Dissertations / Theses on the topic 'Security object'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security object.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sethi, Mohit. "Security in Smart Object Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104168.
Full textInternet of Things (IoT, ”Föremålens Internet") syftar på en sammankopplad värld där fysiska apparater är sömlöst integrerade till Internet och blir aktiva deltagare i affärslivs-, informations- och sociala processer. Detta innefattar sammankopplingen av ett stort antal heterogeniskt nätverkade enheter och nätverk. Uppkomsten av teknologier som Zigbee, låg energi Bluetooth och inbyggda sensorer har förvandlat enkla fysiska apparater till smarta objekt som kan förstå och reagera till sin omgivning. Dessa smarta objekt utgör byggstenarna för Föremålens Internet. Kommunikationsinfrastrukturen för dessa objekt bygger på en utvidgning av internetprotokollstacken. Även om behovet av säkerhet är allmänt känt, finns det inget konsensus om hur IP-baserade internetsäkerhetsprotokoll kan tillämpas i resursbegränsade smartobjektnätverk. I denna avhandling utvecklas en ny säker och energisnål kommunikationsmodell för Constrained Application Protocol (CoAP, “Begränsat applikationsprotokoll"), ett lätt kommunikationsprotokoll avsett för smartobjektnätverk. Avhandlingen bidrar till standardiseringen av den generiska kommunikationsarkitekturen genom att tillsätta säkerhets- och delegationskomponenter för smarta objekt som sover under en stor del av sin operativa fas. Denna arkitektur garanterar dataintegritet och autenticitet över en flerhopps nätverkstopologi. Arkitekturen bidrar också med en återspeglingsmekanism som använder sig av en proxyserver för att erbjuda data för sovande smarta objekts del, vilket låter dem agera som alltid-online webbservrar. I avhandlingen utvecklas också en fungerande prototypimplementation av arkitekturen. Säkerhetsegenskaperna i den arkitektur som presenteras i denna avhandling är baserade på användningen av stark publik-nyckel kryptering. I motsatts till den allmänna förväntningen, visar prestationsbedömningen i denna avhandling att asymmetrisk kryptering med publik nyckel kan tillämpas i 8-bitars mikrokontrollrar utan att ändra på de underliggande kryptografiska algoritmerna.
Yialelis, Nikolaos. "Domain-based security for distributed object systems." Thesis, Imperial College London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244056.
Full textTjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security." Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.
Full textBorison, Torbjorn. "Object Synchronization and Security for Mobile Communications Devices." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93276.
Full textMurray, Toby. "Analysing the security properties of object-capability patterns." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:98b0b6b6-eee1-45d5-b32e-d98d1085c612.
Full textAbbasi, Abdul Ghafoor. "CryptoNET : Generic Security Framework for Cloud Computing Environments." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-32786.
Full textQC 20110427
Pires, Mário Rui Dias. "A type system for access control in an object-oriented language." Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/2308.
Full textThe need for a security system to ensure the integrity of protected data leads to the development of access control systems, whose purpose is to prevent access to protected information or resources by unauthorized individuals. In this thesis, we develop and formalize a type and effect system that verifies the access control to objects in a simplified object-oriented language. Traditionally, access control is done only at run-time, using dynamic techniques, such as access control lists, that perform run-time verifications for credentials and privileges. However, these techniques increase the total execution time of an operation, potentially breaking system requirements such as usability or response time. Static approaches, based on static analysis or type systems, reduce the amount of run-time checks by doing some of those checks during compile-time, preventing the occurrence of errors before running the program and offering formal proofs of system correctness. The type system developed in this dissertation deals with the dynamic delegation of authorizations to access objects. An authorization includes the identification of the protected object and its access policy and is considered by the type system as a first class value. As such, object types are extended with policies that reflect the current privilege associated with the object, and typing an expression can produce an effect on policies. We name this new type as user type and the respective value as user view, which contain the object’s reference and a policy to access the object. We consider privileges over objects to be the methods that can be invoked. So, a policy states what methods are available to be called. When typing a method call by an user view, we are able to verify if it was authorized, that is, if the current policy says that the method is available. This mechanism allows the removal of common security specifications from class declarations, as visibility modifiers (public, private). Furthermore, we present a soundness result for our type system. We also implemented a typechecking algorithm for our type system, resulting in a tool to verify the integrity of protected objects in a system designed in the defined programming language.
This work was supported by a CITI research grant
Broman, David. "Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments." Licentiate thesis, Linköping University, Linköping University, PELAB - Programming Environment Laboratory, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10134.
Full textDuring the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. Modelica is one of the most prominent equation-based object-oriented (EOO) languages that support such capabilities, including the ability to simulate both continuous- and discrete-time models, as well as mixed hybrid models. However, there are still many remaining challenges when it comes to language safety and simulation security. The problem area concerns detecting modeling errors at an early stage, so that faults can be isolated and resolved. Furthermore, to give guarantees for the absence of faults in models, the need for precise language specifications is vital, both regarding type systems and dynamic semantics.
This thesis includes five papers related to these topics. The first paper describes the informal concept of types in the Modelica language, and proposes a new concrete syntax for more precise type definitions. The second paper provides a new approach for detecting over- and under-constrained systems of equations in EOO languages, based on a concept called structural constraint delta. That approach makes use of type checking and a type inference algorithm. The third paper outlines a strategy for using abstract syntax as a middle-way between a formal and informal language specification. The fourth paper suggests and evaluates an approach for secure distributed co-simulation over wide area networks. The final paper outlines a new formal operational semantics for describing physical connections, which is based on the untyped lambda calculus. A kernel language is defined, in which real physical models are constructed and simulated.
Report code: LIU-TEK-LIC-2007:46. On the day of the defence date the status of article IV was: In Progress; The status of article V was: Manuscript.
Cheung, Yee-him, and 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Full textPati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Full textPati, Nishikanta. "Occlusion Tolerant Object Recognition Methods for Video Surveillance and Tracking of Moving Civilian Vehicles." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5133/.
Full textBennett, Stacey Patricia. "An object oriented expert system for specifying computer data security requirements in an open systems environment." Thesis, University of Birmingham, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.341835.
Full textEdge, Crystal. "Quantitative Assessment of the Modularization of Security Design Patterns with Aspects." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/142.
Full textGoldman, Gregory A. "Quality of Object Relations, Security of Attachment, and Interpersonal Style as Predictors of the Early Therapeutic Alliance." Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1132069514.
Full textHolford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.
Full textLin, Jenglung. "The Implementation and Integration of the Interactive Markup Language to the Distributed Component Object Model Protocol in the Application of Distributed File System Security." NSUWorks, 1999. http://nsuworks.nova.edu/gscis_etd/671.
Full textCassidy, Scott L. "Millimetre-wave FMCW radar for remote sensing and security applications." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/7856.
Full textStivala, Giada Martina. "Perceptual Web Crawlers." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textVashaee, Ali. "Reconnaissance de forme dans cybersécurité." Mémoire, Université de Sherbrooke, 2014. http://savoirs.usherbrooke.ca/handle/11143/5331.
Full textLundqvist, Stefan. "Från totalförsvar till gemensam säkerhet : en studie av vidgade säkerhetsperspektiv." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-206.
Full textDen säkerhetspolitiska debatten har under de senaste åren tillvaratagit ett bredare perspektiv av hot och risker. Undersökningen tar sin utgångspunkt i frågan om i vilken utsträckning detta kommit till uttryck i svenska försvarspropositioner?
Undersökningen kartlägger likheter och skillnader i tre försvarspropositioners uttryck av hot och säkerhet relaterat till det vidgade säkerhetsbegreppet under perioden 1982-2009. Vid kartläggningen undersöker jag med hjälp av Barry Buzan m.fl. analysramverk för det vidgade säkerhetsbegreppet vilka säkerhetspolitiska värden som uttrycktes vara viktiga att säkerställa. Undersökningen kartlägger även hotbilderna som uppfattades mot dessa värden och inom vilka arenor deras säkerhet bedömdes kunna säkerställas.
Analysen påvisar olikheter i de tre försvarspropositionernas säkerhetspolitiska uttryck. 1982 års försvarsproposition fokuserar på nationella säkerhetspolitiska värden som säkerställdes inom totalförsvarets ram. De följande försvarspropositionerna indikerar en förändring till förmån för regionala värden och gemensam säkerhet. Analysen påvisar även en radikal förändring av de uppfattade hotbildernas karaktär.
The recent security policy debate has included a broader view of threats and risks. This study is based on the question of to what extent this was reflected in the Swedish defence bills?
This study aims to identify similarities and differences regarding expressions of threat and security related to the broader concept of security in three defence bills over the period of 1982-2009. By use of the analytical framework of Mr Barry Buzan, I aim to make a survey of the expressed values of security, their perceived threats and the arenas in which their security were to be guaranteed.
The analysis indicates diversities regarding security policy expressions. The defence bill of 1982 focuses on national values, safeguarded within the framework of Total Defence. The following defence bills indicate a change in the perceived nature of the threats and in favour of regional values and common security.
Sporring, Jonsson Elin. "The Theoretical Frameworks of Realism and Feminism : Applied on the Humanitarian Intervention in Kosovo." Thesis, Jönköping University, JIBS, Political Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1260.
Full textThe purpose of this thesis is to look into the differences between the theoretical frame-works of Realism and Feminism in general as well as their differences with regards to security and referent objects to security. With the differences noted applied upon the Humanitarian Intervention that took place in Kosovo 1999. That is how a shift in the referent objects could change outcome and success or failure in the case studied.
This is done by a theory testing study based upon literature within the topics of Realism and Feminism, by mainly Morgenthau (1993) with regards to Realism and Tickner (1992) with regards to Feminism. The reason for these authors in particular is due to their importance in the field and the fact that they are found liberally quoted in academic articles and other literature.
By shifting the referent object of security from e.g. territory (state), that Realism uses, to the individuals in general and the women in particular within the territory (state), like Feminism does, there is bound to be a change in outcome and success. The result of this thesis is that a different referent object offers a new perspective.
Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.
Full textWith the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
Колесник, Константин Васильевич, and Г. М. Виноградов. "Радиолучевые охранные средства с фазированными антенными решетками." Thesis, ИЦ "Политехпериодика", 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/26946.
Full textKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Full textČernošek, Bedřich. "Klient-server mobilní aplikace se zpracováním obrazu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385959.
Full textMarkel, Zane A. "Designing networked objects to achieve reasonable security." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111236.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 89-99).
To maximize the value of the Internet of Things (IoT), developers need to build devices that balance security with features, cost, and usability, relative to the threats that their particular devices will face. However, many IoT devices have thus far failed to achieve this balance. Various organizations have published copious security frameworks to help developers. Of these, frameworks that focus on desirable outcome metrics remain theoretically desirable yet infeasible to use in practice. The other frameworks, which focus on some aspect of the development process itself, are widely used despite a lack of methods for determining their utility. This work introduces six criteria useful for evaluating and comparing these process-based frameworks. Applying them to multiple security frameworks, we find that these frameworks often derive from inflexible conceptions of security, limiting the ability of developers to to vary their security designs. Even when developers are given options, they lack the tools necessary to balance security with other tradeoffs respective to the situations their products will be used in. To begin to address these shortcomings, we propose the Processes for Reasonably Secure Design (PRSD), a novel process-based security framework that helps developers comprehensively and systematically consider the security threats an IoT device may introduce to its surroundings, options for mitigating those threats, and the tradeoffs between those options. To demonstrate its worth, we apply it in multiple case studies. Further, using the six criteria, we evaluate PRSD and find that, in addition to providing useful and novel guidance, it has practical qualities that could make it suitable for many real development efforts.
by Zane Alexander Markel.
S.M. in Technology and Policy
Noyes, Alexander Hale. "Securing reform? : post-election power sharing and security sector reform in Zimbabwe, Kenya, and Togo, 2006-2013." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:d49f7715-486e-444f-ada3-ac82ff96db0b.
Full textKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Full textHuang, Chaowei. "Les sûretés réelles en droit chinois et en droit français : étude de droit comparé." Thesis, Paris 2, 2013. http://www.theses.fr/2013PA020016.
Full textDuring the same period, a reform of security law had completed in France, while the Chinese real rights law which has renovated security rights in rem was about to be promulgated in China. This thesis, based on Chinese law and drawing upon a comprehensive study of laws and administrative regulations on the subject, reveals the differences between Chinese and French law and analyze their cause and effect behind similar terms and notions. Grounded on the comparative study, the thesis draws the conclusion that the Chinese system of security rights in rem requires a further reform despite the arrival of new law
Gupta, Gaurav. "Robust digital watermarking of multimedia objects." Phd thesis, Australia : Macquarie University, 2008. http://hdl.handle.net/1959.14/28597.
Full textBibliography: p. 144-153.
Introduction -- Background -- Overview of watermarking -- Natural language watermarking -- Software watermarking -- Semi-blind and reversible database watermarking -- Blind and reversible database watermarking -- Conclusion and future research -- Bibliography.
Digital watermarking has generated significant research and commercial interest in the past decade. The primary factors contributing to this surge are widespread use of the Internet with improved bandwidth and speed, regional copyright loopholes in terms of legislation; and seamless distribution of multimedia content due to peer-to-peer file-sharing applications. -- Digital watermarking addresses the issue of establishing ownership over mul-timedia content through embedding a watermark inside the object. Ideally, this watermark should be detectable and/or extractable, survive attacks such as digital reproduction and content-specific manipulations such as re-sizing in the case of images, and be invisible to the end-user so that the quality of the content is not degraded significantly. During detection or extraction, the only requirements should be the secret key and the watermarked multimedia object, and not the original un-marked object or the watermark inserted. Watermarking scheme that facilitate this requirement are categorized as blind. In recent times, reversibility of watermark has also become an important criterion. This is due to the fact that reversible watermarking schemes can provided security against secondary watermarking attacks by using backtracking algorithms to identify the rightful owner. A watermarking scheme is said to be reversible if the original unmarked object can be regenerated from the watermarked copy and the secret key.
This research covers three multimedia content types: natural language documents, software, and databases; and discusses the current watermarking scenario, challenges, and our contribution to the field. We have designed and implemented a natural language watermarking scheme that uses the redundancies in natural languages. As a result, it is robust against general attacks against text watermarks. It offers additional strength to the scheme by localizing the attack to the modified section and using error correction codes to detect the watermark. Our first contribution in software watermarking is identification and exploitation of weaknesses in branch-based software watermarking scheme proposed in [71] and the software watermarking algorithm we present is an improvised version of the existing watermarking schemes from [71]. Our scheme survives automated debugging attacks against which the current schemes are vulnerable, and is also secure against other software-specific attacks. We have proposed two database watermarking schemes that are both reversible and therefore resilient against secondary watermarking attacks. The first of these database watermarking schemes is semi-blind and requires the bits modified during the insertion algorithm to detect the watermark. The second scheme is an upgraded version that is blind and therefore does not require anything except a secret key and the watermarked relation. The watermark has a 89% probability of survival even when almost half of the data is manipulated. The watermarked data in this case is extremely useful from the users' perspective, since query results are preserved (i.e., the watermarked data gives the same results for a query as the nmarked data). -- The watermarking models we have proposed provide greater security against sophisticated attacks in different domains while providing sufficient watermark-carrying capacity at the same time. The false-positives are extremely low in all the models, thereby making accidental detection of watermark in a random object almost negligible. Reversibility has been facilitated in the later watermarking algorithms and is a solution to the secondary watermarking attacks. We shall address reversibility as a key issue in our future research, along with robustness, low false-positives and high capacity.
Mode of access: World Wide Web.
xxiv, 156 p. ill. (some col.)
Powell, Rhonda L. "Security and the right to security of person." Thesis, University of Oxford, 2008. http://ora.ox.ac.uk/objects/uuid:26e81a46-54d5-44f5-a3cd-c74a5798ea0d.
Full textSimpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textCiobanu, Morogan Matei. "Security system for ad-hoc wireless networks based on generic secure objects." Doctoral thesis, Stockholm : Department of Computer & Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-192.
Full textTaylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.
Full textMessaggi, Kaya Monica. "Trust and security risks in mobile banking." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.
Full textWeissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.
Full textHuang, Xin. "Multi-channel security protocols in personal networks." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:e0217f2f-4b8f-4ee4-bb34-03cd03e6f68b.
Full textChen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.
Full textROUSSEAU, LUDOVIC. "Rose : systeme reparti a objets securise." Paris, CNAM, 1997. http://www.theses.fr/1997CNAM0299.
Full textGarratt, Luke. "Realistic, strong and provable key exchange security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:389973d5-9c96-4905-b412-2514578abf20.
Full textHeitzenrater, Chad D. "Software security investment modelling for decision-support." Thesis, University of Oxford, 2017. http://ora.ox.ac.uk/objects/uuid:64ddd45e-87ab-4c92-a085-df2d0d4e22e0.
Full textStrohmeier, Martin. "Security in next generation air traffic communication networks." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:c5c61de4-ffef-479e-9f49-de38c2a8e9ec.
Full textCoghlan, Christopher. "Towards food security with nutritional health : multi-scale approaches." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.
Full textMuniz, Manuel. "Explaining security and defence integration : the case of Europe." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:ae151580-c6d1-43ae-857d-9a3c2ab1b597.
Full textHooper, Hayley Jayne. "National security, risk, and accountability : the closed material procedure." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:cf834588-b891-4f7c-9017-e5fdc4fe63c3.
Full textLoughry, Joe. "Security test and evaluation of cross domain systems." Thesis, University of Oxford, 2014. https://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352.
Full textTal, Lawrence. "Politics, the military, and national security in Jordan, 1955-1967." Thesis, University of Oxford, 1997. http://ora.ox.ac.uk/objects/uuid:aceb7754-492e-4cbd-bc85-83cb8ed6e0ce.
Full textSmeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Full textHorvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.
Full text