Дисертації з теми "ENHANCING SECURITY"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "ENHANCING SECURITY".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.
Повний текст джерелаYue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.
Повний текст джерелаH, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.
Повний текст джерелаThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.
Повний текст джерелаLiu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.
Повний текст джерелаKadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.
Повний текст джерелаZigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Повний текст джерелаFekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Повний текст джерелаThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Повний текст джерелаArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.
Повний текст джерелаBeygo, Ömer Kerem, and Cihan Eraslan. "Enhancing Security and Usability Features of NFC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5620.
Повний текст джерелаAssora, Mohammed. "Enhancing the Security of web commerce transactions." Thesis, Anglia Ruskin University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.478891.
Повний текст джерелаKhu-Smith, Vorpranee. "Enhancing the security of electronic commerce transactions." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406487.
Повний текст джерелаAlsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.
Повний текст джерелаMalan, LP, and Rooyen EJ van. "Community partnerships- enhancing municipal food security policy." Journal of Public Administration, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001174.
Повний текст джерелаKrupp, Brian Michael. "Enhancing Security And Privacy For Mobile Systems." Cleveland State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=csu1432156543.
Повний текст джерелаHussein, Nesrin. "Enhancing Software Security through Modeling Attacker Profiles." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409.
Повний текст джерелаSmedlund, Kristoffer. "Enhancing the security of an audit log." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-372076.
Повний текст джерелаAl-Hamar, Aisha. "Enhancing information security in organisations in Qatar." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33541.
Повний текст джерелаLi, Yue. "On Enhancing Security of Password-Based Authentication." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1563898928.
Повний текст джерелаFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Повний текст джерелаZaaba, Zarul Fitri. "Enhancing usability using automated security interface adaptation (ASIA)." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3025.
Повний текст джерелаAl-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.
Повний текст джерелаJokhio, Imran Ali. "A scalable scheme for enhancing EPC network security." Thesis, University of Leeds, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530830.
Повний текст джерелаCooney, Geoffrey T. (Geoffrey Thomas) 1980. "Optimizing neural networks for enhancing air traffic security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28382.
Повний текст джерелаIncludes bibliographical references (leaves 81-83).
This thesis contains the process and results related to optimizing a neural network to predict future positions of airplanes in the vicinity of airports. These predicted positions are then used to calculate future separation distances between pairs of airplanes. The predicted values of the separation distance are used to ensure adequate distances between adjacent aircrafts in the air and, if necessary, to create early warning alarms to alert air traffic control tower personnel about planes that may pass too near each other in the immediate future. The thesis covers three areas of work on this topic. The first section involves optimizing a neural network for Chicago O'Hare Airport. The second is related to gathering data on the performance of this network in different scenarios. These data can be used to determine if the different days/runways have different characteristics. The final phase of this document describes how to generalize the process used to build an optimized neural network for Chicago O'Hare airport in order to provide the capability to easily recreate the process for another airport.
by Geoffrey T. Cooney.
M.Eng.
Cadar, Cristian. "Enhancing availability and security through boundless memory blocks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33123.
Повний текст джерелаIncludes bibliographical references (leaves 49-52).
We present a new technique, boundless memory blocks, that automatically eliminates buffer overflow errors, enabling programs to continue to execute through memory errors without memory corruption. Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other data structures. The standard way to exploit a buffer overflow vulnerability involves a request that is too large for the buffer intended to hold it. The buffer overflow error causes the program to write part of the request beyond the bounds of the buffer, corrupting the address space of the program and causing the program to execute injected code contained in the request. Our boundless memory blocks compiler inserts checks that dynamically detect all out of bounds accesses. When it detects an out of bounds write, it stores the value away in a hash. Our compiler can then return the stored value as the result of an out of bounds read to that address. In the case of uninitialized addresses, our compiler simply returns a predefined value. We have acquired several widely used open source applications (Apache, Sendmail, Pine, Mutt, and Midnight Commander). With standard compilers, all of these applications are vulnerable to buffer overflow attacks as documented at security tracking web sites. Instead, our compiler enables the applications to execute successfully through buffer overflow attacks to continue to correctly service user requests without security vulnerabilities. We have also found that only one application contains uninitialized reads, which means that in most cases, the net effect of our compiler is to (conceptually) give each allocated memory block unbounded size and to eliminate out of bounds accesses as a programming error.
by Cristian Cadar.
M.Eng.
Frantz, Miles Eugene. "Enhancing CryptoGuard's Deployability for Continuous Software Security Scanning." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98521.
Повний текст джерелаMaster of Science
Throughout the rise of software development, there has been an increase in development speed with developers embracing methodologies that use higher rates of changes, such as Agile. Since Agile naturally addresses "problems of rapid change", this also increases the likelihood of insecure and vulnerable coding practices. Though consumers depend on various public applications, there can still be failures throughout the development process in applications such as the Iowa caucus application. It was determined the Iowa cacus application development teams' repository credentials (API key) was left within the application itself. API keys provide the credential to be able to directly interact with server systems, and if left unguarded can be easily exploited. Since the Iowa cacus application was released publicly, malicious actors (other people looking to exploit the application) may have already discovered this credential. Within our team we have created CryptoGuard, a program to analyze applications to detect cryptographic issues such as an API key. Creating it with scalability in mind, it was created to be able to scan enterprise code at a reasonable speed. To ensure its use within companies, we have been working on extending and enhancing the work to the current needs of Java developers. Verifying the current Java landscape, we investigated three different companies and their developer ecosystem surveys that are publicly available. Amongst these companies are; JetBrains, known for their Integrated Development Environments (IDE, or application to help write applications) and their own programming language, Snyk, known for their public security platform and anti-virus capability, and Jakarta EE, which is the new platform for the enterprise version of Java. Throughout these surveys, we accumulate more than 50,000 developers' responses, spanning various countries, company experience, and ages. With their responses amalgamated, we enhance CryptoGuard to be available to as many developers and their requests as possible.First, CryptoGuard is enhanced to scan a projects source code. After that, ensuring our project is hosted by a cloud service, we actively are extending our project to the Security Assurance Marketplace (SWAMP). Funded by the DHS, SWAMP not only supplies a public cloud for developers to use, but a local download option to scan a program within the user's own computer. Next, we create a plugin for two most used build tools, Gradle and Maven. Then to ensure CryptoGuard can be have reactive aide, CryptoSoule is created to aide minimal interface aide. Finally utilizing a live documentation service, an open source documentation website was created to provide working examples to the community.
Al-Shareeda, Sarah Yaseen Abdulrazzaq. "Enhancing Security, Privacy, and Efficiency of Vehicular Networks." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu150032914711847.
Повний текст джерелаVan, Balen Nicolas Jorge. "Enhancing Usability and Security through Alternative Authentication Methods." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1516639579.
Повний текст джерелаYi, Shanhe. "Enhancing Usability, Security, and Performance in Mobile Computing." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1530192793.
Повний текст джерелаLiyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.
Повний текст джерелаTiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
Saed, Mustafa. "Techniques for Enhancing the Security of Future Smart Grids." Thesis, University of Detroit Mercy, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10793626.
Повний текст джерелаThe smart grid is a new technology that uses new and sophisticated techniques for electrical transmission and distribution in order to provide excellent electrical service to customers, and allow them to manage their electricity consumption in a two-way communication. The idea of the “Smart Grid” was most likely invented by researchers and engineers at the U.S. Department of Energy, who were concerned with increasing the level of functionalities and intelligence of the contemporary electrical grid. Some of these functionalities typically include knowledge about generation, the ability to automate substations, and methods of communicating with consumers.
Improvements in the performance of network and smart grid systems have significantly enriched their effectiveness and consistency. Unfortunately, these advances also pose new threats when the systems are not equipped with the proper security measures resulting in use safety issues, such as a disconnection of electrical power source. Even though addressing the security concerns of a massive and powerful system can be overwhelming, appropriate installation of electrical equipment can prevent cyber-attacks from harming essential functions.
The most effective security measures can be employed by every component of the smart grid communications network through understanding practices and principles found in similar systems and industries.
This dissertation leverages the work that has been done with regards to the security of the smart grid. Protecting the two-way direct and indirect communication of smart meters with collectors through the introduction of the three cryptographic protocols based on PKI will be emphasized. The security of indirect communication is more difficult in comparison to the direct one as readings (measurements) have to travel through other smart meters before reaching the collector. The introduced schemes satisfy the security requirements; confidentiality, integrity, and nonrepudiation. Furthermore, a risk analysis of the three designed security protocols for smart meters in smart grid networks will be performed. Finally, a technique for verifying the security of the three developed security protocols between smart meters, the central gateway (collector), and supervisory nodes (substation) will be presented. The verification process of these protocols relies on the CryptoVerif tool using two phases. In the first phase, the protocols were manually investigated for security flaws, inconsistencies, and incorrect usage of cryptographic primitives. During the second phase, the protocols were analyzed using the CryptoVerif, an automated formal method-based analysis tool. Several efficiency improvements are presented as an outcome of these analyses. Furthermore, the future work will concentrate on simulating and integrating the three designed protocols, and securing the data reading (Smart Meter-Collector-Substation/Utility) before uploading it to the smart grid cloud by the public utility. In addition, a new security technique to secure the smart grid cloud will be discussed.
Dresser, Eric L. (Eric Lane). "The effectiveness and economic impact of enhancing container security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33424.
Повний текст джерелаIncludes bibliographical references (p. 96-101).
Over the past few decades, international containerized shipping has evolved to become the main artery of global trade, providing both convenient and inexpensive access to goods from markets around the world. Yet the very size and efficiencies that have made container shipping such an attractive means of transport have also created a system that is highly vulnerable to terrorist exploitation. This paper outlines the current initiatives taken by both the public and private sector to address the security vulnerabilities in the container industry. The solution targets three main areas for, security: documentation/information, physical security, and inspections. The technology utilized to improve the physical security of the container can also be used to track shipments and secure the container from pilferage. This generates a win-win relationship between enhancing container security while improving supply chain information and control. An economic model is used to demonstrate the cost savings and cost avoidance from the information and control provided by security technologies. The savings to shippers more than offsets the cost of implementing these technologies. This is a valuable approach to solving the problem of container security because it concurrently provides incentive to the private sector and protects global interests.
by Eric L. Dresser.
S.M.
Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Повний текст джерелаWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.
Повний текст джерелаLee, Danielle. "Enhancing national security by strengthening the legal immigration system." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLee_Danielle.pdf.
Повний текст джерелаThesis Advisor(s): Bach, Robert; Joyce, Nola. "December 2009." Description based on title screen as viewed on January 26, 2009. Author(s) subject terms: U.S. Citizenship and Immigration Services (USCIS), immigration, benefit, fraud, terrorism, border security, watch list, immigration reform. Includes bibliographical references (p. 83-91). Also available in print.
Bi, Ying. "Enhancing Physical-Layer Security in Wireless Powered Communication Networks." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16890.
Повний текст джерелаReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16379/1/Jason_Reid_Thesis.pdf.
Повний текст джерелаReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16379/.
Повний текст джерелаMiguel, Moneo Jorge. "An information security model based on trustworthiness for enhancing security in on-line collaborative learning." Doctoral thesis, Universitat Oberta de Catalunya, 2015. http://hdl.handle.net/10803/399030.
Повний текст джерелаEl principal objetivo de esta tesis es incorporar propiedades y servicios de la seguridad en sistemas de información en el aprendizaje colaborativo en línea, siguiendo un modelo funcional basado en la valoración y predicción de la confianza. Esta tesis establece como punto de partida el diseño de una solución de seguridad innovadora, basada en una metodología propia para ofrecer a los diseñadores y gestores del e-learning las líneas maestras para incorporar medidas de seguridad en el aprendizaje colaborativo en línea. Estas guías cubren todos los aspectos sobre el diseño y la gestión que hay que considerar en los procesos relativos al e-learning, entre otros el análisis de la seguridad, el diseño de actividades de aprendizaje, la detección de acciones anómalas o el procesamiento de datos sobre confianza. La temática de esta tesis tiene una naturaleza multidisciplinar y, a su vez, las diferentes disciplinas que la forman están íntimamente relacionadas. Las principales disciplinas tratadas en esta tesis son el aprendizaje colaborativo en línea, la seguridad en sistemas de información, los entornos virtuales de aprendizaje (EVA) y la valoración y predicción de la confianza. Teniendo en cuenta este ámbito de aplicación, el problema de garantizar la seguridad en los procesos de aprendizaje colaborativo en línea se resuelve con un modelo híbrido construido en base a soluciones funcionales y tecnológicas, concretamente modelado de la confianza y soluciones tecnológicas para la seguridad en sistemas de información.
This thesis' main goal is to incorporate information security properties and services into online collaborative learning using a functional approach based on trustworthiness assessment and prediction. As a result, this thesis aims to design an innovative security solution, based on methodological approaches, to provide e-learning designers and managers with guidelines for incorporating security into online collaborative learning. These guidelines include all processes involved in e-learning design and management, such as security analysis, learning activity design, detection of anomalous actions, trustworthiness data processing, and so on. The subject of this research is multidisciplinary in nature, with the different disciplines comprising it being closely related. The most significant ones are online collaborative learning, information security, learning management systems (LMS), and trustworthiness assessment and prediction models. Against this backdrop, the problem of securing collaborative online learning activities is tackled by a hybrid model based on functional and technological solutions, namely, trustworthiness modelling and information security technologies.
Nia, Ramadianti Putri Mganga, and Medard Charles. "Enhancing Information Security in Cloud Computing Services using SLA based metrics." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999.
Повний текст джерелаGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Повний текст джерелаMaster of Science
Feng, Yuhui. "Enhancing Efficiency of Beaconing in VANETs." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461253651.
Повний текст джерелаKANADE, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-01057728.
Повний текст джерелаKanade, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0022/document.
Повний текст джерелаSecuring information during its storage and transmission is an important and widely addressed issue. Generally, cryptographic techniques are used for information security. Cryptography requires long keys which need to be kept secret in order to protect the information. The drawback of cryptography is that these keys are not strongly linked to the user identity. In order to strengthen the link between the user's identity and his cryptographic keys, biometrics is combined with cryptography. In this thesis, we present various methods to combine biometrics with cryptography. With this combination, we also address the privacy issue of biometric systems: revocability, template diversity, and privacy protection are added to the biometric verification systems. Finally, we also present a protocol for generating and sharing biometrics based crypto-biometric session keys. These systems are evaluated on publicly available iris and face databases
Liu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.
Повний текст джерелаShepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.
Повний текст джерелаSpencer, David K. "Enhancing the European Union's development strategy in Afghanistan." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FSpencer.pdf.
Повний текст джерелаThesis Advisor(s): Spencer, David K.; Siegel, Scott N. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: European Union, Afghanistan, regional development strategy, sustainable economic growth, development coordination, private sector, European Commission, European Council, EU member states, value chain, ANDS, Afghanistan National Development Strategy, UNAMA, JCMB, Nangarhar Inc, Provincial Development Plan, PDP, Lisbon Treaty, NGO, super envoy, donors, mineral, natural resources. Includes bibliographical references (p. 143-158). Also available in print.
Vilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.
Повний текст джерелаThe SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this new SIM capabilities together with its pervasiveness and security can support the development and design of trust-based applications. It reviews the new trust possibilities based on the identity factor, connectivity and context-awareness sensors on the SIM. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.
Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.
Повний текст джерела