Dissertationen zum Thema „Information storage and retrieval systems - security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Information storage and retrieval systems - security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Cheung, Yee-him, und 張貽謙. „Secure object spaces for global information retrieval (SOSGIR)“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Der volle Inhalt der QuelleLabert, Matthew J. „Implementation of information assurance risk management training into existing Department of the Navy training pipelines /“. Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5991.
Der volle Inhalt der QuelleWith the implementation and continuing research on information systems, such as Information Technology for the 21st Century (IT-21), Navy-Marine Corps Intranet (NMCI), and "Network-Centric warfare," there is little doubt that the Navy is becoming heavily dependent on information and information systems. Though much has been accomplished technically to protect and defend these systems, an important security issue has thus far been overlooked-the human factor. Information Assurance Risk Management (IARM) was a proposal to standardize the way DON personnel discuss, treat, and implement information assurance. IARM addresses the human security aspect of information and information systems in a regimented way to be understandable through all levels of the DON. To standardize the way DON personnel perceive information assurance, they must be taught what IARM is and how to use it. Can an IARM course be implemented in the DON, and if so at what level and to whom should it be taught?
Stieger, Ewald Andreas. „A framework for the development of a personal information security agent“. Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012326.
Der volle Inhalt der QuelleSubbiah, Arun. „Efficient Proactive Security for Sensitive Data Storage“. Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Der volle Inhalt der QuelleHorn, John F. „IPSec-based dynamic security services for the MYSEA environment“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
Radley, Johannes Jurgens. „Pseudo-random access compressed archive for security log data“. Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.
Der volle Inhalt der QuelleParameswaran, Rupa. „A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering“. Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11459.
Der volle Inhalt der QuelleNtsham, Xolile. „Information flows in the social development grant process: a user experience perspective“. Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.
Der volle Inhalt der QuelleThis study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an increasingly important role in reducing poverty and inequality in South Africa, but are also subject to challenges like dependency, mismanagement and corruption. Information flow within SASSA is essential for the coordination of the grant process. The success of administering any social grant process depends largely on efficient communication practices and stable information technology. Communication among grant users requires the transfer of relevant information from its point of inception to the next point(s) of use. Government departments are transposing their paper-based systems into digital systems, which pose new implications for grant administration, however. Accordingly, the use of electronic services in government should mean faster information flow and, thus, more effective service delivery. The literature reveals, however, that non-technical aspects like user experience (UX) are essential in designing meaningful e-government systems. With a focus on user experience, this study uncovers the problems that SASSA and grant users face in the grant process and works toward possible solutions to resolve these problems. This research lays an important foundation in terms of gaining a better understanding of information flows, e-government, and user experiences in the grant process. This research is exploratory in nature and adopts a qualitative interpretivist approach. To gain a deeper understanding of the perspectives and experiences of grant users, the researcher employed the „Institutionalise User Experience in Government‟ (IUXG) methodology. The study targeted individuals that had knowledge of the social grants. A purposive sampling technique was used to select the research participants. Furthermore, the researcher adopted a thematic analysis method to code and analyse data. The findings of this study revealed the centrality of user experience in the grant process, notably in terms of the many challenges associated with information flow. The findings also revealed that factors such as social grant awareness, availability and use of information technology, digital divide, and grant accessibility bring enormous impact on grant processes and service delivery. The study contributes a landscape model for depicting the information flows in processing grants, and develops a broader understanding of how technology can help users to better disburse, access, and utilise grants. The study also informs e- government practitioners about the design and implementation of user-centred design with emphasis on information flows. Key Words: Information flows, social grants, e-government, and user experience.
Mashima, Daisuke. „Safeguarding health data with enhanced accountability and patient awareness“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45775.
Der volle Inhalt der QuelleWatkins, Alfred R. „Continuous media object modeling, storage, and retrieval“. Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/9184.
Der volle Inhalt der QuelleSENIGAGLIESI, LINDA. „Information-theoretic security techniques for data communications and storage“. Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263165.
Der volle Inhalt der QuelleThe last years have seen a growing need of security and privacy in many aspects of communications, together with the technological progress. Most of the implemented security solutions are based on the notion of computational security, and must be kept continuously updated to face new attacks and technology advancements. To meet the more and more strict requirements, solutions based on the information-theoretic paradigm are gaining interest to support pure cryptographic techniques, thanks to their capacity to achieve security independently on the attacker’s computing resources, also known as unconditional security. In this work we investigate how information-theoretic security can be applied to practical systems in order to ensure data security and privacy. We first start defining information-theoretic metrics to assess the secrecy performance of realistic wireless communication settings under practical conditions, together with a protocol that mixes coding techniques for physical layer security and cryptographic solutions. This scheme is able to achieve some level of semantic security at the presence of a passive attacker. At the same time, multiple scenarios are considered. We provide a security analysis for parallel relay channels, thus finding an optimal resource allocation that maximizes the secrecy rate. Successively, by exploiting a probabilistic model checker, we define the parameters for heterogeneous distributed storage systems that permit us to achieve perfect secrecy in practical conditions. For privacy purposes, we propose a scheme which guarantees private information retrieval of files for caching at the wireless edge against multiple spy nodes. We find the optimal content placement that minimizes the backhaul usage, thus reducing the communication cost of the system.
Xie, Jinsheng. „On the analysis of selected automated storage and retrieval systems“. Diss., Georgia Institute of Technology, 1985. http://hdl.handle.net/1853/25020.
Der volle Inhalt der QuelleChen, QiFan. „An object-oriented database system for efficient information retrieval applications“. Diss., This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-06062008-170433/.
Der volle Inhalt der QuelleHo, Lai-ming. „Evaluation of the development and impact of clinical information systems /“. Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19657857.
Der volle Inhalt der QuelleFraser, Mark E. „Architecture and methodology for storage, retrieval and presentation of geo-spatial information“. [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000316.
Der volle Inhalt der QuelleTitle from title page of source document. Document formatted into pages; contains xi, 77 p.; also contains graphics. Includes vita. Includes bibliographical references.
Fei, Qi. „Operation models for information systems /“. View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?IELM%202009%20FEI.
Der volle Inhalt der QuelleColes, Susan. „Personal information systems : the implications of job and individual differences for design“. Thesis, Loughborough University, 1990. https://dspace.lboro.ac.uk/2134/33024.
Der volle Inhalt der QuelleATCHESON, PAUL DONALD. „AN INVESTIGATION OF ANALOG OPTICAL STORAGE THROUGH PHOTOCHEMICAL HOLE-BURNING“. Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/188022.
Der volle Inhalt der QuellePaiva, Joao Argemiro de Carvalho. „Topological Equivalence and Similarity in Multi-Representation Geographic Databases“. Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/PaivaJA1998.pdf.
Der volle Inhalt der QuelleWurm, Kurt B. „The Integration of Cadastral Base Mapping with Cadastral Parcel Attribution“. Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/WurmKB2003.pdf.
Der volle Inhalt der QuelleAngkasith, Vorapoch. „An intelligent design retrieval system for module-based products“. Diss., Columbia, Mo. : University of Missouri-Columbia, 2004. http://hdl.handle.net/10355/4085.
Der volle Inhalt der QuelleThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (June 30, 2006) Vita. Includes bibliographical references.
Gregory, Michael W. (Michael Walter). „Interrelational Laboratory Information System for Data Storage and Retrieval“. Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc935708/.
Der volle Inhalt der QuelleGrabs, Torsten. „Storage and retrieval of XML documents with a cluster of database systems /“. Berlin : Aka, 2003. http://www.loc.gov/catdir/toc/fy0713/2007435297.html.
Der volle Inhalt der QuelleMukherjea, Sougata. „Visualizing the information space of hypermedia systems“. Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8223.
Der volle Inhalt der QuelleYeung, Chung Kei. „Ontological model for information systems development methodology“. HKBU Institutional Repository, 2006. http://repository.hkbu.edu.hk/etd_ra/702.
Der volle Inhalt der QuelleDaoud, Amjad M. „Efficient data structures for information retrieval“. Diss., Virginia Tech, 1993. http://hdl.handle.net/10919/40031.
Der volle Inhalt der QuelleSahle, Eskinder. „Development of a user interface for MARIAN and CODER systems“. Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-04272010-020142/.
Der volle Inhalt der QuelleVeerasamy, Aravindan. „Visualization and user interface techniques for interactive information retrieval systems“. Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/9244.
Der volle Inhalt der QuelleBae, Sanghoon. „Development of a real-time and geographical information system-based transit management information system“. Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-11242009-020226/.
Der volle Inhalt der QuelleLee, Jaejin. „Robust multitrack modulation codes for the storage channel“. Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/15034.
Der volle Inhalt der QuelleCheung, Yee-him. „Secure object spaces for global information retrieval (SOSGIR) /“. Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23295284.
Der volle Inhalt der QuellePridaphattharakun, Wilasini. „Information retrieval and answer extraction for an XML knowledge base in WebNL“. [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000344.
Der volle Inhalt der QuelleTitle from title page of source document. Document formatted into pages; contains xiii, 71 p.; also contains graphics. Includes vita. Includes bibliographical references.
France, Robert Karl. „An artificial intelligence environment for information retrieval research“. Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/91091.
Der volle Inhalt der QuelleM.S.
Fulmer, Charles A. „Developing information storage and retrieval systems on the internet a knowledge management approach“. Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5596.
Der volle Inhalt der QuelleSearch is becoming the primary way in which people get information. In 2010, global Internet usage was over two billion people, with 92% of online adults using search engines to find information. Most commercial search engines (Google, Yahoo, Bing, etc.) provide their indexing and search services at no cost. The DoD can achieve large gains at a small cost by making public documents available to search engines. This can be achieved through the utilization of important design components and effective knowledge management. This thesis examines methods for making information available to search engines at the Naval Postgraduate School (NPS) and the Defense Technical Information Center (DTIC). In a large-scale project, over 200,000 documents were organized on the website dodreports.com. The results of this research revealed improvement gains of 8-20% for finding reports through commercial search engines during the first six months of implementation.
Bae, Soo Hyun. „Information retrieval via universal source coding“. Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26573.
Der volle Inhalt der QuelleCommittee Chair: Juang, Biing-Hwang; Committee Member: Al-Regib, Ghassan; Committee Member: Linda Wiils; Committee Member: Mersereau, Russell; Committee Member: Pappas, Thrasyvoulos. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Tedori, Veronica. „Design of a safety management information and tracking system“. Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03302010-020341/.
Der volle Inhalt der QuelleJanicki, James H. „Retrieval from an image knowledge base /“. Online version of thesis, 1993. http://hdl.handle.net/1850/12196.
Der volle Inhalt der QuelleMohageg, Michael F. „The influence of hypertext linking structures and task-related variables on information retrieval tasks“. Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-08082007-114303/.
Der volle Inhalt der QuelleVijayan, Balaji. „Accurate and efficient detection, prediction and exploitation of program phases“. Diss., Online access via UMI:, 2005.
Den vollen Inhalt der Quelle findenHjalmarsson, Anders. „Behovet av struktur och frihet : en avhandling om situationsanpassad facilitering vid samarbetsinriktad modellering“. Doctoral thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-3524.
Der volle Inhalt der QuelleJennings, Daniel Blair. „Welding information system : design, operations, methods“. Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/29988.
Der volle Inhalt der QuelleApplied Science, Faculty of
Civil Engineering, Department of
Graduate
On, Sai Tung. „Efficient transaction recovery on flash disks“. HKBU Institutional Repository, 2010. http://repository.hkbu.edu.hk/etd_ra/1170.
Der volle Inhalt der QuelleYildiz, Meliha Yetisgen. „Using statistical and knowledge-based approaches for literature-based discovery /“. Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/7178.
Der volle Inhalt der QuelleLamb, Robert Ray. „An information retrieval system for images from the trace satellite“. Thesis, Montana State University, 2008. http://etd.lib.montana.edu/etd/2008/lamb/LambR0508.pdf.
Der volle Inhalt der QuelleIancu, Ovidiu Dan. „The role of timing in shaping information processing in neural systems /“. Full text open access at:, 2008. http://content.ohsu.edu/u?/etd,659.
Der volle Inhalt der QuelleWang, Jiying. „Information extraction and integration for Web databases /“. View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20WANGJ.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 112-118). Also available in electronic version. Access restricted to campus users.
Mo, Yiu Wing. „Comparative study on routing strategies for integrated automated storage and retrieval system /“. View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?IEEM%202005%20MO.
Der volle Inhalt der QuelleYoon, Changwoo. „Domain-specific knowledge-based informational retrieval model using knowledge reduction“. [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011560.
Der volle Inhalt der QuelleMcFarland, Sean Alan. „Decision making theory with geographic information systems support“. CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3393.
Der volle Inhalt der QuelleTakagaki, Ken. „A formalism for object-based information systems development“. Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/31016.
Der volle Inhalt der QuelleBusiness, Sauder School of
Graduate