Dissertationen zum Thema „Software protection. Computer software“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Software protection. Computer software" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Rush, Andrea Friedman. „Legal protection of computer software in Canada“. Thesis, University of Ottawa (Canada), 1985. http://hdl.handle.net/10393/4750.
Der volle Inhalt der QuelleFragkos, Georgios. „An event-trace language for software decoys“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.
Der volle Inhalt der QuelleThesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
Volynkin, Alexander S. „Advanced methods for detection of malicious software“. Diss., Online access via UMI:, 2007.
Den vollen Inhalt der Quelle findenGarren, Scott L. (Scott Leland). „Copyright protection of computer software : history, politics, and technology“. Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/28007.
Der volle Inhalt der QuelleOstrovsky, Rafail. „Software protection and simulation on oblivious RAMs“. Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/103684.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 71-72).
by Rafail M. Ostrovsky.
Ph.D.
Råman, Jari. „Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /“. Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.
Der volle Inhalt der QuelleEverett, Christopher E. „Fundamentals of software patent protection at a university“. Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.
Der volle Inhalt der QuelleLai, Stanley. „The copyright protection of computer software in the United Kingdom“. Thesis, University of Cambridge, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413087.
Der volle Inhalt der QuelleWoo, Yan. „A dynamic integrity verification scheme for tamper-resistance software“. Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.
Der volle Inhalt der QuelleWoo, Yan, und 胡昕. „A dynamic integrity verification scheme for tamper-resistancesoftware“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.
Der volle Inhalt der QuellePeng, Xiaohui. „Copyright protection of computer software in the People's Republic of China conforming to international practice /“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ39220.pdf.
Der volle Inhalt der QuelleKarjiker, Sadulla. „Open-source software and the rationale for copyright protection of computer programs“. Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.
Der volle Inhalt der QuelleENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open-source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software. This development has made it necessary to re-evaluate the rationale for copyright protection of computer programs, and determine whether the continued protection of computer programs is justifiable. This study seeks to first establish a coherent theoretical justification for copyright protection, which it is submitted should be an economic justification, rather than a moral justification. The legal analysis in this work seeks to establish whether the copyright protection of computer programs is consistent with the economic justification for copyright protection. In particular, the analysis focuses on the current scope of copyright protection, and seeks to establish whether such protection is excessive, stifling creativity and innovation, and, thus, imposing too high a social cost. It is contended that copyright doctrine has generally sought to minimise these costs, and that current scope of copyright protection of computer programs leaves enough creative room for the production of new software. Despite the fact that the effect of open-source software licences is that authors are unable to earn the direct financial rewards which copyright enables authors to earn as an incentive to create such software, their authors continue to have financial incentives to create such software. Commercial firms who invest in open-source software do so because they seek to provide financially-rewarding related services in respect of software, or because it serves to promote sales in their complementary products. Similarly, the participation of individual computer programmers is largely consistent with the standard economic theories relating to labour markets and the private provision of public goods. Individuals are principally motivated by economic motives, such as career concerns. Copyright protection gives participants the choice to opt for the direct financial rewards which its proprietary protection enables, or the more indirect financial rewards of open-source software development. It is submitted within this research that rather than undermining the rationale for copyright protection of computer programs, the development of open-source software has illustrated that copyright protection allows for the emergence of alternative business models, which may be more economically advantageous to authors.
AFRIKAANSE OPSOMMING: Die rasionaal agter outeursregbeskerming wat deur die reg verleen word is gebasseer op 'n behoefte om die skepping van werke wat sosiaal voordelig geag word te bevorder. Outeursreg verleen aan outeurs direkte finansiële vergoeding vir hul inspanning deur die vestiging van eiendomsreg oor hul werke. Dus, outeursreg voorsien outeurs van die nodige insentiewe om sulke werke te skep. Sedert die begindae van kommersiële sagteware ontwikkeling, is outeursregbeskerming uitgebrei om aan rekenaarprogramme sulke beskerming te bied. Deur die bied van outeursregbeskerming word daar aangeneem dat die ontwikkeling van rekenaarprogramme aangemoedig word en dat sonder die genoemde beskerming programme nie geproduseer sal word tot in 'n mate benodig deur die samelewing nie. Onlangs egter, is daar 'n grootskaalse ontwikkeling van oopbronsagteware opgemerk. Hierdie sagteware word onder ruime terme gelisensieer en gee aan gebruikers die reg om die genoemde sagteware te gebruik, te wysig en vrylik te versprei. Deur sulke terme van lisensiëring aan te neem word outeurs verhoed om vanaf lisensiehouers 'n fooi te vorder vir die toestemming om die sagteware te gebruik. Outeursreg neem aan dat hierdie vergoeding die basis vorm waarom outeurs sulke sagteware ontwikkel. Hierdie ontwikkeling maak dit nodig om die rasionaal agter outeursregbeskerming van rekenaarprogramme te her-evalueer en ook om vas te stel of die volgehoue beskerming van rekenaarprogramme regverdigbaar is. Hierdie studie poog om, eerstens, 'n samehangende teoretiese regverdiging vir outeursreg te vestig. Daar word aan die hand gedoen dat hierdie beskerming 'n ekonomiese, eerder as 'n morele regverdiging as grondslag moet hê. Die regsontleding vervat in hierdie werk poog om vas te stel of die outeursregbeskerming wat aan rekenaarprogramme verleen word in lyn is met die ekonomiese regverdiging van outeursregbeskerming. Die analise fokus in besonder op die huidige bestek van outeursregbeskerming en poog om vas te stel of sodanige beskerming oormatig is, of dit kreatiwiteit en innovasie onderdruk en derhalwe te hoë sosiale koste tot gevolg het. Daar word geargumenteer dat outeursreg in die algemeen poog om sosiale koste te verlaag en dat die huidige omvang van outeursregbeskerming van rekenaarprogramme voldoende kreatiewe ruimte vir die ontwikkeling van nuwe sagteware laat. Die effek van oopbronsagteware is dat outeurs nie in staat is om direkte finansiële vergoeding te verdien, wat as insentief gesien word vir die ontwikkeling van sagteware, nie. Ten spyte hiervan is daar steeds voldoende finansiële insentiewe om sodanige sagteware te ontwikkel. Kommersiële firmas belê in oopbronsagteware om finansiëel lonende verwante dienste ten opsigte van sagteware te voorsien. Dit kan ook dien om verkope in hul onderskeie aanvullende produkte te bevorder. Eweweens is die deelname van individuele rekenaarprogrameerders oorwegend in lyn met die standaard ekonomiese teoriëe ten opsigte van die arbeidsmark en die privaat voorsiening van openbare goedere. Individue word gemotiveer deur ekonomiese motiewe, soos byvoorbeeld oorwegings wat verband hou met hul loopbane. Outeursregbeskerming bied aan deelnemers die keuse om voordeel te trek uit die direkte finansiële vergoeding wat moontlik gemaak word deur outeursregbeskerming of uit die meer indirekte finansiële vergoeding gebied deur die ontwikkeling van oopbronsagteware. In hierdie navorsing word daar geargumenteer dat die ontwikkeling van oopbronsagteware geillustreer het dat outeursregbeskerming die onstaan van alternatiewe besigheidsmodelle toelaat wat ekonomies meer voordelig is vir outeurs in plaas daarvan dat dit die rasionaal vir die outeursregbeskerming van rekenaarprogramme ondermyn.
Tevis, Jay-Evan J. Hamilton John A. „Automatic detection of software security vulnerabilities in executable program files“. Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.
Der volle Inhalt der QuelleAravalli, SaiKrishna. „Some Novice methods for Software Protection with Obfuscation“. ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/479.
Der volle Inhalt der QuelleLaw, Greg. „A new protection model for component-based operating systems“. Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390950.
Der volle Inhalt der QuelleLarsson, Tobias, und Niklas Lindén. „Blocking Privacy-Invasive Software Using a Specialized Reputation System“. Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4521.
Der volle Inhalt der QuelleBirkenfeld, Daniela H. „The protection of computer software : a comparative study of the American and German law“. Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65509.
Der volle Inhalt der QuelleFatema, Kaniz. „Adding privacy protection to policy based authorisation systems“. Thesis, University of Kent, 2013. https://kar.kent.ac.uk/47905/.
Der volle Inhalt der QuelleZhang, Guo Ying. „Three essays on managing information systems security : patch management, learning dynamics, and security software market /“. Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/8773.
Der volle Inhalt der QuelleSkandylas, Charilaos. „Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems“. Licentiate thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99109.
Der volle Inhalt der QuelleAl, Zaidi Mazin M. „Cyber security behavioural intentions for trade secret protection“. Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.
Der volle Inhalt der QuelleMellstrand, Per. „Protecting Software Execution by Dynamic Environment Hardening“. Licentiate thesis, Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/904bf1276b462168c1257115004309ff?OpenDocument.
Der volle Inhalt der QuelleAhmad, Saghir. „Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /“. Oslo : Faculty of Law, Universitetet i Oslo, 2008. http://www.duo.uio.no/publ/jus/2008/87514/87514.pdf.
Der volle Inhalt der QuellePaulo, Luis Gonzaga de. „Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development“. Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.
Der volle Inhalt der QuelleThe increasingly wide and intense use of mobile devices - whose processing and storage capacity grows almost overcoming the desktops - exposes greatly issues relating to information security in this environment. This is a worrying fact. However, the models currently found in the literature and used by software industry in developing mobile applications with the highest information security requirements are not yet answering users’ needs for more security, and may be improved adding specific methods or techniques, sometimes already used in desktop - or not mobile ones - applications development. This work proposes to insert information security approach early in the software development life cycle using threats and vulnerabilities study, the early application of abuse case - also called misuse cases, the risk analysis, the risk based security test and the use of attack machines in the development process. To reach the research goal, this work analyzed usual models used on SDLC from the information security point of view, and presents a new approach thru the use of a security driven development complementary model. The work also presents some templates and uses a case study for apply the concepts and evaluate the main contributions discussed in the text, also as the preliminary results obtained on the research.
Arancibia, Rafael. „Intellectual Property Protection for Computer Software: A Comparative Analysis of the United States and Japanese Intellectual Property Regimes“. Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/9685.
Der volle Inhalt der QuelleMaster of Arts
Mellstrand, Per. „Protection of System Layer Affordances“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4212.
Der volle Inhalt der QuelleTele: 070-6470393 eller 0457-79875
Forsyth, Guy, und N/A. „A minimalist sui generis legislative proposal for the application of common law principles to the protection of computer software“. University of Canberra. Law, 1998. http://erl.canberra.edu.au./public/adt-AUC20090714.142532.
Der volle Inhalt der QuelleTarhan, Faik Aras. „Distance Adaptive Shared Path Protection for Elastic Optical Networks under Dynamic Traffic“. Thesis, KTH, Programvaruteknik och Datorsystem, SCS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141703.
Der volle Inhalt der QuelleGalvez-Cruz, Dora Carmen. „An environment for protecting the privacy of e-shoppers“. Thesis, University of Glasgow, 2009. http://theses.gla.ac.uk/590/.
Der volle Inhalt der QuelleCavalcante, Gabriel Dieterich. „Detecção e recuperação de intrusão com uso de controle de versão“. [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275813.
Der volle Inhalt der QuelleDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-16T05:27:31Z (GMT). No. of bitstreams: 1 Cavalcante_GabrielDieterich_M.pdf: 3073328 bytes, checksum: aeb145421a7f9c0c3d3ac872eb9ac054 (MD5) Previous issue date: 2010
Resumo: Existe uma grande quantidade de configurações presentes em sistemas atuais e gerir essas configurações é um trabalho árduo para qualquer administrador de sistema. Inúmeras configurações podem ser definidas para uma só máquina e as combinações entre elas implicam de forma significativa no seu desempenho. A partir do momento que um sistema em pleno funcionamento pára de funcionar, algo em sua estrutura pode ter mudado. Este cenário é comum no processo de desenvolvimento de software onde o código fonte pode deixar de compilar ou ainda uma funcionalidade pode se perder. Controladores de versão são usados para reverter o estado do código para uma data anterior, solucionando o problema. Verificadores de Integridade são utilizados para detectar estas mudanças, porém não possuem mecanismos específicos para recuperação. Este estudo propõe e implementa uma arquitetura integrada que combina verificação de integridade e mecanismos de recuperação. Foram executados testes para determinar a sobrecarga total deste método, além de estudos de caso para verificar a sua eficiência de recuperação
Abstract: Current computer systems have a huge number of configurations that are hard to manage. The combinations of system configurations can impact on performance and behavior. From the moment that a system stops working correctly it is remarkable that something has changed. That is in common in software development, where changes made by the programmer may result in some features no longer working or the project not compiling anymore. Revision control systems can recover a previous state of the source code through revision mechanisms. Integrity checking is used to catch file modifications, however this technique does nothing toward recovering those files. This study proposes and implements an integrated architecture that combines integrity checking and restoring mechanisms. Tests were executed in order to measure the load imposed by the solution. In addition, analysis of three case studies shows the efficiency of the adopted solution
Mestrado
Segurança de Computadores
Francisco, Andreia Marlene Correia. „A proteção jurídica de software na Europa: um percurso legislativo controverso“. Dissertação, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.
Der volle Inhalt der QuelleLaw
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
Francisco, Andreia Marlene Correia. „A proteção jurídica de software na Europa: um percurso legislativo controverso“. Master's thesis, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.
Der volle Inhalt der QuelleLaw
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
Eksteen, Lambertus Lochner. „An investigation into source code escrow as a controlling measure for operational risk contained in business critical software“. Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/95629.
Der volle Inhalt der QuelleThis research report outlines corporate governance and information technology risk management frameworks and the use of software escrow within a holistic enterprise risk management strategy to maintain business continuity. Available risk mitigation tools and frameworks were analysed including the use of software escrow as an information technology risk mitigation tool and continuity instrument. The primary researched problem relates to how organisations can ensure business continuity through managing the risks surrounding business-critical software applications. Software escrow was identified in the literature review as a risk management tool used to mitigate operational risks residing in the licencing of mission-critical software applications. The primary research question is: “How can source code escrow contribute towards business continuity by limiting risks contained in licensed business critical software applications?” This study found that an escrow agreement ensures an end-user access to licenced mission-critical intellectual property in the event of the owner’s insolvency, acquisition or breach of maintenance agreements and thereby ensures continuity. The following secondary research questions were also answered: “What types of operational risks will be minimised using software escrow?” and “What constitutes an effective source code agreement in South Africa?” The research identified that the main driver for escrow was operational risk of a mission-critical system failure due to maintenance and upgrades not taking place. The reasons identified included insolvency of the software supplier, acquisition of the supplier, loss of key resources (developers) and breach of maintenance or development agreements. The research also identified some limitations to the application of escrow and the reasons for some agreements not being executed. Key escrow contract quality criteria were identified which ensure an effective agreement under South African law. The following essential quality criteria were found to improve the efficiency of execution of the escrow contract: - Frequency and quality of deposits; - Deposit verification to ensure usability of material post release; and - Well-defined release trigger events to avoid legal disputes regarding what constitutes a release. Case studies highlighted the main risks that drive the creation of escrow agreements and identified limitations to the execution of some escrow agreements. The software end-user operational risks mitigated by the use of escrow included: - Continued use of the software despite vendor bankruptcy; - Reducing the dependency on the supplier for maintenance and support of the software Safeguarding critical business processes; and - Return on investment (software implementation, hardware and training of staff). It was concluded that, despite the legal and practical complexities concerned with escrow, it remains the best instrument to ensure continuity when relying on licensed intellectual property used for business-critical functions and processes. Software escrow is therefore a vital component of a well-formulated license agreement to ensure access to mission-critical technology (including all related intellectual property) under pre-defined conditions of release to the end-user (licensee). In the event of a release, the escrow agent gives the end-user access to the deposited source code and related materials for the purposes of business continuity only and in no way affects the ownership rights of the supplier/owner.
Chapman, Erin Elizabeth. „A Survey and Analysis of Solutions to the Oblivious Memory Access Problem“. PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/891.
Der volle Inhalt der QuelleSeotsanyana, Motlatsi. „Formal specification and verification of safety interlock systems : a comparative case study /“. Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.
Der volle Inhalt der QuelleMurray, Jessica L. „An exfiltration subversion demonstration“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
Jiang, Jing Jing. „Self-synchronization and LUT based client side digital audio watermarking“. Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550676.
Der volle Inhalt der QuelleLouis, Christophe. „La protection des logiciels : une solution pour ordinateurs personnels utilisant la carte a micro-calculateur“. Paris 6, 1988. http://www.theses.fr/1988PA066373.
Der volle Inhalt der QuelleMohan, Apurva. „Design and implementation of an attribute-based authorization management system“. Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.
Der volle Inhalt der QuelleHassan, Waqas. „Video analytics for security systems“. Thesis, University of Sussex, 2013. http://sro.sussex.ac.uk/id/eprint/43406/.
Der volle Inhalt der QuelleHakola, Matthew B. „An exploratory analysis of convoy protection using agent-based simulation“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHakola.pdf.
Der volle Inhalt der QuelleMa, Wenjun. „AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /“. unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Der volle Inhalt der QuelleTitle from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Zhang, Tao. „RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery“. Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-08042006-122745/.
Der volle Inhalt der QuelleAhamad, Mustaque, Committee Member ; Pande, Santosh, Committee Chair ; Lee, Wenke, Committee Member ; Schwan, Karsten, Committee Member ; Yang, Jun, Committee Member.
Zhang, Kun. „Dynamic pointer tracking and its applications“. Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33936.
Der volle Inhalt der QuelleCoetzee, Dirk. „Visualisation of PF firewall logs using open source“. Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018552.
Der volle Inhalt der QuelleSchmidt, Phillip. „Protection of Software in China“. St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01653856002/$FILE/01653856002.pdf.
Der volle Inhalt der QuellePei, Breivold Hongyu. „Software Architecture Evolution and Software Evolvability“. Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-4540.
Der volle Inhalt der QuelleSoftware is characterized by inevitable changes and increasing complexity, which in turn may lead to huge costs unless rigorously taking into account change accommodations. This is in particular true for long-lived systems. For such systems, there is a need to address evolvability explicitly during the entire lifecycle, carry out software evolution efficiently and reliably, and prolong the productive lifetime of the software systems.
In this thesis, we study evolution of software architecture and investigate ways to support this evolution. The central theme of the thesis is how to analyze software evolvability, i.e. a system’s ability to easily accommodate changes. We focus on several particular aspects: (i) what software characteristics are necessary to constitute an evolvable software system; (ii) how to assess evolvability in a systematic manner; (iii) what impacts need to be considered given a certain change stimulus that results in potential requirements the software architecture needs to adapt to, e.g. ever-changing business requirements and advances of technology.
To improve the capability in being able to on forehand understand and analyze systematically the impact of a change stimulus, we introduce a software evolvability model, in which subcharacteristics of software evolvability and corresponding measuring attributes are identified. In addition, a further study of one particular measuring attribute, i.e. modularity, is performed through a dependency analysis case study.
We introduce a method for analyzing software evolvability at the architecture level. This is to ensure that the implications of the potential improvement strategies and evolution path of the software architecture are analyzed with respect to the evolvability subcharacteristics. This method is proposed and piloted in an industrial setting.
The fact that change stimuli come from both technical and business perspectives spawns two aspects that we also look into in this research, i.e. to respectively investigate the impacts of technology-type and business-type of change stimuli.
Wallace, Julia. „Quantum computer software“. Thesis, University of Exeter, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369975.
Der volle Inhalt der QuelleShvadlenko, Irina. „Evaluation of Environmental Education Software “Protecting Your Environment”“. Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1108407292.
Der volle Inhalt der QuelleSherwood, Patricia Ann. „Inspections : software development process for building defect free software applied in a small-scale software development environment /“. Online version of thesis, 1990. http://hdl.handle.net/1850/10598.
Der volle Inhalt der Quelle