Thèses sur le sujet « Databases security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Databases security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Chung, Sun S. « Anti-Tamper Databases : Querying Encrypted Databases ». online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texte intégralKong, Yibing. « Security and privacy model for association databases ». Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texte intégralRedfield, Catherine M. S. « Practical security for multi-user web application databases ». Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.
Texte intégralThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 67-68).
Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can examine or alter the data in situ. Multiple Principal CryptDB protects against attacks on web application servers. By chaining encryption keys to user passwords, an attacker gaining access to decrypted data through issuing arbitrary queries to the database through CryptDB cannot access data belonging to offline users. A logging system and distributed key storage for CryptDB constrain the pool of possibly compromised data after an attack. Multiple Principal CryptDB can be used to secure the data of six web applications examined, with 2-8 lines of altered source code and 15-111 annotations added to the schema. On the phpBB web forum application, Multiple Principal CryptDB reduces throughput by only 14.5%, with 24 sensitive fields encrypted, and adds less than 26ms of latency to each individual query.
by Catherine M.S. Redfield.
M.Eng.
Zhang, Ye, et 张叶. « Query and access control over encrypted databases ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texte intégralFarooqi, Norah. « Applying dynamic trust based access control to improve XML databases' security ». Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Texte intégralOfori-Duodu, Michael Samuel. « Exploring Data Security Management Strategies for Preventing Data Breaches ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Texte intégralOlk, Jeffrey S. « Exploring the lack of interoperability of databases within Department of Homeland Security interagency environment concerning maritime port security ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FOlk.pdf.
Texte intégralThesis Advisor(s): Bordetsky, Alex. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Interoperability, HSIN, Department of Homeland Security, Command and Control, Situational Awareness, Maritime Port Security, USCG, CBP. Includes bibliographical references (p. 63-67). Also available in print.
Kohler, Matthew J., et Shawn W. Stroud. « An effective access control mechanism and multilevel security for multilevel secure databases ». Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25865.
Texte intégralPatterson, Joanna. « Cyber-Security Policy Decisions in Small Businesses ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Texte intégralHermansson, Tobias. « FiLDB : An Architecture for Securely Connecting Databases to the Internet ». Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Texte intégralToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Burchett, Ian. « Quantifying Computer Network Security ». TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Texte intégralBrown, David A. « Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Texte intégralAraujo, Neto Afonso Comba de. « Security Benchmarking of Transactional Systems ». reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/143292.
Texte intégralMost organizations nowadays depend on some kind of computer infrastructure to manage business critical activities. This dependence grows as computer systems become more reliable and useful, but so does the complexity and size of systems. Transactional systems, which are database-centered applications used by most organizations to support daily tasks, are no exception. A typical solution to cope with systems complexity is to delegate the software development task, and to use existing solutions independently developed and maintained (either proprietary or open source). The multiplicity of software and component alternatives available has boosted the interest in suitable benchmarks, able to assist in the selection of the best candidate solutions, concerning several attributes. However, the huge success of performance and dependability benchmarking markedly contrasts with the small advances on security benchmarking, which has only sparsely been studied in the past. his thesis discusses the security benchmarking problem and main characteristics, particularly comparing these with other successful benchmarking initiatives, like performance and dependability benchmarking. Based on this analysis, a general framework for security benchmarking is proposed. This framework, suitable for most types of software systems and application domains, includes two main phases: security qualification and trustworthiness benchmarking. Security qualification is a process designed to evaluate the most obvious and identifiable security aspects of the system, dividing the evaluated targets in acceptable or unacceptable, given the specific security requirements of the application domain. Trustworthiness benchmarking, on the other hand, consists of an evaluation process that is applied over the qualified targets to estimate the probability of the existence of hidden or hard to detect security issues in a system (the main goal is to cope with the uncertainties related to security aspects). The framework is thoroughly demonstrated and evaluated in the context of transactional systems, which can be divided in two parts: the infrastructure and the business applications. As these parts have significantly different security goals, the framework is used to develop methodologies and approaches that fit their specific characteristics. First, the thesis proposes a security benchmark for transactional systems infrastructures and describes, discusses and justifies all the steps of the process. The benchmark is applied to four distinct real infrastructures, and the results of the assessment are thoroughly analyzed. Still in the context of transactional systems infrastructures, the thesis also addresses the problem of the selecting software components. This is complex as evaluating the security of an infrastructure cannot be done before deployment. The proposed tool, aimed at helping in the selection of basic software packages to support the infrastructure, is used to evaluate seven different software packages, representative alternatives for the deployment of real infrastructures. Finally, the thesis discusses the problem of designing trustworthiness benchmarks for business applications, focusing specifically on the case of web applications. First, a benchmarking approach based on static code analysis tools is proposed. Several experiments are presented to evaluate the effectiveness of the proposed metrics, including a representative experiment where the challenge was the selection of the most secure application among a set of seven web forums. Based on the analysis of the limitations of such approach, a generic approach for the definition of trustworthiness benchmarks for web applications is defined.
Hoeppner, Joseph A. « A Comparison of Cloud Computing Database Security Algorithms ». UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texte intégralRaybourn, Tracey. « Bucketization Techniques for Encrypted Databases : Quantifying the Impact of Query Distributions ». Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Texte intégralHarmon, Eric. « Strategies Used by Cloud Security Managers to Implement Secure Access Methods ». ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Texte intégralDawson, Alan Robert. « Exploring Strategies for Implementing Information Security Training and Employee Compliance Practices ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7794.
Texte intégralCornejo-Ramirez, Mario. « Security for the cloud ». Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Texte intégralCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
Johnson, Kenneth Tyrone. « The Training Deficiency in Corporate America : Training Security Professionals to Protect Sensitive Information ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.
Texte intégralGutta, Ramamohan. « Managing Security Objectives for Effective Organizational Performance Information Security Management ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Texte intégralKongnso, Fedinand Jaiventume. « Best Practices to Minimize Data Security Breaches for Increased Business Performance ». ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Texte intégralPavlou, Kyriacos Eleftheriou. « Database Forensics in the Service of Information Accountability ». Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Texte intégralBoyer, Edward D. « Understanding Usability-related Information Security Failures in a Healthcare Context ». NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/13.
Texte intégralPeters, Timothy M. « DEFY : A Deniable File System for Flash Memory ». DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1230.
Texte intégralGriffin, Tony. « Strategies to Prevent Security Breaches Caused by Mobile Devices ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Texte intégralSheinidashtegol, Pezhman. « Impact of DDoS Attack on the Three Common HypervisorS(Xen, KVM, Virtual Box) ». TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1646.
Texte intégralBahrak, Behnam. « Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing ». Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Texte intégralPh. D.
Harrell, Martha Nanette. « Factors impacting information security noncompliance when completing job tasks ». NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/21.
Texte intégralBetz, Linda. « An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents ». NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Texte intégralAyereby, Manouan Pierre-Marius. « Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems ». ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Texte intégralBrobliauskas, Žilvinas. « Reliacinių duomenų bazių saugumo modelio tyrimas ». Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090828_133828-02790.
Texte intégralThe multilateral security model of relational databases is analyzed in master thesis of Žilvinas Brobliauskas. The results of research includes: the formulated requirements for multilateral security model of relational databases, proposed model, which allows range queries and aggregation functions over encrypted data without decrypting them at RDBMS level, and determined advantages and disadvantages of it. The program which realizes proposed model is given as proof of concept.
Johnson, David Philip. « How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Texte intégralTwisdale, Jerry Allen. « Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access ». ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.
Texte intégralEllithorpe, James O. « The Role and Impact of Cyber Security Mentoring ». Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Texte intégralBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Forde, Edward Steven. « Security Strategies for Hosting Sensitive Information in the Commercial Cloud ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Texte intégralTyler, Lamonte Bryant. « Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks ». ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.
Texte intégralKamin, Daud Alyas. « Exploring Security, Privacy, and Reliability Strategies to Enable the Adoption of IoT ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4382.
Texte intégralMathias, Henry. « Analyzing Small Businesses' Adoption of Big Data Security Analytics ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Texte intégralMiller, Nathan D. « Adapting the Skyline Operator in the NetFPGA Platform ». Youngstown State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1369586333.
Texte intégralKumka, David Harold. « Quantifying Performance Costs of Database Fine-Grained Access Control ». NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Texte intégralHenning, Rhonda R. « Security Policies That Make Sense for Complex Systems : Comprehensible Formalism for the System Consumer ». NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.
Texte intégralZadig, Sean M. « Understanding the Impact of Hacker Innovation upon IS Security Countermeasures ». NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/976.
Texte intégralLarrimore, Nancy Page. « Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats ». ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Texte intégralDavis, Robert Elliot. « Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Texte intégralRodriguez, Julio C. « Public Servants' Perceptions of the Cybersecurity Posture of the Local Government in Puerto Rico ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6370.
Texte intégralNguyen, Huy Manh. « MABIC : Mobile Application Builder for Interactive Communication ». TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.
Texte intégralAnye, Ernest Tamanji. « Factors Affecting Employee Intentions to Comply With Password Policies ». ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6965.
Texte intégralJia, Hao. « A web application for Medasolution Healthcare Company customer service system ». CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2612.
Texte intégralCallahan, Michael John. « Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks ». ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Texte intégralAbou, El Houda Zakaria. « Security Enforcement through Software Defined Networks (SDN) ». Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Texte intégralThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN