distributed Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Requirements for Access Control: US Healthcare Domain.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998


  Loading...