Rozprawy doktorskie na temat „Trust by the way of security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Trust by the way of security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace". Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Pełny tekst źródłaManor, Mike. "The home front : civil rights, American values, and public trust when America is at war /". Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.
Pełny tekst źródłaLemaitre, Freddy. "La monnaie comme objet de sûretés". Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.
Pełny tekst źródłaAs the law stands, security rights in money are likely to be subject to different legal treatment, depending on whether money is regarded as a tangible asset or as an intangible asset, and depending on whether sums of money as a guarantee are assimilated with the secured creditor’s property or not. Taking this observation as its starting point, the present essay suggests adopting a unified approach of legal nature of money, that is likely to justify that money should be subject to a simplified security regime. Without ignoring that it is bound to be dual, depending on whether sums of money as a guarantee are separated from the secured creditor’s property or not, this security regime would be called upon to replace the present fungible assets, bank account and receivables pledge agreements, and also security trust on receivables and money, with a single money pledge agreement.The rules of the lodging of this money pledge agreement will be designed to eliminate the never-ending debates as to whether the “cash collateral” vests ownership of the encumbered money in the secured creditor, or not. Indeed, the assimilation of the encumbered sums of money with the secured creditor’s property will involve a sui generis division of the ownership rights that will be like an irregular usufruct by way of collateral, and that will grant the creditor neither mere preferential rights, nor ownership rights, nor any right similar to the right of a security trustee, but the right to dispose of money provisionally. This right of disposal will encumber temporarily the ownership rights that will remain in the hands of the grantor of the security.The rules of its lodging being therefore clarified, the rights granted by the money pledge agreement will be enforced more quickly and more effectively since the divided ownership of money will be reconstructed in the hands of the grantor of the security or in the hands of the secured creditor, depending on whether the secured debt will be paid or not, and without there being a need to wonder if the rights granted by the pledge have to be enforced either through judicial or contractual award of the right of ownership, or through legal, judicial or contractual compensation
Gilberg, Ole Rasmus. "Cloud Security without Trust". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.
Pełny tekst źródłaKarthik, Krishna FNU. "Vehicular Security using Trust Management". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Pełny tekst źródłaLeonhard, Julian. "Analog hardware security and trust". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Pełny tekst źródłaThe ongoing globalization and specialization of the integrated circuit (IC) supply chain has led semiconductor companies to share their valuable intellectual property (IP) assets with numerous parties for means of manufacturing, testing, etc. As a consequence, sensitive IPs and ICs are being exposed to untrusted parties, resulting in serious piracy threats such as counterfeiting or reverse engineering. In this thesis we develop methods to secure analog and mixed signal IPs/ICs from piracy threats within the supply chain. We propose an anti-piracy methodology for locking mixed-signal ICs via logic locking of their digital part. Furthermore, we propose an anti-reverse engineering methodology camouflaging the effective geometry of layout components. Finally, we propose an attack to break all analog circuit locking techniques that act upon the biasing of the circuit. The presented techniques have the potential to protect analog and mixed-signal circuits against a large subset of all the possible risk scenarios while inflicting low overheads in terms of area, power and performance
Bilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality". Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Pełny tekst źródłaElsalamouny, Ehab M. "Probablistic trust models in network security". Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.
Pełny tekst źródłaEl, Salamouny Ehab. "Probabilistic trust models in network security". Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Pełny tekst źródłaMorris, Cameron. "Browser-Based Trust Negotiation". Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.
Pełny tekst źródłaAmbrose, William, Samuel Athley i Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust". Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.
Pełny tekst źródłaWith Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.
The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the interviews.
The result of this study shows connections between the specific SPIs, both how they compare, but also how they differ. In the end we were also able to rank the top security risks from interviews with experts and see which SPI could be the most insecure one and what countermeasures could be applied.
This was further related to trust and Service Level Agreement (SLA) in Cloud Computing to show how the security risks we discuss are related to these two specific areas. By highlighting this we wanted to present useable information for both clients and providers in how to create a better Cloud Computing environment.
Moe, Marie Elisabeth Gaup. "Security, Privacy and Trust in Dynamic Networks". Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5540.
Pełny tekst źródłaMessaggi, Kaya Monica. "Trust and security risks in mobile banking". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.
Pełny tekst źródłaWeissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security". Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.
Pełny tekst źródłaAlruwaythi, Maryam. "User-Behavior Trust Modeling in Cloud Security". Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/31537.
Pełny tekst źródłaYang, Seokwon. "Security and trust management in collaborative computing". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002375.
Pełny tekst źródłaLe, Vinh Thinh. "Security and Trust in Mobile Cloud Computing". Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148/document.
Pełny tekst źródłaAs living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important roles, mobile devices deserve to work in the environment which they can trust for serving us better. In this thesis, we investigate the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence). More precisely, after addressing the challenges of mobile cloud computing (MCC), we have studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, as well as proposed a demonstration of particular MCC model, called Droplock system. Moreover, taking advantages of trusted platform module functionality, we introduced a novel schema of remote attestation to secure mobile devices in the context of Mobile-Cloud based solution. To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on the cloudlet notion
Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Pełny tekst źródłaThe origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Le, Vinh Thinh. "Security and Trust in Mobile Cloud Computing". Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148.
Pełny tekst źródłaAs living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important roles, mobile devices deserve to work in the environment which they can trust for serving us better. In this thesis, we investigate the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence). More precisely, after addressing the challenges of mobile cloud computing (MCC), we have studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, as well as proposed a demonstration of particular MCC model, called Droplock system. Moreover, taking advantages of trusted platform module functionality, we introduced a novel schema of remote attestation to secure mobile devices in the context of Mobile-Cloud based solution. To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on the cloudlet notion
Mignard, Cédric. "Le crédit-bailleur mobilier face à la procédure collective du crédit-preneur". Electronic Thesis or Diss., Toulon, 2019. http://www.theses.fr/2019TOUL0127.
Pełny tekst źródłaA finance lease arrangement is a financing technique whereby the financial lessor acquires ownership of a property for the purpose of leasing it to the lessee who has a call option at the end of the irrevocable rental period. In the event that a collective procedure is opened against the lessee, the financial lessor is necessarily affected. The firms in financial distress rights offers the competent body the possibility of requiring the financial lease arrangement’s continuation, with no consideration other than the contract’s execution under its initial conditions. It is also possible for the court to require the financial lessor to transfer its contract when a disposal plan is considered. The financial lessor must also ensure the preservation of its interests by reporting, like any other creditor, its accounts payable arising prior to the opening judgment, while a second declaration of claims may be necessary where appropriate, when the contract is continued beyond the opening judgment. As the owner of the property, subject of the credit agreement, the financial lessor nevertheless has a real opportunity of being disinterested of part of its receivables. However, its owner status must be opposable to the insolvency proceedings. Property as well as the lease are, in this context, diverted from their natural roles. The financial lessor’s ownership is then limited to the transaction’s guarantee, which leads to establish a parallel between the title retention clause and the trust by way of security
Crosby, Garth Valentine. "Trust Based Security Mechanisms for Wireless Sensor Networks". FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/61.
Pełny tekst źródłaShearer, Charles Dylan. "Assumptions, trust, and names in computer security protocols". Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5657.
Pełny tekst źródłaA major goal of using any security protocol is to create certain beliefs in the participants. A security protocol will use techniques like cryptography to guarantee some things, but it will still require a participant to make assumptions about other things that the protocol cannot guarantee; such assumptions often constitute trust in other participants. In this thesis, we attempt to precisely identify the required assumptions of some example protocols. In the process, we find that we must consider the names that participants use to reason about each other. It turns out that naming is a complex topic with a rich body of philosophical work, and we apply some ideas from this work to the problem of identifying security protocols' required assumptions. Finally, we begin work on a mathematical model of protocols and beliefs to which a formal logic of belief could be applied. The model is left incomplete because of some unresolved problems with modeling belief caused by the design requirement that the model's elements have clear operational meanings. The solution of these problems is left as future work.
Mustapa, Muslim. "PUF based FPGAs for Hardware Security and Trust". University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1436361629.
Pełny tekst źródłaHan, Weijun. "Trust-based distributed security framework for active networks". Thesis, Loughborough University, 2006. https://dspace.lboro.ac.uk/2134/34945.
Pełny tekst źródłaChinnam, S. "MULTI-WAY COMMUNICATION SYSTEM". CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.
Pełny tekst źródłaFord, Sarah Gordon. "Changing the way the world thinks about computer security". Thesis, Middlesex University, 2006. http://eprints.mdx.ac.uk/7995/.
Pełny tekst źródłaXia, Ying Han. "Establishing trust in encrypted programs". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.
Pełny tekst źródłaCommittee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
Dong, Changyu. "Non-monotonic trust management for distributed systems". Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505456.
Pełny tekst źródłaDuma, Claudiu. "Security and trust mechanisms for groups in distributed services /". Linköping : Univ, 2005. http://www.bibl.liu.se/liupubl/disp/disp2005/tek979s.pdf.
Pełny tekst źródłaPaillissé, Vilanova Jordi. "Next generation overlay networks : security, trust, and deployment challenges". Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672330.
Pełny tekst źródłaLes xarxes superposades o overlays són una tècnica per a construir una xarxa sobre una d'existent. Són una eina fonamental per a afegir funcionalitat a xarxes ja existents, i es fan servir en diferents capes de la pila de protocols d’Internet per a diferents objectius, com ara confidencialitat, Qualitat de Servei, virtualització de xarxes, etc. Específicament, les xarxes superposades a la capa de xarxa IP es fan servir àmpliament per alguns d’aquest casos d’ús. No obstant, aquest tipus de xarxes superposades no tenen tanta funcionalitat com overlays en altres capes. Per exemple, gràcies al paradigma Zero Trust és possible construir xarxes superposades segures a la capa 7 amb HTTPS. Tenint això en compte, aquesta tesi vol afegir noves funcionalitats i millorar-ne d’altres en xarxes IP superposades, amb l’objectiu d’afrontar nous reptes. Aquesta tesi es centra en tres eixos: seguretat, confiança i desplegament en escenaris de xarxes empresarials. En primer lloc, pel que fa a seguretat, explorem com simplificar la configuració de túnels segurs a través d’Internet, sense dependre duna infraestructura de clau pública externa o de solucions propietàries. Per a aquest objectiu, utilitzem WireGuard, un protocol VPN d’última generació i li afegim un pla de control per a distribuir les claus d’encriptació. A més, presentem la implementació d’un prototip i una avaluació del seu rendiment. En segon lloc, respecte la confiança, investiguem com les tecnologies emergents basades en cadenes de blocs (blockchain) es poden fer servir en sistemes de mapatge distribuïts. Els sistemes de mapatge són una base de dades que es fa servir en alguns desplegaments de xarxes superposades per a ajudar en la creació dels túnels; normalment guarden parelles d’adreces que tradueixen l’adreça de la xarxa superposada a la de la xarxa de sota. Els sistemes de mapatge no es solen utilitzar en escenaris amb múltiples dominis administratius, degut a la complexitat de la configuració i a la centralització del seu control. En aquesta part explorem com algunes de les propietats de les cadenes de blocs, com el control distribuït o l’auditabilitat poden ajudar a construir aquests tipus de sistemes de mapatge. Tenim en compte tant els aspectes polítics, és a dir, els avantatges d’un esquema de confiança distribuït, com tècnics, per exemple, una gestió més simple. A més, presentem dos escenaris de desplegament: un per a incrementar la seguretat de l'enrutament basat en BGP entre diferents dominis, i un altre d’un conjunt d’empreses que cooperen per a establir comunicacions entre elles. Finalment, ens centrem en el desplegament de xarxes per a empreses fent servir xarxes superposades. En primer lloc, detallem els reptes que hi ha actualment a les xarxes per a empreses, per exemple, segmentació, mobilitat o simplificació de les operacions. A continuació, presentem un disseny basat en xarxes superposades i principis SDN que aborda els reptes que hem mencionat, a més d’una avaluació de dos desplegaments reals. Acabem amb una solució dissenyada per a les xarxes empresarials del futur, també basat en xarxes superposades i una aproximació per capes. Aquesta solució està dirigida a oferir mobilitat, connexió simultània (multi-homing), confidencialitat, identitat de l’usuari i l'aplicació, i polítiques de control d’accés per a dispositius connectats des de qualsevol xarxa, sigui des de l'oficina o des de fora.
Las redes superpuestas u overlays son una técnica para construir una nueva red encima de una ya existente. Son una herramienta clave para añadir funcionalidad a redes existentes, y se usan en diferentes capas de la pila de protocolos de Internet para una gran variedad de propósitos, como confidencialidad, Calidad de Servicio, redes virtuales, etc. Específicamente, las redes superpuestas en la capa de red IP son ampliamente usadas para algunos de estos casos de uso. No obstante, este tipo de redes no disponen de tantas funcionalidades como redes superpuestas en otras capas. Por ejemplo, gracias al paradigma Zero Trust es posible construir redes superpuestas seguras en la capa 7 usando HTTPS. Teniendo esto en cuenta, esta tesis tiene como objetivo añadir nuevas funcionalidades y mejorar otras de las redes IP superpuestas, con el propósito de afrontar los nuevos retos que van apareciendo. Esta tesis se centra en tres ejes: seguridad, confianza y despliegue en escenarios empresariales. En primer lugar, y respecto a la seguridad, exploramos cómo simplificar la configuración de túneles seguros a través de Internet, sin usar una infraestructura de clave pública externa o soluciones propietarias. Para este objetivo, utilizamos WireGuard, un protocolo VPN de última generación, y le añadimos un plano de control para distribuir las claves de encriptado. Además, presentamos la implementación de un prototipo y una evaluación de rendimiento. En segundo lugar, en relación a la confianza, investigamos como las tecnologías emergentes basadas en cadena de bloques (blockchain) se pueden usar en sistemas de mapeado distribuidos. Los sistemas de mapeado son una base de datos que se utiliza en algunas redes superpuestas para ayudar en la creación de los túneles. Normalmente, estos sistemas guardan parejas de direcciones que traducen direcciones de la red superpuesta a la de la red subyacente. Los sistemas de mapeado no son muy utilizados en escenarios con múltiples dominios administrativos, debido a la complejidad de la configuración y a la centralización del control. En esta parte exploramos como algunas de las propiedades de las cadenas de bloques, como el control distribuido, o la auditabilidad, pueden ser de ayuda en la construcción de este tipo de sistemas de mapeado. Tomamos en consideración tanto los aspectos políticos, esto es, las ventajas de un esquema de confianza distribuido, como los técnicos, por ejemplo, una gestión más simple. También presentamos dos escenarios de despliegue: uno para aumentar la seguridad del enrutamiento basado en BGP entre diferentes dominios, y otro de un conjunto de empresas que cooperan para establecer conexiones entre ellas. Finalmente, nos centramos en el despliegue de redes empresariales usando redes superpuestas. En primer lugar, detallamos los retos que existen hoy en día en las redes empresariales, por ejemplo, segmentación, movilidad, o simplificación de las operaciones. A continuación, presentamos un diseño basado en redes superpuestas y principios SDN que aborda los retos que hemos mencionado, junto con la evaluación de dos despliegues reales. Concluimos con una solución diseñada para las redes empresariales del futuro, basada también en redes superpuestas y una aproximación por capas. Esta solución tiene como propósito ofrecer movilidad, conexión simultánea (multi-homing), confidencialidad, identificación de usuario y aplicación, y políticas de control de acceso para dispositivos conectados desde cualquier red, sea en la oficina o fuera.
Arquitectura de computadors
Cozzi, Maxime. "Infrared Imaging for Integrated Circuit Trust and Hardware Security". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS046.
Pełny tekst źródłaThe generalization of integrated circuits and more generally electronics to everyday life systems (military, finance, health, etc) rises the question about their security. Today, the integrity of such circuits relies on a large panel of known attacks for which countermeasures have been developed. Hence, the search of new vulnerabilities represents one of the largest contribution to hardware security. The always rising complexity of dies leads to larger silicon surfaces.Circuit imaging is therefore a popular step among the hardware security community in order to identify regions of interest within the die. In this objective, the work presented here proposes new methodologies for infrared circuit imaging. In particular, it is demonstrated that statistical measurement analysis can be performed for automated localization of active areas in an integrated circuit.Also, a new methodology allowing efficient statistical infrared image comparison is proposed. Finally, all results are acquired using a cost efficient infrared measurement platform that allows the investigation of weak electrical source, detecting power consumption as low as 200 µW
DE, BENEDICTIS MARCO. "Security and trust in a Network Functions Virtualisation Infrastructure". Doctoral thesis, Politecnico di Torino, 2020. http://hdl.handle.net/11583/2842509.
Pełny tekst źródłaMaijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective". Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.
Pełny tekst źródłaYritysten välinen luottamus on yhä tärkeämpää toimitusketjuihin osallistuvien organisaatioiden keskuudessa, missä uhat syntyvät yritysten tietoturvakontrollien ulkopuolelta. Sama ongelma kohdataan kyberturvallisuudessa, missä uhkataso kasvaa muutoksista organisaatiorajojen ulkopuolella. Jokaisen toimitusketjuun osallistuvan on suojauduttava. Luottamuksen rakentamisen tehtävä on kaikkien jäsenien yhteinen asia luottamusverkostossa. Toimitusketjuun osallistuvien on rakennettava organisaatioiden välinen luottamus ennen liiketoiminnan aloittamista. Tässä tutkimuksessa tarjotaan keinoja kehittää organisaatioiden välistä luottamusta tietoturvallisuuden hallintajärjestelmän toteuttamisessa. Tietoturvallisuuden hallintajärjestelmä koostuu prosessien, dokumentaation, toimintojen ja resurssien yhdistelmästä, mitkä yhdessä turvaavat tietovarannot organisaation sisällä. Se on koostettava tukemaan liiketoiminnan strategisia tavoitteita ja täyttää valitut kriteeristöt. Koska tietoturvallisuuden hallintajärjestelmiä sertifioidaan eri tavalla, sekä eri tarkoituksia varten, niin sertifioitu standardi ei itsessään takaa turvallisia liiketoimintaprosesseja, vaan se toimii hyvänä lähtöpisteenä luottamuksen rakentamiselle. Tässä tutkimuksessa sovellettiin kirjallisuuskatsausta yritysten välisten luottamusta edistävien ja estävien elementtien löytämiseksi, mitä tietoturvallisuuden hallintajärjestelmän toteutuksessakin voitaisiin soveltaa. Tutkimus toteutettiin rajatulla alueella tietojenkäsittely-, käyttäytymis-, sekä hallintotieteiden yhtymäkohdassa. Tutkimus löysi useita elementtejä (102), mitkä huomioimalla tietoturvallisuuden hallintajärjestelmässä voidaan vaikuttaa yritysten välisen luottamuksen rakentamiseen. Löydökset jaoteltiin ISO/IEC 27001 (2013) tietoturvallisuuden hallintajärjestelmän toteutusaskelien mukaisesti, jotta tulokset tukisivat parhaiten tietoturvallisuuden asiantuntijaa konkreettisella tasolla. Tutkimuspapereita ei ole yhtään, tai niitä on hyvin rajoitetusti missä tietoturvallisuuden hallintajärjestelmän ja yritysten välisen luottamuksen rakentaminen yhdistetään. Monitieteinen tietoturvan ilmiö yhdistettynä yritysten välisen luottamuksen rakentamiseen vaatii enemmän huomiota tiedeyhteisöltä. Tietoturvallisuutta kouluttavien oppilaitosten tulisi kehittää tietoturvallisuuden kurssitarjontaansa tukemaan monitieteellistä lähestymistapaa ei vain oman tutkimusalan näkökulmaa, jotta teollisuus saisi sopivampia resursseja käyttöönsä
Yang, Yinan Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "W3 Trust Model (W3TM): a trust-profiling framework to assess trust and transitivity of trust of web-based services in a heterogeneous web environment". Awarded by:University of New South Wales - Australian Defence Force Academy. School of Information Technology and Electrical Engineering, 2005. http://handle.unsw.edu.au/1959.4/38655.
Pełny tekst źródłaDean, Kevin. "TrustVoucher: automating trust in websites". Thesis, Kansas State University, 2014. http://hdl.handle.net/2097/17638.
Pełny tekst źródłaDepartment of Computing and Information Science
Eugene Vasserman
Since the early 2000s, Internet users have continuously fallen prey to the perils of identity theft and malware . A number of tools have been proposed and implemented to foster trust towards deserving websites and alert users of undeserving websites, including P3P and trust seals. Each of these has fallen short, with studies showing that users simply do not use them. TrustVoucher is a prototype system o forge bonds of trust between users and websites by automatically determining if the website is backed by a trusted third party. Inspiration is taken from the real life way of trusting businesses, in which one aggregates recommendations by friends. TrustVoucher protects users who are attentive to its messages by informing them of sites who have put forth the effort to be endorsed by a trusted third party. An experimental study was performed on the effectiveness of the chosen interface for doing this, and determined that users did not consistently trust the recommendations of TrustVoucher, so future work will explore options for gathering the trust of users to distribute among websites.
Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust". Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Pełny tekst źródłaWeyl, Benjamin. "On interdomain security : trust establishment in loosely coupled federated environments /". München : Verl. Dr. Hut, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017084239&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Pełny tekst źródłaVasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.
Pełny tekst źródłaŠio darbo teorinė ir praktinė svarba yra naujų žinių, susijusių su saugumo ir pasitikėjimo problemų sprendimais mobilios komercijos kontekste, kūrimas kuris pasitarnaus ne tik mokslinei bendruomenei, bet ir e-verslui. Nepaisant to, jog mobilios komercijos įsisavinimas plačiai analizuotas holistiniu požiūriu, magistrinio darbo autorius nerado atliktų išsamių tyrimų išsamiau aptariančių pasitikėjimo ir saugumo veiksnių poveikio mobilios komercijos kontekste. Darbo problema formuluojama, kaip patikimumo ir saugumo veiksniai daro įtaką mobilios komercijos įsisavinimui. Tiriamieji objektai yra mobili komercija, saugumas ir patikimumas. Šio tyrimo tikslas yra dvejopas: empirinis ir aiškinamasis. Siekiant tyrimo tikslo, buvo išstudijuota literatūra, pasiūlytas mokslinio tyrimo modelis, išanalizuoti rezultatai ir įvertintos suformuluotos hipotezės. Mokslinio tyrimo eigoje autorius panaudojo teorinius ir empirinius duomenų analizės ir rinkimo metodus. Teorinėje dalyje buvo panaudoti panašumo, apibendrinimo ir modeliavimo metodai. Empirinėje dalyje įgyvendintas kiekybinis tyrimas, duomenys renkami apklausos būdu struktūruoto klausimyno pagalba. Surinkti duomenys apdoroti SPSS aplinkoje atliekant aprašomųjų duomenų analizę pagal Likerto suminių vertinimo skales. Galutinis šio tyrimo tikslas buvo patikrinti suformuluotas hipotezes. Kalbant apie išvadas, privatumo rizikos suvokimas, mobilių mokėjimų, mobilios komercijos įstatymų ir gaunamų produktų kokybė turėjo neigiamą įtaką mobilios... [toliau žr. visą tekstą]
Ihsan, M. "A dynamic trust and mutual authentication scheme for MANET security". Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48328/.
Pełny tekst źródłaMcGinthy, Jason M. "Solutions for Internet of Things Security Challenges: Trust and Authentication". Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91443.
Pełny tekst źródłaDoctor of Philosophy
The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives.
Hendrickson, Selim L. Y. Tuğlular Tuğkan. "Web Services Security: A Proposed Architecture For Interdomain Trust Relationship/". [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000581.pdf.
Pełny tekst źródłaWeyl, Benjamin. "On interdomain security trust establishment in loosely coupled federated environments". München Verl. Dr. Hut, 2007. http://d-nb.info/992163153/04.
Pełny tekst źródłaSpazzoli, Rowan. "Mental health and social decision making: How depression alters the way we trust". Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31013.
Pełny tekst źródłaPorter, Paul A. "Trust Negotiation for Open Database Access Control". Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Pełny tekst źródłaJarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation". Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.
Pełny tekst źródłaVilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.
Pełny tekst źródłaThe SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this new SIM capabilities together with its pervasiveness and security can support the development and design of trust-based applications. It reviews the new trust possibilities based on the identity factor, connectivity and context-awareness sensors on the SIM. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.
Corre, Kevin. "User controlled trust and security level of Web real-time communications". Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S029/document.
Pełny tekst źródłaIn this thesis, we propose three main contributions : In our first contribution we study the WebRTC identity architecture and more particularly its integration with existing authentication delegation protocols. This integration has not been studied yet. To fill this gap, we implement components of the WebRTC identity architecture and comment on the issues encountered in the process. In order to answer RQ1, we then study this specification from a privacy perspective an identify new privacy considerations related to the central position of identity provider. In the Web, the norm is the silo architecture of which users are captive. This is even more true of authentication delegation systems where most of the time it is not possible to freely choose an identity provider. In order to answer RQ3, we conduct a survey on the top 500 websites according to Alexa.com to identify the reasons why can't users choose their identity provider. Our results show that while the choice of an identity provider is possible in theory, the lack of implementation of existing standards by websites and identity providers prevent users to make this choice. In our second contribution, we aim at giving more control to users. To this end and in order to answer RQ2, we extend the WebRTC specification to allow identity parameters negotiation. We present a prototype implementation of our proposition to validate it. It reveals some limits due to the WebRTC API, in particular preventing to get feedback on the other peer's authentication strength. We then propose a web API allowing users to choose their identity provider in order to authenticate on a third-party website, answering RQ2. Our API reuse components of the WebRTC identity architecture in a client-server authentication scenario. Again, we validate our proposition by presenting a prototype implementation of our API based on a Firefox extension. Finally, in our third contribution, we look back on RQ1 and propose a trust and security model of a WebRTC session. Our proposed model integrates in a single metric the security parameters used in the session establishment, the encryption parameters for the media streams, and trust in actors of the communication setup as defined by the user. Our model objective is to help non-expert users to better understand the security of their WebRTC session. To validate our approach, we conduct a preliminary study on the comprehension of our model by non-expert users. This study is based on a web survey offering users to interact with a dynamic implementation of our model
Farooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security". Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Pełny tekst źródłaPirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks". University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.
Pełny tekst źródłaAl, Beshri Aiiad Ahmad M. "Outsourcing data storage without outsourcing trust in cloud computing". Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/61738/1/Aiiad_Ahmad_M._Al_Beshri_Thesis.pdf.
Pełny tekst źródła