Rozprawy doktorskie na temat „Ontological security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Ontological security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Alexandersson, Robert. "Taiwan In Sino-American Relations : An Ontological Security Study". Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22947.
Pełny tekst źródłaKrüger, Katharina. "Ontological Security of Women : The Role of Digital Feminist Activism". Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-89032.
Pełny tekst źródłaRalston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age". Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.
Pełny tekst źródłaMaster of Arts
McGoldrick, John. "Ontological security and identity work : a case study of management consultancy". Thesis, University of Bristol, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738559.
Pełny tekst źródłaHiscock, Rosemary Esther. "The relationship between housing tenure and health : does ontological security play a role?" Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/6146/.
Pełny tekst źródłaCharoenvattananukul, Peera. "Ontological security and status-seeking : Thailand's proactive behaviours during the Second World War". Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/278717.
Pełny tekst źródłaHarries, Tim. "Householder responses to flood risk : the consequences of the search for ontological security". Thesis, Middlesex University, 2008. http://eprints.mdx.ac.uk/13589/.
Pełny tekst źródłaFontenele, Marcelo Paiva. "Designing a method for discovering expertise in cyber security communities : an ontological approach". Thesis, University of Reading, 2017. http://centaur.reading.ac.uk/71325/.
Pełny tekst źródłaKirke, Alexander Tom Sebastian. "Political myth and the need for significance : finding ontological security during times of terror". Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3707.
Pełny tekst źródłaChaplin, Aliviah N. "The Ontological Security Complex: The Impact of System Altering Events on States’ Existential Identities". Ohio University Honors Tutorial College / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1556210264741664.
Pełny tekst źródłaBolton, Derek. "Identity maintenance & foreign policy decision-making : the quest for ontological security in the DPRK". Thesis, University of Bath, 2018. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.760979.
Pełny tekst źródłaWilliams, Rebecca Sian. "Television fan distinctions and identity : an analysis of 'quality' discourses and threats to 'ontological security'". Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/55778/.
Pełny tekst źródłaByg, Reed Lauren. "Sprawling Fields and Food Deserts: An ontological exploration of food and farming systems in Ohio". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99295.
Pełny tekst źródłaMaster of Arts
Ohio is one of the largest agricultural producers in the United States and yet, Ohioans experience food insecurity at a rate two percent higher than the national average. An analysis of Ohio's agricultural development in relation to the rise of the current global food system illustrates the ideological connections between the two systems, and the dependencies of these systems on the continued exploitation of both land and labor. Thus, these systems and the food security framework that has arisen from the same ideology or imaginary, can only provide limited solutions to food insecurity at the national or international level. The solutions that have been proposed and implemented under the security framework maintain dependency and vulnerability of insecure populations. As the impacts from climate change worsen and threaten to disrupt food systems, there is the need to move away from the food security framework towards a framework of food sovereignty and the incorporation of urban spaces into the solutions proposed.
Andreasson, Emelie. "All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty". Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.
Pełny tekst źródłavon, Essen Hugo. "A typology of ontological insecurity mechanisms : Russia's military engagement in Syria". Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-431593.
Pełny tekst źródłaKrasnodębska, Maria. "The politics of stigmatization : Poland as a 'latecomer' in the European Union". Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/276915.
Pełny tekst źródłaD'Adamo-Damery, Philip Carl. "Ontological Possibilities: Rhizoanalytic Explorations of Community Food Work in Central Appalachia". Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51247.
Pełny tekst źródłaPh. D.
Paredes, Julie-Ann. "Reading Race: A study of reading as an approach to changing racial consciousness". Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/18125.
Pełny tekst źródłaNuth, Michael John. "Ontological Security and the Global Risk Environment: A Case Study of Risk and Risk Perception in the Tourist-Dependent Township of Akaroa". Thesis, University of Canterbury. Sociology and Anthropology, 2007. http://hdl.handle.net/10092/988.
Pełny tekst źródłaDağlı, İlke. "Identities in limbo : securitisation of identities in conflict environments and its implications on ontological security : prospects of desecuritisation for reconciliation in Cyprus". Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/91250/.
Pełny tekst źródłaLindstrand, Anton, i Tibella Morad. "Hur upplever behovsanställda sin livssituation? -En sociologisk studie med fokus på otrygghet och trygghetsskapande strategier". Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-83436.
Pełny tekst źródłaMagnusson, Daniella. "Being attached to an unsustainable lifestyle : A case study on accounting for the persistence of high emission lifestyles using an Ontological Security Lens". Thesis, Linköpings universitet, Tema Miljöförändring, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177660.
Pełny tekst źródłaLjusteräng, Johannes. "Ryssland: neutral, allierad, radikal : En studie om identitetskonstruktioner av Ryssland och ontologisk (o)säkerhet i svenska försvarspropositioner sedan kalla krigets slut". Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8337.
Pełny tekst źródłaBennett, Joshua. "The memory of the Holocaust as a point of state ontological (in)security : A comparative discursive analysis of the United Kingdom and Poland". Thesis, Uppsala universitet, Hugo Valentin-centrum, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413283.
Pełny tekst źródłaGonen, Hakan. "Japan". Phd thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615372/index.pdf.
Pełny tekst źródłas trust-based relations in the region of East Asia in the post-Cold War period within the framework of its anti-militaristic state identity and outlook. The main research question is based on how the Japanese policy makers constructed the meaning of the post-Cold War period, opening the ways and ideas to solidify the anti-militaristic state identity and posture. In this sense, Japan provides a significant case study for examining ontological security. The main argument of dissertation is based on building up Japan&rsquo
s ontological security structure in the regional context. Since the end of the Second World War, Japan has pursued an anti-militaristic state identity and posture. This attitude has been the guiding principle of Tokyo&rsquo
s foreign and security policy. In this dissertation, for the continuance of anti-militaristic identity successfully in the post-Cold War period, Japanese policy decision-makers have both configured and further sustained the country&rsquo
s trust-based relations with neighbouring countries in the region. This dissertation was analysed under the five main headings except the introduction chapter: (1) The historical background telling the story of anti-militaristic identity and posture of Japan, (2) Japan&rsquo
s emerging human security agenda in the Post-Cold War period, (3) Japan&rsquo
s cooperative initiatives at the regional level by focusing in particular on APEC and ARF. (4) Japan&rsquo
s relations with the significant others for its identity preservation. (5) The conclusions.
Serper, Alan. "An analytical critique, deconstruction, and dialectical transformation and development of the living educational theory approach". Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.526626.
Pełny tekst źródłaSteele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand". Massey University, 2008. http://hdl.handle.net/10179/946.
Pełny tekst źródłaChernobrov, Dmitry. "The portrait of an other : metaphor, stereotype and the drawing self in international perceptions". Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/7066.
Pełny tekst źródłaReitz, Annika. "Political Campaign Strategies of the party Alternative for Germany : A qualitative Study of Posters for the 2017 Federal Election". Thesis, Högskolan för lärande och kommunikation, Högskolan i Jönköping, HLK, Medie- och kommunikationsvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-44369.
Pełny tekst źródłaMartinez, Strömberg Valentin Erik. "Greenland: The Master Shaper of the Arctic? : A study about making change happen". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-154347.
Pełny tekst źródłaHanova, Selbi. "Understanding Central Asian cooperation through state narratives : cases of Kyrgyzstan and Turkmenistan". Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/11096.
Pełny tekst źródłaWHITMORE, Margaret, i whittys2002@yahoo com au. "The search for character: servant-leadership in an Australian organisation". Edith Cowan University. Business And Public Management: School Of Business And Law, 2004. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0003.html.
Pełny tekst źródłaGouveia, Tânia Maria de Oliveira Almeida. "Corporeidade e segurança ontológica no contexto padronizador do mercado". reponame:Repositório Institucional do FGV, 2013. http://hdl.handle.net/10438/11376.
Pełny tekst źródłaApproved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2013-12-18T14:29:53Z (GMT) No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-01-02T19:02:35Z (GMT) No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5)
Made available in DSpace on 2014-01-02T19:23:53Z (GMT). No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5) Previous issue date: 2013-11-25
In this thesis, we talk about the socially constructed body, the body which is linked to subjectivity and to the identity ofthe individual, and which is impregnated by social and cultural elements. According to Giddens (2009), controlling the body is essential to the individual as to preserve what the author calls ontological security - which brings personal meaning to the individual's !ife and provides points of reference to help him carry on. In the consumer culture, appearance tends to be standardized; and, the cult of the body, among other things, has a selfindulgence appeal. Our main goal is to understand - within the context of normative aesthetics - the discourse and consumption practices of individuaIs in relation to their own bodies, identifying how it connects to their ontological security. In order to achieve this goal, we will: (a) understllIld how the individual sees hisl hers own body, assessing how it relates to their ontologicill'iecurity, (b) examine the presence ofthe market discourse in the tripod 'individualbody - ontological security', (c) identify and arialyze discursive elements as related to physical appearance; trying to understand the role of consumption in this context, (d) investigate the motivations that lead the individual to act, or not, in accordance to the aesthetic norm, analyzing body related consumer practices. The primary data collection was done through qualitative interviews. Respondents were men and women of varied professional activities, 18-50 years, belonging to classes A, B and C (ABEP, 2012), ali ofthem !iving in Rio de Janeiro. Field work was performed from October 2012 to July 2013. The data was ana1yzed using the approach of discourse analysis, considering the French school, particularly Pecheux's view. In line with authors such as Giddens (2002), Goffman (1978) and Schouten (1991), the research concludes that the body is an important part in the individual's notion of self and is also part of the construction of hislher identity. How the individual handles the market's normative message gives us c\ues about his ontological security. The ontologically secure individual is not one who dismisses the market and whose body related consumption practices escape the aesthetic norm. What differentiates a person whose ontological security is fragile is their motivation to adhere to certain stimu!i; and, how he/she deals with their consumer choices. We conclude that the individual with ontological security is less anxious about body related consumption options; and that he/she does not have somebody else's view of their body as a shadow when making decisions about their own appearance. In contrast, individuais without ontological security are more anxious when facing the market's message. There is, to a certain extent, anguish about not meeting these standards; and the body's aesthetic appearance becomes an important part oftheir lives.
Nesta tese, falamos do corpo construído socialmente, vinculado à subjetividade e à identidade do indivíduo e que está impregnado por elementos sociais e culturais. Para Giddens (2009), o controle do corpo é fundamental para que o indivíduo preserve aquilo que o autor chama de segurança ontológica – ou seja, para que ele tenha um sentido pessoal para a vida e pontos de referência que o ajudem a seguir adiante no cotidiano. Na cultura de consumo, sua aparência tende a ser normatizada e o culto ao corpo, entre outros aspectos, tem o apelo de autoindulgência. Nosso objetivo principal é compreender, dentro de um contexto de normatividade estética, o discurso e as práticas de consumo dos indivíduos em relação ao próprio corpo, identificando de que modo isso se conecta à sua segurança ontológica. Para alcançar esse objetivo, procuramos: (a) entender o olhar o indivíduo em relação a seu próprio corpo, avaliando de que forma isso tem relação com sua segurança ontológica; (b) examinar a presença do mercado no tripé indivíduo-corpo-segurança ontológica; (c) identificar e analisar elementos discursivos relacionados à aparência física, procurando entender o papel do consumo nesse contexto e (d) investigar as motivações que levam o indivíduo a agir ou não em conformidade com a norma estética, analisando as práticas de consumo relacionadas ao corpo. A coleta de dados primários foi feita por meio de entrevistas qualitativas. Foram entrevistados homens e mulheres, de atividades profissionais variadas, de 18 a 50 anos, pertencentes às classes A, B e C (ABEP, 2012), todos eles residentes no Rio de Janeiro. Este campo aconteceu no período de outubro de 2012 a julho de 2013. Os dados foram analisados a partir da abordagem de análise do discurso, considerando-se sua linha francesa e, particularmente a visão pecheutiana. Esta pesquisa conclui, em linha com autores como Giddens (2002), Goffman (1978) e Schouten (1991), que o corpo é algo importante na noção do indivíduo sobre si mesmo e faz parte de sua construção identitária. Além disso, a maneira como o sujeito lida com a mensagem normativa do mercado traz indícios sobre sua segurança ontológica. O indivíduo ontologicamente seguro não é aquele que descarta o mercado e cujas práticas de consumo relativas ao corpo fogem à norma estética. O que o diferencia daquele cuja segurança ontológica é frágil é sua motivação para aderir a determinado estímulo e a forma como ele lida com essas escolhas de consumo. Depreendemos que o indivíduo com segurança ontológica tem menos ansiedade em suas opções relativas ao corpo e não tem o olhar do outro como uma sombra quando toma decisões sobre sua própria aparência. Diferentemente, os indivíduos sem segurança ontológica são mais ansiosos diante da mensagem do mercado. Há, em algum grau, sofrimento quando não atendem a norma estética e, portanto, a aparência do corpo ganha um espaço importante em suas vidas.
Simonyi, André. "Waiting for the Cows to Come Home: A Political Ethnography of Security in a Complex World. Explorations in the Magyar Borderlands of Contemporary Ukraine". Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/26126.
Pełny tekst źródłaMartimiano, Luciana Andréia Fondazzi. "Sobre a estruturação de informação em sistemas de segurança computacional: o uso de ontologias". Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-02102006-091853/.
Pełny tekst źródłaAs the amount and the complexity of security incidents information have grown exponentially, managing and manipulating these information have become more expensive. Several security tools can be used to assist the administrators in performing these tasks. These tools can monitor what comes from Internet and goes to it, as the firewalls do; they can monitor the intranet traffic, as usually is done by an Intrusion Detection System (IDS); they can search for malicious codes in files or emails, as made by the antivirus; they can create filters to process spams, viruses or worms; or they can scan the intranet for vulnerabilities, as the scanners and the intelligent agents. These tools collect and store a great amount of information, using different formats. This lack of unique commonly agreed formats to store information about security incidents, make the administrators? job even harder, because they have to be able to understand all these formats to identify and to correlate information when, for instance, there is an attack or an invasion in progress. In this thesis I describe the design and development of ontologies to represent in a standard structure information about security incidents. The ontology developed is named OntoSec - Security Incident Ontology. This work covers: (i) how to use ontologies to share and reuse information about incidents; (ii) how to make it easier to correlate incidents; (iii) how to make it possible the interoperability amongs security tools; (iv) modeling of a security incident management system based on OntoSec; and (v) evaluation process of the ontology that has been developed. Besides that, the OntoSec aims to support the decisions made by the administrators when security problems happen, making the process more efficient and effective
Ribeiro, de Azevedo Ryan. "CoreSec: uma ontologia para o domínio de segurança da informação". Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2120.
Pełny tekst źródłaEm ambientes corporativos e heterogêneos, o compartilhamento de recursos para a resolução de problemas é fortemente associado à segurança da informação. Um aspecto crítico a ser considerado para as organizações é a exigência de uma eficaz e eficiente aquisição e distribuição de conhecimento a respeito de riscos, vulnerabilidades e ameaças que podem ser, portanto, exploradas e causar incidentes de segurança e impactar negativamente nos negócios. Os diversos ambientes de atuação humana necessitam de meios transparentes para planejar e gerenciar problemas relacionados à segurança da informação. Há um aumento significativo na complexidade de se projetar e planejar segurança necessitando que meios de manipulação da informação sejam adotados. Para isso, esta dissertação propõe uma ontologia para este domínio de segurança computacional, denominada CoreSec. O estudo visa demonstrar que uma vez que o conhecimento é formalizado, é possível reusá-lo, realizar inferência, processá-lo computacionalmente, como também torna-se passível de comunicação entre seres humanos e agentes inteligentes. Nossa proposta considera que a segurança da informação será mais eficiente se esta for baseada em um modelo formal de informações do domínio, tal como uma ontologia, podendo ser aplicada para auxiliar as atividades dos responsáveis de segurança, na análise e avaliação de riscos, elicitação de requisitos de segurança, análise de vulnerabilidades e desenvolvimento de ontologias mais específicas para o domínio de segurança da informação
Whitmore, Margaret R. "The search for character: Servant-leadership in an Australian organisation". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/113.
Pełny tekst źródłaColobran, Huguet Miquel. "A general-purpose security framework". Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/322814.
Pełny tekst źródłaComputer Science has undergone major transformations throughout its short history. It started with great machines and very restricted and specialized environments and It has become in small devices that are part of society and daily life of every person. Security has been one of the areas most affected by those changes and has undergone major changes in technology also. For this reason, we think that the “traditional” definition of computer security is narrow, especially if we consider the new securities that have appeared in other areas of knowledge. Current definition comes from the 70s and security, in the twenty-first century, is conceptually, theoretically and practically something different. Therefore, the main objective of this thesis is review the concept of computer security itself in order to propose a definition together with a framework model capable to be implemented. In order to achieve it, an analysis method is proposed. The analysis method is based on conceptual methods of obtaining knowledge (knowledge acquisition) used in knowledge engineering. The conceptual model is performed using the Class Diagram (UML) as a graphical representation language. After that, apply the proposed method to a set of selected sources, in order to obtain the model. The conceptual model of the concept of security is expressed as a set of concepts and relationships among concepts. Based on the proposed model, an algebraic expression of the concept of security is drawn, and finally the model is implemented by means of a knowledge-based system using an ontology. Consequently, the study’s principal contributions are the development of a methodology of conceptual analysis and a definition of security along with its framework. The framework is expressed in algebraic manner also and is capable to be implemented using technologies such as Java, providing security metrics. The structure of the thesis is as following: In part 1, a theoretic approach to the study of security, paying attention to other disciplines not related to engineering. An historical approach of the study of the concept of security is made, having special attention to those concepts or models proposed by scholars in the field of security (not exclusively in the field of computer security). Part 2 explains the tools used to build the model. Modeling tools are used both conceptual and knowledge based ones. A method of analysis is constructed and used in the model design. In part 3 a generic model of security is proposed. The aim is to propose an integrative model that includes many of the existing securities. Additionally an algebraic formulation of the security model is made. Finally, part 4 is dedicated to apply the proposed model to a real scenario. This demonstrates that the model is operative and capable to measure the level of security.
SILVA, Rayane Meneses da. "UMA ONTOLOGIA DE APLICAÇÃO PARA APOIO À TOMADA DE DECISÕES EM SITUAÇÕES DE AMEAÇA À SEGURANÇA DA INFORMAÇÃO". Universidade Federal do Maranhão, 2015. http://tedebc.ufma.br:8080/jspui/handle/tede/1885.
Pełny tekst źródłaMade available in DSpace on 2017-08-31T14:44:32Z (GMT). No. of bitstreams: 1 Rayane.pdf: 4026589 bytes, checksum: 7e6066416420555456030ab6db3a1231 (MD5) Previous issue date: 2015-06-24
Many security mechanisms, such as Intrusion Detection Systems (IDSs) have been developed to approach the problem of information security attacks but most of them are traditional information systems in which their threats repositories are not represented semantically. Ontologies are knowledge representation structures that enable semantic processing of information and the construction of knowledge-based systems, which provide greater effectiveness compared to traditional systems. This paper proposes an application ontology called “Application Ontology for the Development of Case-based Intrusion Detection Systems” that formally represents the concepts related to information security domain of intrusion detection systems and “Case Based Reasoning”. The “Case Based Reasoning” is an approach for problem solving in which you can reuse the knowledge of past experiences to solve new problems. The evaluation of the ontology was performed by the development of an Intrusion Detection System that can detect attacks on computer networks and recommend solutions to these attacks. The ontology was specified using the “Ontology Web Language” and the Protégé ontology editor and. It was also mapped to a cases base in Prolog using the “Thea” tool. The results have shown that the developed Intrusion Detection System presented a good effectiveness in detecting attacks that the proposed ontology conceptualizes adequately the domain concepts and tasks.
Muitos mecanismos de segurança, como os Sistemas de Detecção de Intrusão têm sido desenvolvidos para abordar o problema de ataques à Segurança da Informação. Porém, a maioria deles são sistemas de informação tradicionais nos quais seus repositórios de ameaças não são representados semanticamente. As ontologias são estruturas de representação do conhecimento que permitem o processamento semântico das informações bem como a construção dos sistemas baseados em conhecimento, os quais fornecem uma maior efetividade em relação aos sistemas tradicionais. Neste trabalho propõe-se uma ontologia de aplicação denominada “Application Ontology for the Development of Case-based Intrusion Detection Systems” que representa formalmente os conceitos relacionados ao domínio de Segurança da Informação, dos sistemas de detecção de intrusão e do “Case-Based Reasoning”. O “Case-Based Reasoning” é uma abordagem para resolução de problemas nos quais é possível reutilizar conhecimentos de experiências passadas para resolver novos problemas. A avaliação da ontologia foi realizada por meio do desenvolvimento de um Sistema de Detecção de Intrusão que permite detectar ataques a redes de computadores e recomendar soluções a esses ataques. A ontologia foi especificada na linguagem “Ontology Web Language” utilizando o editor de ontologias Protegé e, logo após, mapeada a uma base de casos em Prolog utilizando o ferramenta “Thea”. Os resultados mostraram que o Sistema de Detecção de Intrusão desenvolvido apresentou boa efetividade na detecção de ataques e portanto, conclui-se que a ontologia proposta conceitualiza de forma adequada os conceitos de domínio e tarefa abordados.
Venturini, Yeda Regina. "MOS - Modelo Ontológico de Segurança para negociação de política de controle de acesso em multidomínios". Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-19092006-165220/.
Pełny tekst źródłaThe evolution in the network technology and the growing number of portable and fixed devices belonging to a user, which shares resources, introduces new concepts and challenges in the network and information security area. This new reality has motivated the development of a project for personal security domain formation and security association between them, creating a multi-domain. The multi-domain formation introduces new challenges concerning the access control security policy, since multi-domains are composed by independent administrative domains that share resources for collaborative work. This work presents the main concept concerning the personal security domains and multi-domains, and proposes a security model to allow the dynamic security policy negotiation and composition for access control in multi-domain. The proposed model is called MOS, which is an ontological security model. The MOS is a role-based access control model, which elements are defined by an ontology. The ontology defines a semantic language, common and standardized, allowing the policy interpretation by different domains. The policy negotiation is made possible by the definition of the policy importation and exportation in each domain. These policies mean the partial contributions of each domain for the multi-domain policy formation. The use of ontology allows the dynamic multi-domain policy composition, as well as the verification and resolution of interest conflicts. These conflicts mean incompatibilities between the importation and exportation policy. The MOS was validated through the viability analysis for personal multi-domain application. The analysis was made through the definition of a factual model and the simulation of access control policy negotiation and composition. The simulation was taken place through the definition of a collaborative research projects multi-domain. The results demonstrate the MOS is feasible for implementation in automatic procedures for multi-domain access control policy creation.
Rosa, Diórgenes Yuri Leal da. "EXEHDA-SO: uma abordagem ontológica para ciência de situação aplicada ao domínio de segurança da informação". Universidade Federal de Pelotas, 2017. http://repositorio.ufpel.edu.br:8080/handle/prefix/3841.
Pełny tekst źródłaApproved for entry into archive by Aline Batista (alinehb.ufpel@gmail.com) on 2018-04-19T14:43:29Z (GMT) No. of bitstreams: 2 Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-04-19T14:43:40Z (GMT). No. of bitstreams: 2 Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-12-22
Sem bolsa
As infraestruturas computacionais modernas, típicas da Computação Ubíqua, pressupõem características de flexibilidade e de permissividade quanto a conectividade do ambiente. Estas características contribuíram ao longo dos últimos anos com a concretização da emergente Internet das Coisas, a qual estende a demanda de conectividade e, por conseguinte, eleva o tráfego em redes de computadores. Entretanto, os mesmos fatores que permitem estas evoluções também potencializam problemas no que diz respeito a Segurança da Informação. Recorrentemente são implantadas, em redes de computadores, soluções de Segurança da Informação para fins específicos, desenvolvidas em linguagens de sintaxe própria, provendo eventos em formatos também distintos. Estes fatores individualizam a análise destas soluções, o que acaba dificultando a identificação de incidentes. Neste sentido, a Ciência de Situação, enquanto estratégia capaz de integrar eventos de diferentes fontes, torna-se requisito fundamental para a implementação de controles de segurança, permitindo a flexibilidade típica da UbiComp. Considerando isto, a presente dissertação propõe uma abordagem ontológica para Ciência de Situação aplicada ao domínio de Segurança da Informação, denominada EXEHDA-SO (Execution Environment for Highly Distributed Applications - Security Ontology). Por meio de processamento de eventos heterogêneos, provenientes de diferentes fontes contextuais, busca-se uma contribuição a fase de compreensão de Ciência de Situação. O modelo EXEHDA-SO é apresentado em três fragmentos denominados Core, Scope e InterCell Analyzer. De forma a validar o modelo proposto foi desenvolvido um estudo de caso alusivo `a infraestrutura computacional da Universidade Federal de Pelotas. Nesta avaliação, considerando as características de heterogeneidade e distribuição do ambiente, foi possível observar as principais contribuições propostas nesta dissertação.
Modern computing infrastructures, typical of Ubiquitous Computing, assume characteristics of flexibility and permissiveness regarding the connectivity of the environment. These characteristics have contributed over the last few years to the emerging Internet of Things, which extends the demand for connectivity and therefore raises computer networks traffic. However, the same factors that allow these evolutions also potentiate problems with regard to Information Security. Information security solutions for specific purposes are developed in computer networks, developed in their own syntax languages, providing events in different formats. These factors individualize the analysis of these solutions, which brings difficulties to incidents identification. In this sense, Situational Science, as a strategy capable of integrating events from different sources, becomes a fundamental requirement for the security controls implementation, allowing the typical flexibility of UbiComp. Considering this, the present dissertation proposes an ontological approach to Situation Science applied to the Information Security domain, called EXEHDA-SO (Execution Environment for Highly Distributed Applications - Security Ontology). Through the processing of heterogeneous events, coming from different contextual sources, a contribution is made to the understanding phase of Situational Science. The EXEHDA-SO model is presented in three fragments called Core, Scope and InterCell Analyzer. In order to validate the proposed model a case study was developed allusive to Universidade Federal de Pelotas computational infrastructure. In this evaluation, considering the characteristics of heterogeneity and distribution of the environment, it was possible to observe the main contributions proposed in this dissertation.
Leal, Gabriel Rodrigues. "Fundamentos filosóficos, políticos e educativos da polícia: da sensação de segurança à instituição policial". Pontifícia Universidade Católica de São Paulo, 2015. https://tede2.pucsp.br/handle/handle/9851.
Pełny tekst źródłaConselho Nacional de Desenvolvimento Científico e Tecnológico
This work aims to support the police science analyzing, first, the affection "sense of security" through a structured ontology in triangulation between the "moral failure" in Pascal, the "science of affection" in Espinosa and the "instinct death "in Freud:" ontology of the abyss. " Given this initial ontoantropológica construction, held the book I will trace a brief genealogy of the police institution in Book II now accosted in stud procedure Nietzsche and documentary research on the history of security institutions, or rather, the security-military thinking , greatly Brazilian army. It is, in Book II, therefore, to follow the history of these institutions and their adherence or not to book ontology I. In Book III, in turn, began to investigate the police-military education and general lines an understanding of police-military educational process to give scope to the idea of a precise scientific object or set to public safety sciences, then described in Book IV. Therefore, a sequence of arguments juxtaposition we rely, first, in the ontology; later, in the institutional history of military thought followed by their educational practice scoped to the object "security," to bring in the book IV, an introductory proposal of "public safety sciences," trying to understand their epistemological foundations founded on epistemology Virtue Ernst Sosa (2013) and also moral, established and reading in orthopraxis military values. In short, it is investigating the possibility of understanding security, and its structural affection for the man, as an object of knowledge of police institutions with scientific status, which is founded first and foremost, the year of the first science, philosophy and its offer of elucidating the problem of evil cogent to man and consequently the whole social body, read, since the front pages through an analysis of Hobbes. It is based, in general, still, reading the police not only as reassuring institution and guarantee rights in democracy, insist as public policies, but also as the ultimate repository of cohesion and social peace through the systematic use of violence to "subject Hobbesian "to preserve order, the foundation of social coexistence possible
Este trabalho tem como objetivo fundamentar as ciências policiais analisando, primeiramente, o afeto sensação de segurança por meio de uma ontologia estruturada na triangulação entre a insuficiência moral em Pascal, a ciência dos afetos em Espinosa e a pulsão de morte em Freud: ontologia do abismo . Diante dessa inicial construção ontoantropológica, realizada no Livro I, traçaremos uma breve genealogia da instituição policial no Livro II, agora, acostados no procedimento genealógico de Nietzsche observado por Foucault em sede de normalização e biopolítica e em pesquisa documental acerca da história das instituições de segurança, ou melhor, do pensamento militar à segurança, sobremaneira do Exército brasileiro. Trata-se, no Livro II, portanto, de acompanhar a história dessas instituições e sua aderência, ou não, à ontologia do Livro I. No Livro III, por sua vez, começamos a investigar a educação policial-militar e as linhas gerais de uma compreensão de processo educativo policial-militar para dar escopo à ideia de um objeto científico preciso ou definido às ciências policiais, descritas então no Livro IV. Portanto, numa sequência de justaposição de argumentos baseamonos, primeiramente, na ontologia; posteriormente, na história institucional do pensamento militar seguido de sua prática educativa com escopo ao objeto segurança , para trazer, no Livro IV, uma proposta introdutória das ciências policiais , buscando compreender seus fundamentos epistemológicos fundados na epistemologia da virtude de Ernst Sosa (2013) e, também, morais, com sede de compreensão e leitura na ortopráxis dos valores militares. Em suma, trata-se de investigar a possibilidade de compreender a segurança, e seu afeto estrutural ao homem, como objeto de conhecimento das instituições policiais com status científico, e que se funda antes de mais nada, no exercício da ciência primeira, a filosofia, e sua oferta de elucidação ao problema do mal cogente ao homem e consequentemente a todo corpo social, lido, já nas primeiras páginas através de uma análise em Hobbes. Assenta-se, em caráter geral, ainda, na leitura das polícias não somente como instituição asseguradora e garantia de direitos na democracia, como insistem as políticas públicas, mas também como repositório último da coesão e paz social mediante o uso sistemático da violência ao sujeito hobbesiano para preservação da ordem, o fundamento da convivência social possível
Chatzipanagiotou, Matthildi. "Practicing the law of human dignity". Doctoral thesis, Humboldt-Universität zu Berlin, Juristische Fakultät, 2016. http://dx.doi.org/10.18452/17459.
Pełny tekst źródłaThe philosophical underpinnings of what may be called the meta-dimension of the law of human dignity trigger a question that surpasses the boundaries of the discipline of law: how could the transcendental as an aspect of human dignity meaning be portrayed? The insistence on non-determination of the Menschenbild [human image] or ‘God’ in the Preamble to the German Basic Law [Grundgesetz] reflected in German legal doctrine, paired with the commitment to case-by-case ad hoc concretization of what human dignity means inspire this story of ‘something missing’. In postmodern fashion, this story portrays the law of human dignity as a Trojan Horse and provides hermeneutic and literary foundations for an affirmative stance towards ‘emptiness’ talk in legal discourse. The research question rekindles and twists polemically framed ‘emptiness’ and ‘black box’ contentions: Why does the legal concept of human dignity appear ‘empty’? Or, how is it ‘empty’? Why and how is it a ‘black box’? How do manifestations of the concept appear abstract as universals and concrete as particulars? The ontological, linguistic-analytical, and phenomenological philosophical insights presented in Chapter One compose the lens through which five benchmark Bundesverfassungsgericht cases – on abortion, life imprisonment, transsexuals, state response to terrorist attacks, and the guarantee of a dignified subsistence minimum – are analyzed in Chapter Two. The philosophical sources are not bracketed as moments in the long course of human dignity in the history of ideas.
Liang, Po Jui, i 梁珀瑞. "An Ontological Evaluation on Information Security Risk Modeling Languages". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/42410458411422020483.
Pełny tekst źródła長庚大學
資訊管理學系
100
Information system modeling languages can support the analysts to represent user requirements. Because information security has been taken seriously, information security modeling languages have been developed. This study is based on the Bunge-Wand-Weber (BWW) ontology to evaluate the extended i* modeling language. We propose some propositions as the results of applying the BWW ontology to analyze the extended i* language. The elements of the analyzed language are divided into two groups. One group called Fundamental Elements which represent the building block of the language. The other group called Advanced Elements the definition of which can be derived from an element in the Fundamental Elements. To reduce the subjectivity that our ontological analysis may produce, we conducted an investigation based on the Delphi method to the analysis results on the Fundamental Elements. The propositions we proposed are as below: (1)Resource is-a-kind-of Thing; (2)Task is-a-kind-of Process; (3)Actor is-a-kind-of Thing; (4)Goal is-a-kind-of Lawful State Space; (5)Actor is-a-kind-of System; (6)Softgoal is-a-kind-of Lawful State Space; (7)Vulnerability is-a-kind-of Lawful State Space; (8)Dependency is-a-kind-of Coupling; (9)Decomposition have no ontology mapping; (10)Means-end have no ontology mapping; (11)Contribution, Vulnerability Effect, Countermeasure and Exploit all have no ontology mapping; (12)Attacker, Malicious Task, Malicious Goal and Malicious Softgoal are all elements extended form Fundamental Elements. The study also proposes some suggestions to improve the extended i* modeling language. Because the scarcity of experts in i* and BWW available to this study, there is still a limitation in applying the propositions proposed in this study. Another limitation may arise when it comes to the validity of Advanced Elements because they are not validated as their counterparts in a Delphi survey.
WU, JUI-JHE, i 吳睿哲. "Influence of Ontological Security and Reflective Learning on Personal Career Development". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/92f6gt.
Pełny tekst źródła國立暨南國際大學
諮商心理與人力資源發展學系終身學習與人力資源發展研究所
105
This research is trying to understand what factors infect on everyone’s ontological security and how ontological security infect everyone’s reflective learning, giving themselves special life-meaning, Also referencing to career development mode to understand what kinds of career mission in each Chi Wei Wang’s career development stage. And provide advice on the development of a person's career or the planning of a career development program. The results are summarized as follows: First, people use professional knowledge and skill, family, personal experience correct their self-identity consistently, and obtain the living-environment of trust. The dependence of important people and support can help individual turning a stumbling block into a stepping stone smoothly when they face the accident. Furthermore, when people find that their new method could solve problem, they will enhance strong confident and build a concrete self-identity. Also, more economic or social resource people can use, more efficient reduce the damage and stress produced by impact. It also give strength to people reflecting themselves and making difference. Second, reflexive learning can enhance one’s ontological security, on the contrary, ontological security also induce people process reflexive learning when they encounter impact. Third, of course, important other is people establishing their self-identity and ontological security strongly. However, it also could interfere self-identity and ontological security. It depends on people’s communicating and realizing. Finally, based on the above finding, this research is aimed to providing suggestion to who feel hesitate to career development, interested for career development and future related researcher.
Baratov, Shuhrat. "Hero-making as ontological security practice: Tajikistan's identity politics and relations with Uzbekistan". Phd thesis, 2017. http://hdl.handle.net/1885/133760.
Pełny tekst źródłaBanham, RT. "Seeing the forest for the trees : ontological security and experiences of Tasmanian forests". Thesis, 2019. https://eprints.utas.edu.au/31414/1/Banham_whole_thesis.pdf.
Pełny tekst źródłaSullivan, Paul W., i Parveen Akhtar. "The effect of territorial stigmatisation processes on ontological security: A case-study of Bradford politics". 2018. http://hdl.handle.net/10454/16662.
Pełny tekst źródłaWe investigate the effect of territorial stigmatisation on ontological security through a qualitative case-study of Bradford politics during the 2015 General Election. Territorial stigmatisation and ontological security are important constructs in political geography but there is relatively little research on how territorial stigmatisation effects ontological security in everyday lived experience – in this case, the lived experience of political contests. We conducted thirty in-depth interviews, generated three themes and present and analyse these three themes in the form of three ‘created dialogues’ as outlined by Sullivan (2012), with a smaller sample of ten out of thirty of our participants. Drawing on Bakhtin’s (1981) concept of ‘chronotope’ we identity three key effects of territorial stigmatisation on ontological security: i) A negative reputation of ‘parallel societies’ has the potential to create double meanings for the inhabitants of that society; ii) Local reputation enhances ontological security through linking particular places to particular personalities but potentially decreases ontological security for a district as a whole; iii) Everyday lived experiences sometimes acquire charged emotional symbolic significance, which could encourage the reflexive side of ontological security. Our findings went through a positive member-checking process with five of the participants.
Research Development Fund Publication Prize Award winner, October 2018.
Chen, Yi-Ru, i 陳怡汝. "A study on influence of ontological security on reflective learning of primary caregivers of rare disorders". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/83221725686458435535.
Pełny tekst źródła國立暨南國際大學
成人與繼續教育研究所
97
The purpose of this study rare diseases through the primary caregivers of narrative to understand the impact of its sense of ontological security related factors, and ontological security for all types of learning to take care strategy, given its own special meaning of life on the impact of reflexive learning, and the provision of adult education the field of rare diseases for caregivers to reflexive learning on the recommendations of the study program planning. The results are summarized as follows: Firstly, the rare diseases primary caregivers from the medical knowledge, religious tradition, experience and personal reflection to take care of the amendment between the past self-awareness, and gain the trust of the community a sense of the world. Furthermore, it is important to rely on others to support and contribute to the individual in the event of " fatefulness" the incident, smoothly into the sound development of the impact. In addition, when primary caregivers can find themselves competent to take care of work and to other members of homogeneous groups help, allow them to re-establish their own value, access to self-identity. Finally, the family's economic security and material support to the higher impact of rare diseases with less pressure, and primary caregivers can have the spare capacity to think and plan of life, so that their own better. Secondly, reflective learning can enhance the ontological security of primary caregivers of rare diseases, however, for too substantial ontological security, it might be the obstacles of reflective learning of primary caregivers of rare diseases. Thirdly, through the continuing process of reflection, ontological security of primary caregivers of rare diseases, it makes them willing to try different challenges from the past and obtain the distinctive perspectives. When the primary caregivers survive from the crisis of great shock with these new ideas and methods, they establish more positive self-identity and firm their ontological security more as well. Besides, they construct their self-identity continually with the process of interaction of outside world and then proceed to enhance ontological security to re-establish their life meaning. Finally, based on the above findings, this study is aimed at providing suggestions from primary caregivers of rare diseases, related practical workers (related patient groups and adult educationists) and future related researches as well.
Hutchinson, HE. "My heart is in two places: ontological security, emotions and the health of African refugee women in Tasmania". Thesis, 2010. https://eprints.utas.edu.au/17681/2/hutchison_thesis.pdf.
Pełny tekst źródła