Dissertationen zum Thema „Security Suite“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-20 Dissertationen für die Forschung zum Thema "Security Suite" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Bartoli, Andrea. „Security protocols suite for machine-to-machine systems“. Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.
Der volle Inhalt der QuelleJohansson, Michael. „Internet of things security in healthcare : A test-suite and standard review“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.
Der volle Inhalt der QuelleMcCulley, Shane. „Forensic Analysis of G Suite Collaborative Protocols“. ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Der volle Inhalt der QuelleKohout, David. „Implementace zabezpečení do DLMS protokolu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.
Der volle Inhalt der QuelleMarchal, Xavier. „Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus“. Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Der volle Inhalt der QuelleInternet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Třeštíková, Lenka. „Bezpečnostní metriky platformy SAP“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.
Der volle Inhalt der QuelleRobert, Emilie. „L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001“. Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.
Der volle Inhalt der QuelleThe fight against terrorism, as well as its consequences in the field of Human Rights, is not a new theme for Europe. However, since the terrorist attacks of September the 11th 2001 in the United States of America, “confirmed” by the ones of Madrid in 2004 and London in 2005, it has never embodied such a priority. The larger part of the measures taken by the European Union falls under the heading of cooperation in criminal matters, i.e. within the scope of the former Third Pillar, among which the framework decision on combating terrorism, the framework decision on the European arrest warrant and the agreements between the European Union and the United States of America on extradition and mutual legal assistance. On basis of the European measures, some States, not historically concerned by terrorism, have been compelled to carry out counter-terrorism measures whereas, others have seen a legitimation to reinforce their existing body of law. What is the impact of the European measures and the ones taken by States on the delicate balance between security and liberty? In other words, what is the role of the Rule of Law: a limitation to those measures or, a principle aiming to the strengthening of the fight against terrorism?
Rehana, Jinat. „Model Driven Development of Web Application with SPACE Method and Tool-suit“. Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.
Der volle Inhalt der QuelleMoyer, Shawn P. „Creating a mix of spooks and suits : a new role for intelligence“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
Ziani, Adel. „Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)“. Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.
Der volle Inhalt der QuelleNagy, Jan. „Zabezpečení bezdrátových senzorových sítí“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412805.
Der volle Inhalt der QuelleWang, Qianxue. „Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques“. Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.
Der volle Inhalt der QuelleIn this thesis, a new way to generate pseudorandom numbers is presented. The propositionis to mix two exiting generators with discrete chaotic iterations that satisfy the Devaney’sdefinition of chaos. A rigorous framework is introduced, where topological properties of theresulting generator are given, and two practical designs are presented and evaluated. It is shownthat the statistical quality of the inputted generators can be greatly improved by this way, thusfulfilling the up-to-date standards. Comparison between these two designs and existing generatorsare investigated in details. Among other things, it is established that the second designedtechnique outperforms the first one, both in terms of performance and speed.In the first part of this manuscript, the iteration function embedded into chaotic iterations isthe vectorial Boolean negation. In the second part, we propose a method using graphs havingstrongly connected components as a selection criterion.We are thus able to modify the iterationfunction without deflating the good properties of the associated generator. Simulation resultsand basic security analysis are then presented to evaluate the randomness of this new family ofpseudorandom generators. Finally, an illustration in the field of information hiding is presented,and the robustness of the obtained data hiding algorithm against attacks is evaluated
Small, Jeremiah. „Patterns in network security: an analysis of architectural complexity in securing recursive inter-network architecture networks“. Thesis, 2012. https://hdl.handle.net/2144/17155.
Der volle Inhalt der QuelleDollar, Timothy Wayne. „Ensuring document security, user coordination, and multimedia synchronization in a prototype groupware suite“. 1997. http://catalog.hathitrust.org/api/volumes/oclc/39271833.html.
Der volle Inhalt der QuelleHertenberger, Manfred Paul. „A reference framework for security in enterprise resource planning (ERP) systems“. Thesis, 2008. http://hdl.handle.net/10210/496.
Der volle Inhalt der QuelleBoshoff, Paul Marthinus. „Securing host and application information in the TCP/IP protocol suite“. Thesis, 2012. http://hdl.handle.net/10210/5673.
Der volle Inhalt der QuelleUsing the Internet for communication purposes constitutes a high risk, considering the security of such information. The protocol suite used on the Internet is the TCP/IP protocol suite, which consists of the Transmission Control Protocol (TCP) and the Internet Protocol (IP). In a bid to create a basis to support the newly conceptualised ideas, various areas of networking are briefly discussed in this dissertation. The first in this series of areas is that of the OSI layers. This model forms the basis of all networking concepts. The model describes seven layers, of which each performs a certain networking function. The TCP/IP protocol suite fits into this model. Network security and encryption methods are applied and followed to secure information on the Internet. These methods have been used over a long period of time and will also be used to support the newly conceptualised ideas. The main focus of this dissertation falls on the securing of certain parts of the information contained in the headers of both the Transmission Control Protocol (TCP) and the Internet Protocol (IP) in a bid to minimise the amount of data that may be inferred about the communicating parties from these headers. In addition, where multiple routes exist between hosts, the possibility of the deliberate distribution of a single message across these routes is examined. Such distribution will further complicate the task of a hacker attempting to gather information from TCP and IP headers. In addition, such distribution will minimise the possibility that a hacker may assemble a complete message from its constituent parts and that he/she may infer information about the message that cannot be inferred from the isolated parts. The length of a message sent between hosts is one simple example of such information.
chiao-ju, chuang, und 莊喬汝. „The Study on the Suits and the Causation of Security Fraud“. Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41675261778053174337.
Der volle Inhalt der QuelleWidyopratomo, Daniel Adrianto, und 魏丹尼. „Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.
Der volle Inhalt der Quelle國立交通大學
電機資訊國際學程
103
Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Network Provider. According to this categorization, ETSI allows the M2M Service Provider to select the one that is the most suitable for their M2M applications. The standards do not describe in what condition a particular protocol will be the best among the others. Although M2M Service Providers can easily choose one out of many options, it is most ideal if some analytic methods can be defined for selecting a protocol that is the most secure and the least resource demanding one according to the characteristics and the traffic patterns of IoT applications. In this research we examine which conditions are most suitable for a security protocol and a cipher suite algorithm. We focus only on access-independent protocols which do not require any relationship between the M2M Service Provider and the Access Network Provider, because these protocols are most applicable in the industry. Also, the whole end-to-end system can be simulated easily by assuming no support from access networks. In TS 102 690, ETSI defines three levels of security mechanisms: Service Bootstrapping, Connection, and mId security. • M2M Service Bootstrapping mechanism aims to mutually authenticate the M2M Service Provider and the M2M Device or Gateway. EAP-IBAKE over EAP/PANA, EAP-TLS over EAP/PANA and TLS over TCP will be analyzed with regard to this study. The result of M2M Service Bootstrapping is an M2M Root Key (Kmr). • M2M Connection mechanism uses the M2M Root Key to set up a secure data session between a Network M2M Node and an M2M Device / Gateway. EAP-GPSK over EAP/PANA and TLS-PSK are the objects to be analyzed. This mechanism generates M2M Connection Key (Kmc) which will be used for the last mechanism, mId security. • The mId security protects the data transmission over the mId interface. Although there are three ways to secure the interface: access network layer security, channel security, and object security, we will focus on the channel security in our study. To proceed with our analysis, we develop these security mechanisms on top of the OpenMTC platform, which is an ETSI-M2M-compliant system. We use people management system in a factory as the use case for our testing samples, in particular, testing the situation where a large amount of small data traffic is generated in a very short time. Based on the result, we analyze what is the most suitable protocol for the type of traffic pattern in this use case. Several parameters can be utilized to determine the most suitable protocol, such as efficiency, cost, and effectiveness. In order to measure efficiency, we record the processing time, CPU usage, and memory usage. To measure the cost, we use the number of sent and received messages, including their total sizes, as the parameters for comparison. For the effectiveness of a particular protocol, we use the degree of security guarantee from a protocol / cipher suite such as very strong, strong, average, weak, or very weak.
Chuang, Wen-Chi, und 莊玟琦. „A Study of the Sense-of-security of Single Female College Students in Off-campus Rental Suites“. Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28081919124317626086.
Der volle Inhalt der Quelle中原大學
室內設計研究所
90
It is observable that most designers, such as interior designers, and product designs, are male gender who tend to design based on masculine values. Whether from the perspectives of sociology, aesthetics, or functional demands of design products, it is a commonplace that male designs often neglected female values. This may be an indirect cause of the lack of sense-of-security to female college students who reside in off-campus rental suites. Threats to female safety are substantial, including raping, peeping, robbing, or that caused by natural hazards. This calls for a further study about female demands for security in off-campus rental suites. This study conducted a field survey of psychological and physical demands for safety to female college students who reside in off-campus rental suites around Chung Yuan Christian University. It is found through quantitative analyses that the majority of female students concerned deeply about their safety in off-campus rental environments. In all, their sense-of-security can be depicted from five dimensions, i.e., safety-configuration of residential spaces, limited human threats, brightness of residential vicinities, social engagements among neighboring individuals, and controlled physical quality. Some of which are human-related, unpredictable, or uncontrollable. This study concludes with these dimensions and componential variables that designers as well as landlords are to bear in mind such concerns.
Chu, Wan-Ting, und 朱婉婷. „Security v.s. Child endorser match-up?--Best suited to the endorser for the airline’s advertising communication effect“. Thesis, 2009. http://ndltd.ncl.edu.tw/handle/6k9nrq.
Der volle Inhalt der Quelle國立嘉義大學
休閒事業管理研究所
97
Since consumers cannot observe quality before flying, an airline’s safety history and reputation can play an important role in the formulation of their beliefs. Among those 19 airlines, China Airlines has the highest flight accident rate and per million flight accident rate is 7.16. Obviously, safety is the most important factor while customers are making their purchasing decision. In fact, have much of ads to use child endorse safety, such as Mitsubishi Savrin a series of ads use child to endorse for safety and reliable. Interestingly, the most emphasis on safety at the airline, the ads will be very few child fit with the airlines, on the contrary the use of many celebrities to endorse. Interestingly if we take safety and match-up into consideration, what kind of endorser is most fitted to airline which is in low reputation for its flight safety? This research wants using the image of child to transfer to emphasize airline safety. With respect to the methodology, a 5x2 factorial experiment design is employed, that is different types of endorsers (celebrity, expert, CEO, typical consumer, and child) with (low reputation of the airline in the ad emphasize its flight safety and high reputation of the airline in the ad emphasize its flight safety). The results showed that: 1. In the low reputation of the airline’s ad, the children to serve as endorser, and its ad attitude, brand attitude, purchase intention and the communication effect of advertising is the best. In the low reputation of the airline’s ad, with special emphasis on the safety of product attributes, and its ad attitude, brand attitude, purchase intention and the communication effect of advertising is the best 3. In the low reputation of the airline’s ad, the children to serve as endorser and with special emphasis on the safety of product attributes, and its ad attitude, brand attitude, purchase intention and the communication effect of advertising is the best.