Teses / dissertações sobre o tema "Databases security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Databases security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texto completo da fonteKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texto completo da fonteRedfield, Catherine M. S. "Practical security for multi-user web application databases". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.
Texto completo da fonteThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 67-68).
Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can examine or alter the data in situ. Multiple Principal CryptDB protects against attacks on web application servers. By chaining encryption keys to user passwords, an attacker gaining access to decrypted data through issuing arbitrary queries to the database through CryptDB cannot access data belonging to offline users. A logging system and distributed key storage for CryptDB constrain the pool of possibly compromised data after an attack. Multiple Principal CryptDB can be used to secure the data of six web applications examined, with 2-8 lines of altered source code and 15-111 annotations added to the schema. On the phpBB web forum application, Multiple Principal CryptDB reduces throughput by only 14.5%, with 24 sensitive fields encrypted, and adds less than 26ms of latency to each individual query.
by Catherine M.S. Redfield.
M.Eng.
Zhang, Ye, e 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texto completo da fonteFarooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security". Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Texto completo da fonteOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Texto completo da fonteOlk, Jeffrey S. "Exploring the lack of interoperability of databases within Department of Homeland Security interagency environment concerning maritime port security". Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FOlk.pdf.
Texto completo da fonteThesis Advisor(s): Bordetsky, Alex. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Interoperability, HSIN, Department of Homeland Security, Command and Control, Situational Awareness, Maritime Port Security, USCG, CBP. Includes bibliographical references (p. 63-67). Also available in print.
Kohler, Matthew J., e Shawn W. Stroud. "An effective access control mechanism and multilevel security for multilevel secure databases". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25865.
Texto completo da fontePatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Texto completo da fonteHermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet". Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Texto completo da fonteToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Burchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Texto completo da fonteBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Texto completo da fonteAraujo, Neto Afonso Comba de. "Security Benchmarking of Transactional Systems". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/143292.
Texto completo da fonteMost organizations nowadays depend on some kind of computer infrastructure to manage business critical activities. This dependence grows as computer systems become more reliable and useful, but so does the complexity and size of systems. Transactional systems, which are database-centered applications used by most organizations to support daily tasks, are no exception. A typical solution to cope with systems complexity is to delegate the software development task, and to use existing solutions independently developed and maintained (either proprietary or open source). The multiplicity of software and component alternatives available has boosted the interest in suitable benchmarks, able to assist in the selection of the best candidate solutions, concerning several attributes. However, the huge success of performance and dependability benchmarking markedly contrasts with the small advances on security benchmarking, which has only sparsely been studied in the past. his thesis discusses the security benchmarking problem and main characteristics, particularly comparing these with other successful benchmarking initiatives, like performance and dependability benchmarking. Based on this analysis, a general framework for security benchmarking is proposed. This framework, suitable for most types of software systems and application domains, includes two main phases: security qualification and trustworthiness benchmarking. Security qualification is a process designed to evaluate the most obvious and identifiable security aspects of the system, dividing the evaluated targets in acceptable or unacceptable, given the specific security requirements of the application domain. Trustworthiness benchmarking, on the other hand, consists of an evaluation process that is applied over the qualified targets to estimate the probability of the existence of hidden or hard to detect security issues in a system (the main goal is to cope with the uncertainties related to security aspects). The framework is thoroughly demonstrated and evaluated in the context of transactional systems, which can be divided in two parts: the infrastructure and the business applications. As these parts have significantly different security goals, the framework is used to develop methodologies and approaches that fit their specific characteristics. First, the thesis proposes a security benchmark for transactional systems infrastructures and describes, discusses and justifies all the steps of the process. The benchmark is applied to four distinct real infrastructures, and the results of the assessment are thoroughly analyzed. Still in the context of transactional systems infrastructures, the thesis also addresses the problem of the selecting software components. This is complex as evaluating the security of an infrastructure cannot be done before deployment. The proposed tool, aimed at helping in the selection of basic software packages to support the infrastructure, is used to evaluate seven different software packages, representative alternatives for the deployment of real infrastructures. Finally, the thesis discusses the problem of designing trustworthiness benchmarks for business applications, focusing specifically on the case of web applications. First, a benchmarking approach based on static code analysis tools is proposed. Several experiments are presented to evaluate the effectiveness of the proposed metrics, including a representative experiment where the challenge was the selection of the most secure application among a set of seven web forums. Based on the analysis of the limitations of such approach, a generic approach for the definition of trustworthiness benchmarks for web applications is defined.
Hoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texto completo da fonteRaybourn, Tracey. "Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions". Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Texto completo da fonteHarmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Texto completo da fonteDawson, Alan Robert. "Exploring Strategies for Implementing Information Security Training and Employee Compliance Practices". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7794.
Texto completo da fonteCornejo-Ramirez, Mario. "Security for the cloud". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Texto completo da fonteCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
Johnson, Kenneth Tyrone. "The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.
Texto completo da fonteGutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Texto completo da fonteKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance". ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Texto completo da fontePavlou, Kyriacos Eleftheriou. "Database Forensics in the Service of Information Accountability". Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Texto completo da fonteBoyer, Edward D. "Understanding Usability-related Information Security Failures in a Healthcare Context". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/13.
Texto completo da fontePeters, Timothy M. "DEFY: A Deniable File System for Flash Memory". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1230.
Texto completo da fonteGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Texto completo da fonteSheinidashtegol, Pezhman. "Impact of DDoS Attack on the Three Common HypervisorS(Xen, KVM, Virtual Box)". TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1646.
Texto completo da fonteBahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Texto completo da fontePh. D.
Harrell, Martha Nanette. "Factors impacting information security noncompliance when completing job tasks". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/21.
Texto completo da fonteBetz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents". NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Texto completo da fonteAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Texto completo da fonteBrobliauskas, Žilvinas. "Reliacinių duomenų bazių saugumo modelio tyrimas". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090828_133828-02790.
Texto completo da fonteThe multilateral security model of relational databases is analyzed in master thesis of Žilvinas Brobliauskas. The results of research includes: the formulated requirements for multilateral security model of relational databases, proposed model, which allows range queries and aggregation functions over encrypted data without decrypting them at RDBMS level, and determined advantages and disadvantages of it. The program which realizes proposed model is given as proof of concept.
Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Texto completo da fonteTwisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.
Texto completo da fonteEllithorpe, James O. "The Role and Impact of Cyber Security Mentoring". Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Texto completo da fonteBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Texto completo da fonteTyler, Lamonte Bryant. "Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.
Texto completo da fonteKamin, Daud Alyas. "Exploring Security, Privacy, and Reliability Strategies to Enable the Adoption of IoT". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4382.
Texto completo da fonteMathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Texto completo da fonteMiller, Nathan D. "Adapting the Skyline Operator in the NetFPGA Platform". Youngstown State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1369586333.
Texto completo da fonteKumka, David Harold. "Quantifying Performance Costs of Database Fine-Grained Access Control". NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Texto completo da fonteHenning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.
Texto completo da fonteZadig, Sean M. "Understanding the Impact of Hacker Innovation upon IS Security Countermeasures". NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/976.
Texto completo da fonteLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Texto completo da fonteDavis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Texto completo da fonteRodriguez, Julio C. "Public Servants' Perceptions of the Cybersecurity Posture of the Local Government in Puerto Rico". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6370.
Texto completo da fonteNguyen, Huy Manh. "MABIC: Mobile Application Builder for Interactive Communication". TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1747.
Texto completo da fonteAnye, Ernest Tamanji. "Factors Affecting Employee Intentions to Comply With Password Policies". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6965.
Texto completo da fonteJia, Hao. "A web application for Medasolution Healthcare Company customer service system". CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2612.
Texto completo da fonteCallahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks". ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Texto completo da fonteAbou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)". Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Texto completo da fonteThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN