Dissertations / Theses on the topic 'Component Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Component Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textThesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Bond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.
Full textThe Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed.
The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The result of the evaluation is quantitative data, which can be presented with varying degrees of detail, reflecting the needs of the evaluator.
The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The evaluation method is focusing on technological components and is based on, but not limited to, the Security Functional Requirements (SFR) of the Common Criteria.
Sohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.
Full textThesis Advisor(s): Rollins, John ; Wollman, Lauren. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Immigration, Integration, Radicalization, Identity, International, U.S. Citizenship and Immigration Services (USCIS), Citizenship and Immigration Canada Includes bibliographical references (p. 79-89). Also available in print.
Ben, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.
Full textThe security of information systems are paramount in today’s life, especially with the growth of complex and highly interconnected computer systems. For instance, bank systems have the obligation to guarantee the integrity and confidentiality of their costumers accounts. The electronic voting, auctions and commerce also needs confidentiality and integrity preservation.However, security verification and its distributed implementation are heavy processes in general, advanced security skills are required since both security configuration and coding distributed systems are complex and error-prone. With the diverse security attacks leaded by the Internet advent, how can we be sure that computer systems that we are building do satisfy the intended security property?The security property that we investigate in this thesis is the noninterference, which is a global property that tracks sensitive information in the entire system and ensures confidentiality and integrity. Non-interference is expressed by the requirement that no information about secret data is leaked through the observation of public data variation. Such definition is more subtle than a basic specification of legitimate access for sensitive information, allowing to exploit and detect malfunctioning and malicious programs intrusions for sensitive data (e.g, Trojan horse that sends confidential data to untrusted users). However as a global property, the noninterference is hard to verify and implement.To this end, we propose a model-based design flow that ensures the noninterference property in an application software from its high-level model leading to decentralized secure implementation. We present the secureBIP framework that is an extension for the component-based model with multyparty interactions for security. Non-interference is guaranteed using two practical manners: (1) we annotate the entire variables and ports of the model and then according to a defined set of sufficient syntactic constraints we check the satisfaction of the property, (2) we partially annotate the model way and then by extracting its compositional dependency graphswe apply a synthesis algorithm that computes the less restrictive secure configuration of the model if it exists.Once the information flow security is established and non-interference is established on an high-level model of the system, we follow a practical automated method to build a secure distributed implementation. A set of transformations are applied on the abstract model to progressively transform it into low-level distributed models and finally to distributed implementation, while preserving information flow security. Model transformations replace high-level coordination using multiparty interactions by protocols using asynchronous Send/Receive message-passing. The distributedimplementation is therefore proven ”secure-by-construction” that is, the final code conforms to the desired security policy. To show the usability of our method, we apply and experiment it on real case studies and examples from distinct application domains
Tran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.
Full textThesis advisor(s): LuQi; Shing, Mantak. "September 2000." Includes bibliographical references (p. 63-65). Also available in print.
Sousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.
Full textThere are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified the requirements for an integrated command and control (C2) system that is able to conduct full-spectrum operations in the cyberspace environment. The most notable of that research revolves around the development and experimentation with the prototype system known as Cyber Command, Control and Information Operations System (C3IOS). C3IOS provides for a loose confederation of the cooperating systems with interaction between systems going through C2 interfaces. In this thesis, the authors introduce into C3IOS a means to support the commander's ability to take measured responses to coercive actions in a timely manner, specifically to facilitate the interaction between experts in the law of information conflict and information warriors responding to a cyber attack. The authors' research results in a set of use cases and requirements for the C2 understanding, planning, and deciding activities involved in such a capability, using Schmitt's analysis as an example.
Tran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.
Full textDementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.
Full textThesis Advisor(s): Michael, James B. Second Reader: Wingfield, Thomas C. ; Sarkesain, John F. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Cyberspace, Cyberspace Defense, Network Defense, Distributed Systems, Command and Control, Battle Management, Information Assurance, Situational Awareness. Includes bibliographical references (p. 73-77). Also available in print.
Kukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.
Full textFör varje organisation är det nödvändigt att skydda information från olika säkerhetshot. Att ha en effektiv säkerhetshantering är avgörande för att kunna skydda informationen. Denna process är komplex och många krav måste tillfredsställas. Problemet som detta examensarbete avser att lösa handlar om hur införandet av en assuransprocess kommer påverka Försvarsmakten. Denna process måste följas för att en lösning eller produkt ska godkännas till en specifik komponents säkerhetsnivå. Frågeställningen besvaras i första hand av en marknadsundersökning om säkerhetshantering. Olika säkerhetshanteringsstrategier undersöktes och de bästa säkerhetslösningar valdes. Lösningarna jämfördes därefter med de assuranskrav som anges i Försvarsmaktens KSF V3.1 (Krav på IT säkerhetsförmågor hos IT – system) som är den dokumentation som anger kraven för IT säkerhetsfunktioner i ett IT system. Lösningen som uppfyllde de flesta kraven valdes och modifierades för att uppfylla samtliga kraven. Slutligen rekommenderades en komponent assuransprocess, vilken skulle kunna användas för att avgöra vilken lösning eller produkt som skulle kunna användas samt på vilket sätt det skulle kunna användas. Möjligheten att införa sådana krav i förvärvet av vilken produkt eller tjänst det än gäller förser Försvarsmakten med garantier för att alla produkter eller tjänster är godkända enligt särskilda säkringsnivåer på samma sätt och därmed försäkras det svenska samhället att förfaranden inom svenska väpnade krafter dokumenteras samt skyddar landet och dess medborgare.
Säkerhetshantering, informationssäkerhet, autentisering, auktorisering, styrning, riskhantering, följsamhet, användaradministration
Peterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.
Full textBackground: The network-centric defense requires a method for securing vast dynamic distributed information systems. Currently, there are no efficient methods for establishing the level of IT security in vast dynamic distributed information systems.
Purpose: The target of this thesis was to design a method, capable of determining the level of IT security of vast dynamic component-based distributed information systems.
Method: The work was carried out by first defining concepts of IT security and distributed information systems and by reviewing basic measurement and modeling theory. Thereafter, previous evaluation methods aimed at determining the level of IT security of distributed information systems were reviewed. Last, by using the theoretic foundation and the ideas from reviewed efforts, a new evaluation method, aimed at determining the level of IT security of vast dynamic component-based distributed information systems, was developed.
Results: This thesis outlines a new method, CAESAR, capable of predicting the security level in parts of, or an entire, component-based distributed information system. The CAESAR method consists of a modeling technique and an evaluation algorithm. In addition, a Microsoft Windows compliant software, ROME, which allows the user to easily model and evaluate distributed systems using the CAESAR method, is made available.
Vorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.
Full textSubmitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
Elish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.
Full textPh. D.
Rempfer, Thomas L. "Anthrax vaccine as a component of the strategic national stockpile: a dilemma for Homeland Security." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FRempfer.pdf.
Full textThesis Advisor: Supinski, Stanley. Second Reader: Lynch, Dean. "December 2009." Description based on title screen as viewed on January 29, 2010. Author(s) subject terms: Anthrax Vaccine Adsorbed; AVA; BioThrax; Homeland Security; Strategic National Stockpile; biodefense; bioterrorism; biological warfare; Amerithrax; Anthrax Vaccine Immunization Program; AVIP; Gulf War Illness; Gulf War Syndrome; Investigational New Drug, IND; Experimental; Civilian Control of the Military, Presidential Study Directive; PSD; Presidential Policy Directive; PPD. Includes bibliographical references (p. 195-237). Also available in print.
Rich, Ronald P., and Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.
Full textApproved for public release; distribution is unlimited
A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.
Lieutenant, United States Navy
Lieutenant, United States Navy
Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Full textKaufman, Jason R. "Digital video watermarking using singular value decomposition and two-dimensional principal component analysis." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141855950.
Full textSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
Holmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.
Full textThesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
Steiner, Max [Verfasser], and Peter [Akademischer Betreuer] Liggesmeyer. "Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees / Max Steiner ; Betreuer: Peter Liggesmeyer." Kaiserslautern : Technische Universität Kaiserslautern, 2016. http://d-nb.info/1115183664/34.
Full textBo, Yibo. "Liquidity measurements and the return-liquidity relationship : empirical evidence from Germany, the UK, the US and China." Thesis, Brunel University, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.707764.
Full textLin, Jenglung. "The Implementation and Integration of the Interactive Markup Language to the Distributed Component Object Model Protocol in the Application of Distributed File System Security." NSUWorks, 1999. http://nsuworks.nova.edu/gscis_etd/671.
Full textSetréus, Johan. "Identifying critical components for system reliability in power transmission systems." Doctoral thesis, KTH, Elektroteknisk teori och konstruktion, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-40389.
Full textQC 20110920
Martinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.
Full textBlackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.
Full textApproved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
Schönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.
Full textCheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.
Full textAndersson, Richard. "Evaluation of the Security of Components in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2091.
Full textThis thesis suggests a security evaluation framework for distributed information systems, responsible for generating a system modelling technique and an evaluation method. The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The information system is modelled by dividing it into increasingly smaller parts, evaluate the separate parts and then build up the system “bottom up” by combining the components. Evaluated components are stored as reusable instances in a component library. The evaluation method is focusing on technological components and is based on the Security Functional Requirements (SFR) of the Common Criteria. The method consists of the following steps: (1) define several security values with different aspects, to get variable evaluations (2) change and establish the set of SFR to fit the thesis, (3) interpret evaluated security functions, and possibly translate them to CIA or PDR, (4) map characteristics from system components to SFR and (5) combine evaluated components into an evaluated subsystem. An ontology is used to, in a versatile and dynamic way, structure the taxonomy and relations of the system components, the security functions, the security values and the risk handling. It is also a step towards defining a common terminology for IT security.
Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.
Full textSchönefeld, Marc [Verfasser]. "Refactoring of security antipatterns in distributed Java components / von Marc Schönefeld." Bamberg : Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.
Full textYoussef, Lilia. "Construction de systèmes répartis sécurisés à base de composants." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00721746.
Full textNimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.
Full textTorri, Stephen A. Hamilton John A. "Generic reverse engineering architecture with compiler and compression classification components." Auburn, Ala, 2009. http://hdl.handle.net/10415/1583.
Full textDan, Yufang. "SECURITY AND SELF-HEALABILITY ENFORCEMENT OF DYNAMIC COMPONENTS IN A SERVICE-ORIENTED SYSTEM." Phd thesis, INSA de Lyon, 2014. http://tel.archives-ouvertes.fr/tel-00994833.
Full textMotyka, Matt. "Risk measurement of mortgage-backed security portfolios via principal components and regression analyses." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0429103-231210.
Full textKeywords: portfolio risk decomposition; principal components regression; principal components analysis; mortgage-backed securities. Includes bibliographical references (p. 88-89).
Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.
Full textTaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.
Full textMennie, David William. "An architecture to support dynamic composition of service components and its applicability to Internet security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/MQ57732.pdf.
Full textMennie, David William Carleton University Dissertation Engineering Systems and Computer. "An architecture to support dynamic composition of service components and its applicability to Internet security." Ottawa, 2000.
Find full textThakkar, Jatin. "Securing Cognitive Radios with a Policy Enforcer and Secure Inter-component Transport Mechanisms." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/34948.
Full textMaster of Science
Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Full textNowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
Huour, Aranya. "Components of Food Insecurity on a University Campus." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/876.
Full textKinkelin, Holger [Verfasser], Georg [Akademischer Betreuer] Carle, and Günter [Akademischer Betreuer] Schäfer. "Autonomous and Robust Components for Security in Network Domains / Holger Kinkelin. Gutachter: Georg Carle ; Günter Schäfer. Betreuer: Georg Carle." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1045345679/34.
Full textNasr, Allah Mounir. "Contrôle de flux d'information par utilisation conjointe d'analyse statique et dynamique accélérée matériellement." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0007.
Full textAs embedded systems are more and more present in our lives, it is necessary to protect the personal data stored in such systems. Application developers can unintentionally introduce vulnerabilities that can be exploited by attackers to compromise the confidentiality or integrity of the system. One of the solutions to prevent this is to use reactive mechanisms to monitor the behavior of the system while it is running. In this thesis, we propose a generic anomaly detection approach combining hardware and software aspects, based on dynamic information flow tracking (DIFT). DIFT consists of attaching labels representing security levels to information containers, for example files, and specifying an information flow policy to describe the authorized flows. To implement such an approach, we first developed a DIFT monitor which is flexible and non-invasive for the processor, using ARM CoreSight trace components. To take into account the information flows that occur in the different layers, from the operating system to the processor instructions, we have developed different static analysis into the compiler. These analyses generate annotations, used by the DIFT monitor, that describe the dissemination of data in the system at run-time. We also developed a Linux security module to handle information flows involving files. The proposed approach can thus be used to detect different kinds of attacks
Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.
Full textEskenazi, Sébastien. "On the stability of document analysis algorithms : application to hybrid document hashing technologies." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS019/document.
Full textAn innumerable number of documents is being printed, scanned, faxed, photographed every day. These documents are hybrid : they exist as both hard copies and digital copies. Moreover their digital copies can be viewed and modified simultaneously in many places. With the availability of image modification software, it has become very easy to modify or forge a document. This creates a rising need for an authentication scheme capable of handling these hybrid documents. Current solutions rely on separate authentication schemes for paper and digital documents. Other solutions rely on manual visual verification and offer only partial security or require that sensitive documents be stored outside the company’s premises and a network access at the verification time. In order to overcome all these issues we propose to create a semantic hashing algorithm for document images. This hashing algorithm should provide a compact digest for all the visually significant information contained in the document. This digest will allow current hybrid security systems to secure all the document. This can be achieved thanks to document analysis algorithms. However those need to be brought to an unprecedented level of performance, in particular for their reliability which depends on their stability. After defining the context of this study and what is a stable algorithm, we focused on producing stable algorithms for layout description, document segmentation, character recognition and describing the graphical parts of a document
Chen, Jin-Cheng, and 陳錦城. "Security Mechanism in Medical Informatics by Using Enhanced CORBA Based Component." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/25803001640446412527.
Full text台北醫學院
醫學資訊研究所
90
Under today’s National Health Insurance (NHI) system, changing of the payment procedures and medical environment are becoming more rapidly and complicated. It has become more and more important to achieve the satisfactory and quality healthcare, to meet expectation of the patients and at the same time to keep the cost under careful, efficient, and effective control. By implementing the inter-hospital medical information exchange, we could avoid the repeating and overlapping wastes of medical resources. In addition, by using the Internet and Electronic Medical Record (EMR), the medical personnel could immediately gather the most complete and up-to-date related medical information of the patients, therefore can be able to make more precise diagnosis, provide timely and appropriate treatments, and as the result raise the quality of healthcare. For this reason, building a complete medical information exchange environment to provide any related medical information and applications are absolutely necessary. However, there are still many problems presented in today’s medical information exchange. Things such as security management of data and information system, the exchanging medical information across different platforms, the security concerns and limits for outsourcing service, the costs of building such an information system, and the complexity of system maintenance are just a few challenges it faced. In this study, we proposed to use the enhanced CORBA as the foundation to implement component-based architecture design. Components such as identification, authentication and security will be conveniently for all medical organizations to reuse and thus reduce the cost of system development. The medical information exchange components, developed by the research organizations that are commissioned by Department of Health (DOH), can be used or enhanced by medical organizations and suppliers’ on their own information systems. Through this method, DOH is able to manage and maintain the quality and security of the medical information exchange.
Gong, Hui-hao, and 龔暉皓. "Using COM Component to Build Security Knowledge Management System-For LCD Industry." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71840831071651411079.
Full text國立中正大學
資訊管理所暨醫療資訊管理所
98
High-tech industry is always the most important factor of promoting economic development in overall industrial enterprises. Owing to computer systems become more complicated progressively, hence how to manage Knowledge document safely and effectively is one important topic today. If we make proper use of Knowledge management system that is not only a lot of use of Knowledge but also more rapid access to acquire it. Especially if a problem occurs, whether to solve the problem quickly is a key point in a complex information system. This study intends to build Knowledge management system base on web-base architecture and reach COM development in the system. In order to ensure data security we will adopt a security mechanism to ensure user profile will not be improper interception during network transmission and then caused business losses. The COM developed by Microsoft and the advantage includes security, reusability and extensibility. The purpose of this study is how to develop COM in 3-tier system and verify it in LCD factory. Establishing one secure and adaptable Knowledge Management System for CIM department in LCD industry.
Chou, I. Tsen, and 周怡岑. "Deployment Strategies of Information Security Management -A Case of Electronic Component Distributor Company." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/65674852655586327679.
Full text國立臺灣科技大學
資訊管理系
94
The most Important infrastructure for enterprise is good information environment. The degree of enterprise information relays to maturity and the popularity of electronic commerce, information security events (ex viral dissemination, invasions of hacker, material is divulged and so on) also emerges one after another incessantly. These events have caused enterprises visible and tangible losses. Also therefore enterprises have gradually attached importance to the security of information. Due to the special industrial characteristics of electronics components industry. Its supply chain is continually simplifying and these companies are more and more competitive. The important core value in this industry is to provide the highest quality service of information security. This research discusses "Information Security Management of Deployment Strategy" as the central subject, and chooses a medium electronics components distributor as the research object. So to analyze the suitable deployment strategy for the business of electronic components distributor, allows the deployment work of information security management easier to succeed. This research does refer to the documents of BS7799 PDCA model and the IBM information security management model. After we collected and analyzed these documents, we propose the 5 deployment phases in evaluating, training, planning, implementing, and auditing, to simultaneously consider the key points of the 13 executive items which are the evaluation and analysis of present situation, the classification of information property, the classification of risk, etc. The main goal of this research is to provide the mechanism of information security management for enterprises, electronic components distributor especially, in the future.
HUANG, CHIA-SHENG, and 黃家聖. "THE IMPACT OF MARKET COMPONENT AND DIFFERENT PROFITABILITY MEASURES ON THE DETERMINATION OF SECURITY." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/20726086478984862873.
Full textŠtumpf, Ondřej. "Bezpečnost a důvěra v komponentovém modelu DEECo." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-331218.
Full text