Dissertationen zum Thema „Security control framework“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-41 Dissertationen für die Forschung zum Thema "Security control framework" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Viljoen, Melanie. „A framework towards effective control in information security governance“. Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Der volle Inhalt der QuelleBenjuma, Nuria Mahmud. „An educational framework to support industrial control system security engineering“. Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Der volle Inhalt der QuelleHuang, Qing. „An extension to the Android access control framework“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Der volle Inhalt der QuelleOkere, Irene Onyekachi. „A control framework for the assessment of information security culture“. Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Der volle Inhalt der QuelleMarin, Luis Franco. „SELinux policy management framework for HIS“. Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Der volle Inhalt der QuelleRunsewe, Olubisi Atinuke. „A Policy-Based Management Framework for Cloud Computing Security“. Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Der volle Inhalt der QuelleRadhakrishnan, Sakthi Vignesh. „A framework for system fingerprinting“. Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Der volle Inhalt der QuelleKlosinski, Vance J. „Population and resource control measures a conceptual framework for understanding and implementation“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
Sunkaralakunta, Venkatarama Reddy Rakesh. „A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications“. University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Der volle Inhalt der QuelleManning, Francis Jay. „A Framework for Enforcing Role Based Access Control in Open Source Software“. NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Der volle Inhalt der QuelleGerber, Petro. „Addressing the incremental risks associated with social media by using the cobit 5 control framework“. Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96665.
Der volle Inhalt der QuelleENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will increase competitiveness. However, social media also introduce significant risks to those who adopt it. A business can use existing IT governance control framework to address the risks introduced by social media. However a business should combine existing control frameworks for adequate and complete IT governance. This study was undertaken to help businesses to identify incremental risks resulting from the adoption of social media and to develop an integrated IT governance control framework to address these risks both at strategic and operational level. With the help of the processes in COBIT 5, this study provides safeguards or controls which can be implemented to address the IT risks that social media introduce to a business. By implementing the safeguards and controls identified from COBIT 5, a business ensures that they successfully govern the IT related risks at strategic level. This study also briefly discuss the steps that a business can follow to ensure IT related risks at operational level is addressed through the implementation of configuration controls.
AFRIKAANSE OPSOMMING: Sosiale media bied groot geleenthede vir besighede en die gebruik daarvan sal mededingendheid verhoog. Sosiale media hou ook egter beduidende risiko's in vir diegene wat dit aanneem. 'n Besigheid kan bestaande Informasie Tegnologie (IT) kontrole raamwerke gebruik om die risiko's wat ontstaan as gevolg van die gebruik van sosiale media aan te spreek. Vir voldoende en volledige IT korporatiewe beheer moet 'n besigheid egter bestaande kontrole raamwerke kombineer. Hierdie studie is onderneem om besighede te help om die toenemende risiko's wat ontstaan as gevolg van die gebruik van die sosiale media, te identifiseer en om 'n geïntegreerde IT kontrole raamwerk te ontwikkel om hierdie risiko's op strategiese sowel as operasionele vlak aan te spreek. Met die hulp van die prosesse in COBIT 5 voorsien hierdie studie voorsorgmaatreëls of kontroles wat geïmplementeer kan word om die IT-risiko's waaraan die besigheid, deur middel van sosiale media blootgestel is, aan te spreek. Deur die implementering van die voorsorgmaatreëls en kontroles soos geïdentifiseer uit COBIT 5, verseker ʼn besigheid dat hulle die IT-verwante risiko's op strategiese vlak suksesvol beheer. Hierdie studie bespreek ook kortliks die stappe wat 'n besigheid kan volg om te verseker dat IT-verwante risiko's op operasionele vlak aangespreek word deur die implementering van konfigurasie kontroles.
Habeeb, Richard. „Improving the Security of Building Automation Systems Through an seL4-based Communication Framework“. Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.
Der volle Inhalt der QuelleWard, Michael P. „An architectural framework for describing Supervisory Control and Data Acquisition (SCADA) systems“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FWard.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Cynthia E. Irvine, Deborah S. Shifflett. Includes bibliographical references (p. 73-75). Also available online.
Elwing-Malmfelt, Linus, und Oscar Keresztes. „Semi-automated hardening of networks based on security classifications“. Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21793.
Der volle Inhalt der QuelleAtt utföra riskbedömningar är en nödvändig process när ett informations-system ska säkras. Uppgiften med att utföra riskbedömningar är för organisationer en tidskrävande och dyr process. Därför har olika ramverk för säkerhetskontroller tagits fram för att underlätta denna uppgift. Dessa ramverk innehåller information över vad en organisation behöver implementera för att erhålla en specifik nivå av säkerhet i deras informations-system. Den här säkerhetsnivån varierar beroende på hur mycket säkerhet en implementation tillför. De olika nivåerna definieras av ramverksförfattarna. För att förstå vilka nätverkshärdningar organisationen ska använda samt för vilken del i systemet dessa härdningar ska appliceras, behöver en analytiker manuellt gå igenom implementerings-lösningar i ramverken tillsammans med systemet och på så vis ta fram korrekt härdningsåtgärd för en specifik del i systemet. Syftet med arbetet är att jämföra olika säkerhetskontroller och baserat på resultatet undersöka hur hårdvara, mjukvara och konfigurationer kan användas för att härda nätverket. Vi kommer att utvärdera i vilken utsträckning det är möjligt att generera riktlinjer, huruvida det är möjligt att applicera riktlinjerna och ta fram en prototyp som kan generera riktlinjer. De olika ramverken kommer att jämföras genom att innehållet i deras säkerhetskontroller analyseras. En omfattande mappning kommer att tas fram baserat på analysen och utifrån mappningen kommer ytterliggare implementationer rörande nätverkshädrning analyseras. Med hjälp av implementationerna kommer ett verktyg att föreslås vilket analyserar ett informations-system och som producerar riktlinjer som integrerar implementationerna till ett läsbart format. Dessa riktlinjer undersöks sedan av experter gällande hur väl riktlinjerna uppnår definerade säkerhetsnivåer. Under arbetet identifierades totalt 148 olika säkerhets-kontroller som påvisade likhet med varandra. Med dessa 148 kontroller tillgodo klarade vår prototyp av att producera 111 olika riktlinjer tillhörande olika säkerhetsnivåer beroende på systemet som matades in. Enligt kommentarerna ur granskningen som experterna utförde gick följande att konstatera: riktlinjerna som tas fram genom prototypen kunde upprätthålla varje säkerhetsnivå. Vår prototyp påvisade att det var möjligt att skapa riktlinjer som uppnår en efterfrågad säkerhetsnivå. Även om implementering för varje producerad riktlinje inte är automatiserad så kunde vår prototyp automatisera processen av att avgöra vilken nätverks-härdnings implementation som skulle användas för var riktlinje. Detta tillåter organisationer att lägga mer tid och investeringar i andra organisatoriska intressen.
KAMAT, SIDDESH DEVIDAS. „HANDLING SOURCE MOVEMENT OVER MOBILE-IP AND REDUCING THE CONTROL OVERHEAD FOR A SECURE, SCALABLE MULTICAST FRAMEWORK“. University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1046368307.
Der volle Inhalt der QuelleAkmayeva, Galina. „Impact of access control and copyright in e-learning from user's perspective in the United Kingdom“. Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16867.
Der volle Inhalt der QuelleVan, de Haar Paul. „Towards a wireless local area network security control framework for small, medium and micro enterprises in South Africa“. Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/4001.
Der volle Inhalt der QuelleLi, Jun. „Towards a localisation of trust framework for pervasive environments“. Thesis, University of Hertfordshire, 2008. http://hdl.handle.net/2299/2612.
Der volle Inhalt der QuelleOtt, Amon [Verfasser]. „Mandatory Rule Set Based Access Control in Linux : A Multi-Policy Security Framework and Role Model Solution for Access Control in Networked Linux Systems / Amon Ott“. Aachen : Shaker, 2007. http://d-nb.info/1166511898/34.
Der volle Inhalt der QuelleIrwin, Barry Vivian William. „A framework for the application of network telescope sensors in a global IP network“. Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Der volle Inhalt der QuelleLefeez, Sophie. „An examination of the validity of the concept of nuclear deterrence within the framework of post-cold war international relations : an analytical conflict resolution approach“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/827.
Der volle Inhalt der QuelleMa, Wenjun. „AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /“. unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Der volle Inhalt der QuelleTitle from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Scheffler, Thomas. „Privacy enforcement with data owner-defined policies“. Phd thesis, Universität Potsdam, 2013. http://opus.kobv.de/ubp/volltexte/2013/6793/.
Der volle Inhalt der QuelleIm Rahmen der Dissertation wurde ein Framework für die Durchsetzung von Richtlinien zum Schutz privater Daten geschaffen, welches darauf setzt, dass diese Richtlinien oder Policies direkt von den Eigentümern der Daten erstellt werden und automatisiert durchsetzbar sind. Der Schutz privater Daten ist ein sehr wichtiges Thema im Bereich der elektronischen Kommunikation, welches durch die fortschreitende Gerätevernetzung und die Verfügbarkeit und Nutzung privater Daten in Onlinediensten noch an Bedeutung gewinnt. In der Vergangenheit wurden verschiedene Techniken für den Schutz privater Daten entwickelt: so genannte Privacy Enhancing Technologies. Viele dieser Technologien arbeiten nach dem Prinzip der Datensparsamkeit und der Anonymisierung und stehen damit der modernen Netznutzung in Sozialen Medien entgegen. Das führt zu der Situation, dass private Daten umfassend verteilt und genutzt werden, ohne dass der Datenbesitzer gezielte Kontrolle über die Verteilung und Nutzung seiner privaten Daten ausüben kann. Existierende richtlinienbasiert Datenschutztechniken gehen in der Regel davon aus, dass der Nutzer und nicht der Eigentümer der Daten die Richtlinien für den Umgang mit privaten Daten vorgibt. Dieser Ansatz vereinfacht das Management und die Durchsetzung der Zugriffsbeschränkungen für den Datennutzer, lässt dem Datenbesitzer aber nur die Alternative den Richtlinien des Datennutzers zuzustimmen, oder keine Daten weiterzugeben. Es war daher unser Ansatz die Interessen des Datenbesitzers durch die Möglichkeit der Formulierung eigener Richtlinien zu stärken. Das dabei verwendete Modell zur Zugriffskontrolle wird auch als Owner-Retained Access Control (ORAC) bezeichnet und wurde 1990 von McCollum u.a. formuliert. Das Grundprinzip dieses Modells besteht darin, dass die Autorität über Zugriffsentscheidungen stets beim Urheber der Daten verbleibt. Aus diesem Ansatz ergeben sich zwei Herausforderungen. Zum einen muss der Besitzer der Daten, der Data Owner, in die Lage versetzt werden, aussagekräftige und korrekte Richtlinien für den Umgang mit seinen Daten formulieren zu können. Da es sich dabei um normale Computernutzer handelt, muss davon ausgegangen werden, dass diese Personen auch Fehler bei der Richtlinienerstellung machen. Wir haben dieses Problem dadurch gelöst, dass wir die Datenschutzrichtlinien in drei separate Bereiche mit unterschiedlicher Priorität aufteilen. Der Bereich mit der niedrigsten Priorität definiert grundlegende Schutzeigenschaften. Der Dateneigentümer kann diese Eigenschaften durch eigene Regeln mittlerer Priorität überschrieben. Darüber hinaus sorgt ein Bereich mit Sicherheitsrichtlinien hoher Priorität dafür, dass bestimmte Zugriffsrechte immer gewahrt bleiben. Die zweite Herausforderung besteht in der gezielten Kommunikation der Richtlinien und deren Durchsetzung gegenüber dem Datennutzer (auch als Data User bezeichnet). Um die Richtlinien dem Datennutzer bekannt zu machen, verwenden wir so genannte Sticky Policies. Das bedeutet, dass wir die Richtlinien über eine geeignete Kodierung an die zu schützenden Daten anhängen, so dass jederzeit darauf Bezug genommen werden kann und auch bei der Verteilung der Daten die Datenschutzanforderungen der Besitzer erhalten bleiben. Für die Durchsetzung der Richtlinien auf dem System des Datennutzers haben wir zwei verschiedene Ansätze entwickelt. Wir haben einen so genannten Reference Monitor entwickelt, welcher jeglichen Zugriff auf die privaten Daten kontrolliert und anhand der in der Sticky Policy gespeicherten Regeln entscheidet, ob der Datennutzer den Zugriff auf diese Daten erhält oder nicht. Dieser Reference Monitor wurde zum einen als Client-seitigen Lösung implementiert, die auf dem Sicherheitskonzept der Programmiersprache Java aufsetzt. Zum anderen wurde auch eine Lösung für Server entwickelt, welche mit Hilfe der Aspekt-orientierten Programmierung den Zugriff auf bestimmte Methoden eines Programms kontrollieren kann. In dem Client-seitigen Referenzmonitor werden Privacy Policies in Java Permissions übersetzt und automatisiert durch den Java Security Manager gegenüber beliebigen Applikationen durchgesetzt. Da dieser Ansatz beim Zugriff auf Daten mit anderer Privacy Policy den Neustart der Applikation erfordert, wurde für den Server-seitigen Referenzmonitor ein anderer Ansatz gewählt. Mit Hilfe der Java Reflection API und Methoden der Aspektorientierten Programmierung gelang es Datenzugriffe in existierenden Applikationen abzufangen und erst nach Prüfung der Datenschutzrichtlinie den Zugriff zuzulassen oder zu verbieten. Beide Lösungen wurden auf ihre Leistungsfähigkeit getestet und stellen eine Erweiterung der bisher bekannten Techniken zum Schutz privater Daten dar.
Lahbib, Asma. „Distributed management framework based on the blockchain technology for industry 4.0 environments“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS017.
Der volle Inhalt der QuelleThe evolution of the Internet of Things (IoT) started decades ago as part of the first face of the digital transformation, its vision has further evolved due to a convergence of multiple technologies, ranging from wireless communication to the Internet and from embedded systems to micro-electromechanical systems. As a consequence thereof, IoT platforms are being heavily developed, smart factories are being planned to revolutionize the industry organization and both security and trust requirements are becoming more and more critical. The integration of such technologies within the manufacturing environment and processes in combination with other technologies has introduced the fourth industrial revolution referred to also as Industry 4.0. In this future world machines will talk to machines (M2M) to organize the production and coordinate their actions. However opening connectivity to the external world raises several questions about data and IT infrastructure security that were not an issue when devices and machines were controlled locally and just few of them were connected to some other remote systems. That’s why ensuring a secure communication between heterogeneous and reliable devices is essential to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. Without appropriate security solutions, these systems will never be deployed globally due to all kinds of security concerns. That’s why ensuring a secure and trusted communication between heterogeneous devices and within dynamic and decentralized environments is essential to achieve users acceptance and to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. However, building a secure system does not only mean protecting the data exchange but it requires also building a system where the source of data and the data itself is being trusted by all participating devices and stakeholders. In this thesis our research focused on four complementary issues, mainly (I) the dynamic and trust based management of access over shared resources within an Industry 4.0 based distributed and collaborative system, (ii) the establishment of a privacy preserving solution for related data in a decentralized architecture while eliminating the need to rely on additional third parties, (iii) the verification of the safety, the correctness and the functional accuracy of the designed framework and (iv) the evaluation of the trustworthiness degree of interacting parties in addition to the secure storage and sharing of computed trust scores among them in order to guarantee their confidentiality, integrity and privacy. By focusing on such issues and taking into account the conventional characteristics of both IoT and IoT enabled industries environments, we proposed in this thesis a secure and distributed framework for resource management in Industry 4.0 environments. The proposed framework, enabled by the blockchain technology and driven by peer to peer networks, allows not only the dynamic access management over shared resources but also the distribute governance of the system without the need for third parties that could be their-selves vulnerable to attacks. Besides and in order to ensure strong privacy guarantees over the access control related procedures, a privacy preserving scheme is proposed and integrated within the distributed management framework. Furthermore and in order to guarantee the safety and the functional accuracy of our framework software components, we focused on their formal modeling in order to validate their safety and compliance with their specification. Finally, we designed and implemented the proposal in order to prove its feasibility and analyze its performances
Semenski, Vedran. „An ABAC framework for IoT applications based on the OASIS XACML standard“. Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18493.
Der volle Inhalt der QuelleA IoT (Internet of Things) é uma área que apresenta grande potencial mas embora muitos dos seus problemas já terem soluções satisfatórias, a segurança permanece um pouco esquecida, mantendo-se um como questão ainda por resolver. Um dos aspectos da segurança que ainda não foi endereçado é o controlo de acessos. O controlo de acesso é uma forma de reforçar a segurança que envolve avaliar os pedidos de acesso a recursos e negar o acesso caso este não seja autorizado, garantindo assim a segurança no acesso a recursos críticos ou vulneráveis. O controlo de Acesso é um termo lato, existindo diversos modelos ou paradigmas possíveis, dos quais os mais significativos são: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). Neste trabalho será usado o ABAC, já que oferece uma maior flexibilidade comparativamente a IBAC e RBAC. Além disso, devido à sua natureza adaptativa o ABAC tem maior longevidade e menor necessidade de manutenção. A OASIS (Organization for the Advancement of Structured Information Standards) desenvolveu a norma XACML (eXtensible Access Control Markup Language) para escrita/definição de políticas de acesso e pedidos de acesso, e de avaliação de pedidos sobre conjuntos de políticas com o propósito de reforçar o controlo de acesso sobre recursos. O XACML foi definido com a intenção de que os pedidos e as políticas fossem de fácil leitura para os humanos, garantindo, porém, uma estrutura bem definida que permita uma avaliação precisa. A norma XACML usa ABAC. Este trabalho tem o objetivo de criar uma plataforma de segurança que utilize os padrões ABAC e XACML que possa ser usado por outros sistemas, reforçando o controlo de acesso sobre recursos que careçam de proteção, e garantindo acesso apenas a sujeitos autorizadas. Vai também possibilitar a definição fina ou granular de regras e pedidos permitindo uma avaliação com maior precisão e um maior grau de segurança. Os casos de uso principais são grandes aplicações IoT, como aplicações Smart City, que inclui monitorização inteligente de tráfego, consumo de energia e outros recursos públicos, monitorização pessoal de saúde, etc. Estas aplicações lidam com grandes quantidades de informação (Big Data) que é confidencial e/ou pessoal. Existe um número significativo de soluções NoSQL (Not Only SQL) para resolver o problema do volume de dados, mas a segurança é ainda uma questão por resolver. Este trabalho vai usar duas bases de dados NoSQL: uma base de dados key-value (Redis) para armazenamento de políticas e uma base de dados wide-column (Cassandra) para armazenamento de informação de sensores e informação de atributos adicionais durante os testes.
IoT (Internet of Things) is an area which offers great opportunities and although a lot of issues already have satisfactory solutions, security has remained somewhat unaddressed and remains to be a big issue. Among the security aspects, we emphasize access control. Access Control is a way of enforcing security that involves evaluating requests for accessing resources and denies access if it is unauthorised, therefore providing security for vulnerable resources. Access Control is a broad term that consists of several methodologies of which the most significant are: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). In this work ABAC will be used as it offers the most flexibility compared to IBAC and RBAC. Also, because of ABAC's adaptive nature, it offers longevity and lower maintenance requirements. OASIS (Organization for the Advancement of Structured Information Standards) developed the XACML (eXtensible Access Control Markup Language) standard for writing/defining requests and policies and the evaluation of the requests over sets of policies for the purpose of enforcing access control over resources. It is defined so the requests and policies are readable by humans but also have a well defined structure allowing for precise evaluation. The standard uses ABAC. This work aims to create a security framework that utilizes ABAC and the XACML standard so that it can be used by other systems and enforce access control over resources that need to be protected by allowing access only to authorised subjects. It will also allow for fine grained defining of rules and requests for more precise evaluation and therefore a greater level of security. The primary use-case scenarios are large IoT applications such as Smart City applications including: smart traffic monitoring, energy and utility consumption, personal healthcare monitoring, etc. These applications deal with large quantities (Big Data) of confidential and/or personal data. A number of NoSQL (Not Only SQL) solutions exist for solving the problem of volume but security is still an issue. This work will use two NoSQL databases. A key-value database (Redis) for the storing of policies and a wide-column database (Cassandra) for storing sensor data and additional attribute data during testing.
Ruan, Chun, University of Western Sydney, of Science Technology and Environment College und School of Computing and Information Technology. „Models for authorization and conflict resolution“. THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Der volle Inhalt der QuelleDoctor of Philosphy (PhD)
Toumi, Khalifa. „A trust framework for multi-organization environments“. Phd thesis, Institut National des Télécommunications, 2014. http://tel.archives-ouvertes.fr/tel-00997693.
Der volle Inhalt der QuelleFan, Yang, Hidehiko Masuhara, Tomoyuki Aotani, Flemming Nielson und Hanne Riis Nielson. „AspectKE*: Security aspects with program analysis for distributed systems“. Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4136/.
Der volle Inhalt der QuellePan, Chi-Chien. „Multi-Layered Security Framework for Document Access Control“. 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200412371800.
Der volle Inhalt der QuellePan, Chi-Chien, und 潘啟諫. „Multi-Layered Security Framework for Document Access Control“. Thesis, 2004. http://ndltd.ncl.edu.tw/handle/67333634539125932379.
Der volle Inhalt der Quelle國立臺灣大學
資訊工程學研究所
92
With the highly advanced network technology, the Intranet of the organization has become more complicated and widely applicable. At the same time, new attack models of the malicious software, such as virus and Trojan horse, have also been developed. The Intranet environment, which used to be considered as safe and reliable in the past, suffers tremendous threats. Those novel viruses and Trojan attacks make use of the tunneling technique to bypass the firewall via standard service ports, such as port 80. On the other hand, the sharing of documents in Intranet is essential for present organization, and its security problem has been a threat to development of the organization. The ways to secure the document access and protect Intranet from attacks have become an important issue. In this dissertation, we focus on the security problem for document access control in Intranet, and propose the S.P.A.C. multi-layered security framework to secure it. Within the framework, some present security mechanisms such as IPSec, and SSL can also be integrated to provide more security. We also consider the flexibility and cost in the design to reduce the potential difficulties of physical deployment in the organization. A compete security framework comprises the proxy server technique for application level access control, the dynamic packet filter personal firewall technique for stopping the illegal network packets, the distributed firewall technique for controlling and protecting the client machines, and the dynamic id/password authentication for integration of document access control.
„Assurance Management Framework for Access Control Systems“. Doctoral diss., 2012. http://hdl.handle.net/2286/R.I.15176.
Der volle Inhalt der QuelleDissertation/Thesis
Ph.D. Computer Science 2012
Chiang, Ting-Wen, und 蔣定文. „A Framework for Security NFC Access Control System in Digital Signature Technology“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/22ev8t.
Der volle Inhalt der Quelle國立高雄應用科技大學
資訊管理研究所碩士班
105
With the rising popularity of NFC (Near Field Communication), what NFC cards can do are also increasing in recent years. For example, an access control system can manage the activation status of the door or elevator by using NFC cards or RFID keys. However, security problems may be getting more and more serious in such NFC applications. Thresholds of making the counterfeit card are getting lower and lower, hacker or intruder may also easily use illegal software or tools to imitate other people's cards. Once a NFC card with multiple functions is lost, there may be serious problems of not only the loss of money, but also the risk for security. In this research, two kinds of encryption techniques are adopted, including the asymmetric encryption algorithm and digital signature. When someone is signing into a system, random number will be added onto the signature and the random number will be consistently regenerated over time. By doing so, illegal counterfeit may be effectively eliminated because information transmission cannot be forged easily. NFC card users can use the card more relieved in their lives.
Chen, Pai-Yu, und 陳佩瑜. „A Study on CPA''s Evaluation of Internal Control Framework in Information Security“. Thesis, 2003. http://ndltd.ncl.edu.tw/handle/29476331712396839817.
Der volle Inhalt der Quelle國防管理學院
國防財務資源研究所
91
The government continuously revises the every kind of regulation of ordinance, to stipulate for the publicly-issued companies and OTC-listed companies should invite CPAs to audit financial report of internal control and guarantee the property security, and ensuring property will not be obtained, used and disposed without proper authorization. However, along with the development of the electronic commerce, information security has already become an importance issue. When CPAs audit its auditee companies’ internal control, he should adopt an IT security standard to better evaluate the information technology and information security so that the CPA firms can decrease the auditing risk. We found that each factor contained significantly effect for the auditing of information security, such as planning and organization, acquisition and implementation, delivery and support. Only through a series of evaluations can monitor attaining to standard control and reduce the risk of companies'' internal control. Internal control in information security theory had existed; however prove from of actual situation, and as well find the Taiwan’s CPAs thinking the evaluation of information technology is one part of the internal control. The result from regression analysis can detect which factors of internal control in information security are CPAs most concerned. When CPAs proceed the internal control in information security in the future, they should pay much attention to these factors.
Alalfi, Manar. „A Verification Framework for Access Control in Dynamic Web Applications“. Thesis, 2010. http://hdl.handle.net/1974/5651.
Der volle Inhalt der QuelleThesis (Ph.D, Computing) -- Queen's University, 2010-04-30 14:30:53.018
Alam, Shahid. „A Framework for Metamorphic Malware Analysis and Real-Time Detection“. Thesis, 2014. http://hdl.handle.net/1828/5576.
Der volle Inhalt der QuelleGraduate
0984
alam_shahid@yahoo.com
Lu, Wei. „Unsupervised anomaly detection framework for multiple-connection based network intrusions“. Thesis, 2005. http://hdl.handle.net/1828/1949.
Der volle Inhalt der QuelleNentwig, Markus. „Untersuchung von MAC-Implementationen“. 2010. https://ul.qucosa.de/id/qucosa%3A17167.
Der volle Inhalt der QuelleBechan, Upasna. „Towards a framework for securing a business against electronic identity theft“. Diss., 2008. http://hdl.handle.net/10500/1304.
Der volle Inhalt der QuelleTheoretical Computing
M. Sc. (Information Systems)
Ajigini, Olusegun Ademolu. „A framework to manage sensitive information during its migration between software platforms“. Thesis, 2016. http://hdl.handle.net/10500/21118.
Der volle Inhalt der QuelleInformation Science
D. Litt. et Phil. (Information Systems)
Wang, Wen-yuan, und 汪文淵. „A Study on the Issues of SWIFT Customer Security Controls Framework“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/y85drh.
Der volle Inhalt der Quelle華梵大學
資訊管理學系碩士班
107
The Society for Worldwide Interbank Financial Telecommunica-tion (SWIFT) is the infrastructure provider for the current global in-ternational wire transfer service. Since the Bangladesh Central Bank’s $81 million cyber heist shocked the world in 2016, SWIFT had launched the Customer Security Programme (CSP) to enhance security of all Customer s’ local SWIFT infrastructure. In the CSP, SWIFT had completed the Customer Security Controls Framework (CSCF), and required all its customers to implement. However, since SWIFT CSCF was implemented in 2017, the Malaysia Central Bank still had a case of using SWIFT message system to steal funds in early 2018. In this case, did the Malaysia Central Bank not comply with the requirements of SWIFT CSCF? or SWIFT CSCF still has a few problems to solve, which deserves further exploration. This study is exploratory research, explores whether SWIFT CSCF can still be reinforced by collecting the information currently available publicly, and uses literature analysis. In this study, the Cy-bersecurity Framework of the National Institute of Standards and Technology is used to develop the target profile of SWIFT message system infrastructure on the customer side as a comparative baseline and SWIFT CSCF as the current profile. By comparing the current profile with the target profile to find out what SWIFT CSCF can be reinforced. After comparison, four incomplete aspects of SWIFT CSCF are preliminarily found, and suggestions for improvement are put forward in order to reduce the risk of recurrence of theft cases in SWIFT message system.
Martins, José Carlos Lourenço. „Método de planeamento de segurança da informação para organizações militares em ambiente de guerra de informação“. Doctoral thesis, 2015. http://hdl.handle.net/1822/35769.
Der volle Inhalt der QuelleA investigação realizada responde à questão: - Como garantir a confidencialidade, a integridade e a disponibilidade da informação de uma organização militar, inserida num ambiente de Guerra de Informação, de forma a minimizar o risco de segurança da informação? A resposta a esta questão, que é o foco da investigação e cujo nível de análise é a organização militar, segue predominantemente uma abordagem de investigação de orientação epistemológica interpretativista, qualitativa e indutiva, que utiliza como métodos de investigação, a Análise de Conteúdo, o Focus Group e o Estudo de Caso. Apoia-se simultaneamente num quadro conceptual de referência desenvolvido para o estudo e em disciplinas académicas de foco tecnológico, (Segurança de Redes de Computadores, Segurança no Software). A tese apresentada é de Design Science, em que se obtém um método de planeamento de segurança da informação para apoio aos decisores militares do Exército Português. Este interliga um modelo de métodos de ataque à informação, uma framework de categorias de controlos de segurança da informação e uma matriz de apoio à decisão que permite planear a seleção dos controlos de segurança da informação a implementar na organização. O método proposto permite efetuar a gestão das lições aprendidas com os incidentes de segurança da informação. Considera-se neste estudo que a segurança da informação se consegue através de um processo de gestão onde exista uma integração de dimensões de segurança e onde é fundamental ter em consideração, para as organizações militares, a Cadeia de Comando e o princípio da Unidade de Comando.
The research answer the following question: how to ensure the confidentiality, integrity and availability of information of a military organization that is part of an Information Warfare Environment, in order to minimize the risk of information security? The answer to this question, which is the focus of this research and its level of analysis, is the military organization. The author follows a predominately interpretive, qualitative and inductive research approach of epistemological orientation. The following research methods are used: Content Analysis, the Focus Groups and the Case Study. The author relies on both a conceptual framework developed for the study and in academic disciplines of technological focus (Network Security Computer Safety Software). The presented thesis is of Design Science, where a method of planning of information security support is obtained, to aid military decision-makers of the Portuguese Army. This interconnects a model of attack method to information, a framework of categories of information security controls, and a matrix of support for the decision that allows one to plan the selection of controls of information security to implement in the organization. The proposed method allows one to manage the lessons learned from the incidents of information security. It is considered in this study that information security is achieved through a management process where there exists an integration of security dimensions, and where it is fundamental for military organizations to regard: the Chain of Command and the Unity of Command principle.