Rozprawy doktorskie na temat „Databases security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Databases security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Pełny tekst źródłaKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Pełny tekst źródłaRedfield, Catherine M. S. "Practical security for multi-user web application databases". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 67-68).
Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can examine or alter the data in situ. Multiple Principal CryptDB protects against attacks on web application servers. By chaining encryption keys to user passwords, an attacker gaining access to decrypted data through issuing arbitrary queries to the database through CryptDB cannot access data belonging to offline users. A logging system and distributed key storage for CryptDB constrain the pool of possibly compromised data after an attack. Multiple Principal CryptDB can be used to secure the data of six web applications examined, with 2-8 lines of altered source code and 15-111 annotations added to the schema. On the phpBB web forum application, Multiple Principal CryptDB reduces throughput by only 14.5%, with 24 sensitive fields encrypted, and adds less than 26ms of latency to each individual query.
by Catherine M.S. Redfield.
M.Eng.
Zhang, Ye, i 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Pełny tekst źródłaFarooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security". Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Pełny tekst źródłaOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Pełny tekst źródłaOlk, Jeffrey S. "Exploring the lack of interoperability of databases within Department of Homeland Security interagency environment concerning maritime port security". Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FOlk.pdf.
Pełny tekst źródłaThesis Advisor(s): Bordetsky, Alex. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Interoperability, HSIN, Department of Homeland Security, Command and Control, Situational Awareness, Maritime Port Security, USCG, CBP. Includes bibliographical references (p. 63-67). Also available in print.
Kohler, Matthew J., i Shawn W. Stroud. "An effective access control mechanism and multilevel security for multilevel secure databases". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25865.
Pełny tekst źródłaPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Pełny tekst źródłaHermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet". Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Pełny tekst źródłaToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Burchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Pełny tekst źródłaBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Pełny tekst źródłaAraujo, Neto Afonso Comba de. "Security Benchmarking of Transactional Systems". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/143292.
Pełny tekst źródłaMost organizations nowadays depend on some kind of computer infrastructure to manage business critical activities. This dependence grows as computer systems become more reliable and useful, but so does the complexity and size of systems. Transactional systems, which are database-centered applications used by most organizations to support daily tasks, are no exception. A typical solution to cope with systems complexity is to delegate the software development task, and to use existing solutions independently developed and maintained (either proprietary or open source). The multiplicity of software and component alternatives available has boosted the interest in suitable benchmarks, able to assist in the selection of the best candidate solutions, concerning several attributes. However, the huge success of performance and dependability benchmarking markedly contrasts with the small advances on security benchmarking, which has only sparsely been studied in the past. his thesis discusses the security benchmarking problem and main characteristics, particularly comparing these with other successful benchmarking initiatives, like performance and dependability benchmarking. Based on this analysis, a general framework for security benchmarking is proposed. This framework, suitable for most types of software systems and application domains, includes two main phases: security qualification and trustworthiness benchmarking. Security qualification is a process designed to evaluate the most obvious and identifiable security aspects of the system, dividing the evaluated targets in acceptable or unacceptable, given the specific security requirements of the application domain. Trustworthiness benchmarking, on the other hand, consists of an evaluation process that is applied over the qualified targets to estimate the probability of the existence of hidden or hard to detect security issues in a system (the main goal is to cope with the uncertainties related to security aspects). The framework is thoroughly demonstrated and evaluated in the context of transactional systems, which can be divided in two parts: the infrastructure and the business applications. As these parts have significantly different security goals, the framework is used to develop methodologies and approaches that fit their specific characteristics. First, the thesis proposes a security benchmark for transactional systems infrastructures and describes, discusses and justifies all the steps of the process. The benchmark is applied to four distinct real infrastructures, and the results of the assessment are thoroughly analyzed. Still in the context of transactional systems infrastructures, the thesis also addresses the problem of the selecting software components. This is complex as evaluating the security of an infrastructure cannot be done before deployment. The proposed tool, aimed at helping in the selection of basic software packages to support the infrastructure, is used to evaluate seven different software packages, representative alternatives for the deployment of real infrastructures. Finally, the thesis discusses the problem of designing trustworthiness benchmarks for business applications, focusing specifically on the case of web applications. First, a benchmarking approach based on static code analysis tools is proposed. Several experiments are presented to evaluate the effectiveness of the proposed metrics, including a representative experiment where the challenge was the selection of the most secure application among a set of seven web forums. Based on the analysis of the limitations of such approach, a generic approach for the definition of trustworthiness benchmarks for web applications is defined.
Hoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Pełny tekst źródłaRaybourn, Tracey. "Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions". Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Pełny tekst źródłaHarmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Pełny tekst źródłaDawson, Alan Robert. "Exploring Strategies for Implementing Information Security Training and Employee Compliance Practices". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7794.
Pełny tekst źródłaCornejo-Ramirez, Mario. "Security for the cloud". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Pełny tekst źródłaCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
Johnson, Kenneth Tyrone. "The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.
Pełny tekst źródłaGutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Pełny tekst źródłaKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance". ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Pełny tekst źródłaPavlou, Kyriacos Eleftheriou. "Database Forensics in the Service of Information Accountability". Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Pełny tekst źródłaBoyer, Edward D. "Understanding Usability-related Information Security Failures in a Healthcare Context". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/13.
Pełny tekst źródłaPeters, Timothy M. "DEFY: A Deniable File System for Flash Memory". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1230.
Pełny tekst źródłaGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Pełny tekst źródłaSheinidashtegol, Pezhman. "Impact of DDoS Attack on the Three Common HypervisorS(Xen, KVM, Virtual Box)". TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1646.
Pełny tekst źródłaBahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Pełny tekst źródłaPh. D.
Harrell, Martha Nanette. "Factors impacting information security noncompliance when completing job tasks". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/21.
Pełny tekst źródłaBetz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents". NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Pełny tekst źródłaAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Pełny tekst źródłaBrobliauskas, Žilvinas. "Reliacinių duomenų bazių saugumo modelio tyrimas". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090828_133828-02790.
Pełny tekst źródłaThe multilateral security model of relational databases is analyzed in master thesis of Žilvinas Brobliauskas. The results of research includes: the formulated requirements for multilateral security model of relational databases, proposed model, which allows range queries and aggregation functions over encrypted data without decrypting them at RDBMS level, and determined advantages and disadvantages of it. The program which realizes proposed model is given as proof of concept.
Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Pełny tekst źródłaTwisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.
Pełny tekst źródłaEllithorpe, James O. "The Role and Impact of Cyber Security Mentoring". Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Pełny tekst źródłaBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Pełny tekst źródłaTyler, Lamonte Bryant. "Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.
Pełny tekst źródłaKamin, Daud Alyas. "Exploring Security, Privacy, and Reliability Strategies to Enable the Adoption of IoT". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4382.
Pełny tekst źródłaMathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Pełny tekst źródłaMiller, Nathan D. "Adapting the Skyline Operator in the NetFPGA Platform". Youngstown State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1369586333.
Pełny tekst źródłaKumka, David Harold. "Quantifying Performance Costs of Database Fine-Grained Access Control". NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Pełny tekst źródłaHenning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.
Pełny tekst źródłaZadig, Sean M. "Understanding the Impact of Hacker Innovation upon IS Security Countermeasures". NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/976.
Pełny tekst źródłaLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Pełny tekst źródłaDavis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Pełny tekst źródłaRodriguez, Julio C. "Public Servants' Perceptions of the Cybersecurity Posture of the Local Government in Puerto Rico". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6370.
Pełny tekst źródłaNguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication". TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.
Pełny tekst źródłaAnye, Ernest Tamanji. "Factors Affecting Employee Intentions to Comply With Password Policies". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6965.
Pełny tekst źródłaJia, Hao. "A web application for Medasolution Healthcare Company customer service system". CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2612.
Pełny tekst źródłaCallahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks". ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Pełny tekst źródłaAbou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)". Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Pełny tekst źródłaThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN