Dissertations / Theses on the topic 'Comprehensive security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Comprehensive security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Feffer, Antonia Lynn. "Comprehensive security strategy for all-optical networks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99866.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 107-109).
Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of the attacks, we are also able to better understand their effects across the different layers of the network model. We also propose the current best practices for sensing and detection of these attacks when they occur, as well as mitigation techniques to limit the damage they incur. The attacks are not fully eliminated, however, and so we also identify remaining vulnerabilities these attacks can exploit. After characterizing the attacks, we propose a method for diagnosing attacks as they occur within a network given the analysis we have conducted. We also propose an algorithm for diagnosing attacks, as well as a monitoring system framework that relies on the establishment of autonomous zones of the network in order to efficiently limit damage and quarantine problem areas from the rest of the healthy network. This framework can be applied to a wide variety of network set-ups and topologies, with the ability to customize it to fit the needs of the system.
by Antonia Lynn Feffer.
S.M.
Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textSchmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.
Full textThesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
Tong, Sui-yip. "The implementation of the policy of comprehensive social security assistance." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36449714.
Full textTong, Sui-yip, and 唐瑞葉. "The implementation of the policy of comprehensive social security assistance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36449714.
Full textZwolski, Kamil. "The EU as an international security actor : a comprehensive approach." Thesis, University of Salford, 2010. http://usir.salford.ac.uk/26986/.
Full textBrady, Eric Bonham. "Security Analysis: A Suggested Method for a Comprehensive Top-Down Approach." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/319941.
Full textSchatz, Daniel. "Towards a comprehensive evidence-based approach for information security value assessment." Thesis, University of East London, 2018. http://roar.uel.ac.uk/7950/.
Full textAl, Mayahi Ibrahim Humaid. "Development of a comprehensive information security system for UAE e-Government." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/development-of-a-comprehensive-information-security-system-for-uae-egovernment(190cd7ed-2d1d-4805-963a-5f6d1dc46971).html.
Full textKlenke, Carsten. "Japan's comprehensive National Security and the European Union's Common Foreign and Security Policy convergence towards global cooperation? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380827.
Full textThesis advisor(s): Olsen, Edward A. ; Abenheim, Donald. "June 2000." Includes bibliographical references (p. 97-101). Also available online.
Egners, André [Verfasser]. "A comprehensive security architecture for multi-operator wireless mesh networks / André Egners." Aachen : Hochschulbibliothek der Rheinisch-Westfälischen Technischen Hochschule Aachen, 2015. http://d-nb.info/1076683851/34.
Full textAlba, Avril. "Water in Israel and the occupied territories : towards a comprehensive security agenda /." Title page, contents and abstract only, 1994. http://web4.library.adelaide.edu.au/theses/09AR/09ara325.pdf.
Full textMorrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.
Full textRoberts, Christopher B. Humanities & Social Sciences Australian Defence Force Academy UNSW. "ASEAN's Security Community Project : Challenges and Opportunities in the Pursuit of Comprehensive Integration." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/40261.
Full textKane, Christian D. "Key issues in the emerging U.S. debate on the Comprehensive Test Ban Treaty." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKane.pdf.
Full textThesis Advisor(s): Yost, David S. ; Wirtz, James J. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Comprehensive Test Ban Treaty, nuclear weapons. Includes bibliographical references (p. 53-58). Also available in print.
Suen, Yan-on. "Family care for the portable comprehensive social security assistance (PCSSA) elderly recipients in Guangdong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B22331402.
Full textMoholt, van Reeuwijk Yvonne. "Enhancing the European security and defence policy : European integration and the changing of the Norwegian and the Swedish security identities." Thesis, Uppsala universitet, Teologiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-359694.
Full textZielinski, Helen. "Cambodia : its effect upon ASEAN unity and regional security pre and post the comprehensive political settlement /." Title page, contents and introduction only, 1993. http://web4.library.adelaide.edu.au/theses/09AR/09arz661.pdf.
Full textBerg, Sara E. "Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/1647.
Full textSironi, Luke. "The Comprehensive Test Ban Treaty and its security implications for the United Kingdom and the United States." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359022.
Full text"December 1998." Thesis advisor(s): David S. Yost, Scott D. Tollefson. Includes bibliographical references (p. 63-67). Also available online.
Cha, Chang Hoon. "Beyond anti-hegemonism to security regime : China's perspectives, institutions and engagement in the Comprehensive Test Ban Treaty." Thesis, University of Warwick, 2002. http://wrap.warwick.ac.uk/35580/.
Full textLi, Mable, and 李美寶. "An exploratory study of the importance of consumption emotion to olderpersons receiving comprehensive social security assistance in HongKong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B45418020.
Full textChan, Lit-fai. "Feminization of poverty in Hong Kong : the experiences of pauperization of lone mothers receiving comprehensive social security assistance (CSSA) /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B21028953.
Full textYang, Fang. "A Comprehensive Approach for Bulk Power System Reliability Assessment." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14488.
Full textHagemann, Frank. "Strategic planning for comprehensive security in the European Union's military operations EUROFOR RD Congo, EUROF Tchad/RCA, and EUNAVFOR Somalia /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FHagemann.pdf.
Full textThesis Advisor(s): Abenheim, Donald ; Yost, David S. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: European Union, comprehensive security, strategic planning, European security and defense policy, ESDP, common security and defense policy, CSDP, military operations, crisis management, EUFOR RD Congo, EUFOR Tchad/RCA, EUNAVFOR Somalia Includes bibliographical references (p. 83-98). Also available in print.
Toplu, Esra. "The Euro-Mediterranean Partnership: Critical Assessment of the Security Aspects." Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2650.
Full textThis thesis attempts to assess the security aspect of the Barcelona Process (Process), or so called Euro-Mediterranean Partnership (EMP) within the theoretical framework of new regionalism and the Copenhagen School (Security complex theory) which agrees with neo/realism, neo-liberal institutionalism and constructivism in some aspects. The end of the Cold War broadened the security agenda and new security concerns emerged. Actually, most of the so- called security threats are not new, but the perception of them by the states has changed with globalization which increased the interconnectedness and density of the interaction. Global challenges have made states more vulnerable so appreciated the cooperative interaction at regional level. Comprehensive and cooperative security approaches gained importance and led regional security partnership among states. The construction of Euro-Mediterranean security partnership is one case stemming from the high level of interdependence between the European and the Mediterranean countries. The historical ties, economic dependency, geographical proximity increased the EU’s interest towards the Mediterranean. While new regionalism enables to grasp systemic factors in the Process, the Copenhagen School permits to understand security partnership at the regional level. The rise of illegal immigration flows and religious fundamentalism in the Mediterranean as well as tension in the Middle East conflict, the Iraqi War, and terrorist attacks to the US, Algeria and recently Turkey appreciated the importance of the EMP policy and security cooperation so make this study more crucial.
This study showed that the security challenges in five sectors of the security defined by the Copenhagen School are observable in the EMP’s case. Both military and non-military concerns threaten the stability and prosperity in the Mediterranean Basin. The three baskets of the EMP depict its comprehensive security approach. Having made an overview of the Barcelona Process, the thesis evaluated the security challenges in general and the thematic areas of concerns in depth. Since security cannot be defined without reference to the perceptions and security cultures of the actors, the study examined the perceptions and security cultures in the EMP.
The evaluation of the EMP showed that the EMP has shown certain developments on the way for the security cooperation. However, it could not produce tangible results due to the fundamental shortcomings categorized as inter and intra-institutional incoherence, definitional/perceptional problems and multi- actor involvement in the region. The lack of institutional structures, asymmetrical relations among partners, unbalanced distribution of powers and lack of commitment of the EU are crucial problems. On the basis of all problems lie the gap between the perceptions and security culture of Europe and the Arab world. Thus, this thesis emphasizes the enhancement of inter- subjective understanding and cultural dialogue in order to improve trust and interaction among partners. The EMP is on right track to build zone of peace in the Basin, but it requires longue durée to achieve this.
Olufunsho, R. T. "The new partnership for Africa's development (NEPAD) and food security : reviewing the activities of the Comprehensive Africa Agrigulture Development Programme (CAADP)." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/5044.
Full textENGLISH ABSTRACT: The Comprehensive Africa Agriculture Development Programme (CAADP) represents the New Partnership for Africa’s Developments’ (NEPAD) framework for revitalising Africa’s agriculture. Improving agricultural performance is at the heart of improved economic development and growth. NEPAD believes that agriculture will provide the engine for growth in Africa. The CAADP framework was developed by the NEPAD Steering Committee in collaboration with the Food and Agricultural Organisation (FAO) of the United Nations. It also includes the contributions of other institutions such as the International Fund for Agricultural Development (FAD), the World Food Programme (WFP), the World Bank, and the Forum for Agricultural Research in Africa (FARA). The CAADP focused on investments in four pillars that can make the earliest difference to Africa’s agricultural crisis. These mutually reinforcing pillars were expected to bring about improvements in terms of Africa’s agriculture, food security, and trade balance. This will ultimately enable Africa to reach its Millennium Development Goal of reducing hunger and poverty by half by 2015 (WDR). For the purpose of this particular study, the first investment pillar, which is water and land management, will be scrutinised extensively, as this is critical to achieving the so much talked about food security. The study will utilise both secondary and primary documents of NEPAD. More specifically the implemented water and irrigation projects in the East and West Africa countries will be reviewed to determine success in African agricultural development under NEPAD. It will identify specifically water management projects already implemented and those already initiated, and find out whether the CAADP is set to deliver the Millennium Development Goal.
AFRIKAANSE OPSOMMING: Die ‘Omvattende Landbou Ontwikkelingsprogram’ (CAADP) is die raamwerk van NEPAD se pogings om Afrika se landbousektor te hergenereer. Verbeterde landbou is die kern van verbeterde ekonomiese groei en ontwikkeling in Afrika. Trouens, NEPAD glo dat landbou die dryfkrag van Afrika se ekonomiese groei sal wees. Die CAADP-raamwerk is ontwikkel deur NEPAD se leierskap, in noue samewerking met die Verenigde Nasies se Voedsel en Landbouorganisasie (FAO). Die raamwerk sluit ook in bydraes van ander liggame, soos die Internasionale Fonds vir Landbouontwikkeling (FAD), die Wêreldvoedselprogram (WFP), die Wêreldbank en die Forum vir Landbounavorsing in Afrika (FARA). Die CAADP fokus op vier investeringspilare wat Afrika se landboukrisis van onder af kan aanpak. Hierdie interafhanklike pilare is veronderstel om Afrika se landbou, voedselversorging en handelsbalans gelyktydig aan te pak. Hierdie stappe behoort te help dat Afrika die Millennium Ontwikkelingsoogmerk (nl. ‘n halvering van honger teen 2015) te bereik. In hierdie studie val die klem op die eerste pilaar, nl. water en grondbestuur, as voorwaarde vir voedselsekuriteit. Die studie maak gebruik van sowel primêre en sekondêre dokumentasies van NEPAD, met besondere fokus op water en besproeiingsprojekte in Oos- en Wes-Afrika. Daar word gekyk na spesifieke projekte wat reeds bestaan en wat geïnisieer is, ten einde die sukses van CAADP te bepaal.
Wessén, Daniel. "COIN-operationen i Afghanistan : Svårigheterna med de säkerhetspolitiska målsättningarna." Thesis, Försvarshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3007.
Full textIt can be difficult to make accurate assessments in conflicts like Afghanistan today. NATO has defined the operation in Afghanistan as a counterinsurgency (COIN) operation. The uncertainties are many and where the changes of success varies considerably over time. It also means that in many cases, there must be parallel processes for the security policy work. The complexity of this means it has developed multi-functional strategies. The basic idea is to coordinate military and civilian approaches to achieve maximum impact. The purpose of this paper is to highlight the difficulties of the security policy objectives in a COIN operation. The survey data shows that the political objectives must be clear and that there must be an end goal (Exit Strategy). The political aspect is also responsible for the existence of a common understanding of what is to be achieved, and to coordinate resources to best effect. Financial resources are important but not obvious to influence developments in the conflict. The effect of aid and development work is questionable due corruption and poor coordination. Without clear objectives from the political level, the military power may have difficulty in helping resolve the conflict and then the chances are that the effort will lead in the wrong direction. Finally, it is clear that the media has a huge impact on how conflict is perceived and that irregularities can affect the whole strategy and therefore that the objectives are not achieved.
Schellekens-Gaiffe, Marie-Ange. "La sécurité environnementale dans les relations extérieures de l’Union européenne : vers une approche intégrée de la prévention des conflits et crises externes." Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROD004/document.
Full textThe link between environmental problems and risks to security is progressively gaining ground, even though diverging opinions still prevail as to the exact nature and challenges of this interaction. The increasingly visible impacts of climate change have indirectly strengthened the prominence of this issue on the international agenda. Can the European Union, born itself from a successful approach to conflict prevention and international leader for environmental protection contribute to this aim ? Beyond the immediate urgency of environmental problems, environmental security carries several elements which could turn it into a driving force for the European Union's foreign policy by an improved understanding of the actual roots and multifaceted nature of numerous conflicts. This would allow the EU to support global stability and to strengthen its role on the international scene
Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Full textHühnerfuß, Anne. "To Intervene or Not to Intervene? : A Theoretical Account of European Crisis Management in Mali." Thesis, Linköpings universitet, Statsvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-132498.
Full textHenning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.
Full textAgrebi, Meriem. "Le cadre juridique contemporain de la lutte contre la piraterie maritime." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAA019.
Full textNeither the crime of piracy nor its repression are recent. The upsurge of this ancient form of criminality underlines new aspects which call the readaptation of the legal rules governing its repression. In addition to its traditional regime, new rules were consequently developped, reflecting contemporary modes of normative production and incorporating the action of non-State structures and actors. Because piracy is not exclusively a legal issue but rather encompasses several broader structural problematics, the fight against piracy requires on the other hand a global and comprehensive approach. This approach associates short-term security and judicial aspects, as well as long-term strategies going beyong simply containing piracy as a transnational threat to maritime security to ensure further stability
Green, Jolina, and Frida Marthinsson. "Kvinnors upplevelse av att leva med bröstcancer : En studie baserad på självbiografier." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91298.
Full textBackground: Previous research shows that breast cancer affects the individual’s entire world, which places high demands on the nurse´s health care efforts. More studies are needed that show how these individuals perceive their situation.Objective: To highlight women’s experience of living with breast cancer.Method: A qualitative study based on five autobiographies with inductive approach has been used. The material was analyzed using a manifest content analysis.Results: The analysis process resulted in nine subcategories and three main categories; A development of coping strategies, An uncertain future and A sense of security. The results showed that a breast cancer diagnosis drastically affected the woman’s life and that the cancer notification was distressing. The treatment and its side effects were perceived as stressful both physically and mentally. Through various strategies, the women managed to maintain their everyday lives. The need to talk to someone and share with others was central to the women and reduced the feeling of loneliness. The results also showed that uncertainty for the future was emotionally charged and therefore the support of relatives and health professionals played a significant role during their illness.Conclusion: The women’s experience of living with breast cancer negatively affects her world, both physically and mentally. The nurse plays a central role throughout the illness period, where commitment, responsiveness and attentiveness are important. Nursing work should therefore be based on a comprehensive perspective in order to create a professional care relationship that strengthens a woman’s quality of life, health and safety. Further research is needed to gain a deeper understanding and competence about how breast cancer-treated women’s sexuality is affected and how to strengthen different forms of support for the most vulnerable women.
El, Jadie Amna. "L'énergie nucléaire et le droit international public." Thesis, Tours, 2017. http://www.theses.fr/2017TOUR1006/document.
Full textAll states without discrimination have an inalienable right to develop the uses of nuclear energy for civilian purposes, provided they do not divert these peaceful uses to nuclear weapons. However, five states have been granted the right to possess these weapons, that is : United-States, France, Russia, China and United-Kingdom. Around this position a fierce debate, both legal and ethical, has been raised. Indeed for its opponents nuclear represents a persistent risk that is non controllable by science. Major nuclear accidents, radioactive wastes and the use of nuclear for military purposes are unmanageable risks of exceptionnal serious gravity. On the other hand, the proponents of this energy present it as safe, even as part of sustainable development. According to them, nuclear is a reliable means to fight global warming and is also a solution to the energy shortage the world is facing. When analyzing the reliability and the credibility of all arguments for and against this industry, it can be noticed that the lawfulness and legitimacy of the use of nuclear energy are ill-founded. Therefore, we believe there is a need to go beyond nuclear with the conclusion of an international convention dealing with the progressive but comprehensive nuclear ban
Chu, Chienjen, and 朱堅仁. "The Role of Military Police in National Security Underthe Comprehensive Security." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/70686555331451251136.
Full text國立中正大學
戰略暨國際事務研究所
99
The studies of national security are never faded by the end of Cold war. On the contrary, they have been further diversified because of the development of the world. The connotation of “national security” is no longer limited in military affairs, but has progressively extended to new fields, such as politics, economy, technology, cultures, religions and environment. Therefore, a new concept of security has formed as “comprehensive security”, but the "National Security" is still the focus of Security Studies. After Cold War, the international situation has undergone significant changes and restructures, turning the world into the era of globalization. Briefly, there are two sources of threats menaced the national security in countries. Military activities are the traditional source of threats between countries. On the other hand, the non-traditional security threats are a source with more diversity, forms, characteristics, and changes. The new concept, comprehensive security, is composed of both serious sources of threats, so it has been valued seriously and progressed fast in recent days. After the 911 terrorist attacks in U.S.A, non-traditional security threats have become the focus of national security. Nations paid their attentions on how to adjust their national security organization and started a succession of military reform. However, the maintenance of Military Police is not restricted due to the wave of international disarmament. On the contrary, the expansion of Military Police unit has been seen as a positive recognition and policy to fit novel situations and dangers in nations in this world, no matter at war or peace days. Military Police is a part of armed forces and critical security institutions in the national security system of R.O.C (Taiwan). According to the task goals and laws, Military Police has the duties to execute the garrison operations, special operations, military judicial police services, maintain and support the armed forces combined operations. Furthermore, Military Police will be ordered by government to deal with some emergencies such as disaster Prevention and counter-terrorism support. In many years, Military Police has done remarkable contributions in kinds of missions and tasks, therefore received praise and respect from whole country. In summary, Military Police is essential to maintain democracy, laws, social stability, and national security. For adaptation to impacts of “the policy of disarmament” and continuation of Military Police unit, Military Police must be transformed into a new form with rapidity, flexibility and high operational efficiency to meet the requirements of diverse tasks in modern military. In the peace, it is usually responsible for combating serious crime, support and prevention of terrorist activities, and national emergencies; on the other side, Military Police can be also disposed to battle field in wartime immediately. In conclusion, Military Police will be promoted into an advanced unit to complete both goals of “battle preparation” and “national security” in the future.
Altamimi, Ahmad. "A Comprehensive Data Security Framework for OLAP Domains." Thesis, 2014. http://spectrum.library.concordia.ca/978232/1/Altamimi_PhD_S2014.pdf.
Full textLin, Chun-Yu, and 林均育. "A Comprehensive Security System for Digital Microfluidic Biochips." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/j97y3a.
Full text國立清華大學
資訊工程學系所
106
Digital microfluidic biochips (DMFBs) play an important role in the healthcare industry due to its advantages such as low-cost, portability, and efficiency. According to the recent market report, the growth of biochips market is twice than before. However, as the enormous business opportunities grow, piracy attacks, which are exploited by unscrupulous people to gain illegal profits, become a severe threat to DMFBs. To prevent piracy attacks, the conventional approach uses secret keys to perform authentication. Nevertheless, DMFBs only consist of electrodes to control the operations of droplets, and there are no memories and logic gates integrated on it to store secret keys. This makes designing secure defenses of DMFBs against piracy attacks more difficult. Thus, in this paper, we propose the first authentication method for piracy prevention of DMFBs based on a novel Physical Unclonable Function (PUF). The proposed PUF utilizes the inherent variation of electrodes on DMFBs to generate secret keys, so it does not require memory. Experimental results demonstrate the feasibility of our proposed PUF. Finally, we analyze the security of the proposed method against piracy attacks.
Chou, Li-Hsiang, and 周立祥. "Comprehensive Security Control System for Computer Data Access." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/37468543522452256333.
Full text銘傳大學
資訊工程學系碩士班
103
Network is an indispensable technology in our life. However, any computer in the network may be easily under attack by hackers, like Web page replacement, data loss; that’s to say, the confidential data is tampered, and even the hard disk is stolen by malicious users. All these human factors are difficult to defense for valuable data on computing devices. There are several solutions in current market for computer data protection, but they cannot completely solve the problems mentioned above. If malicious users enter the system’s safe mode, it means the system would open the door for free access to all, and it’s more difficult to defense the malicious access. Since the user’s data access activity is only controlled in user mode for current operating systems, for this characteristic, this thesis attempts to implement a FSG (File System Guardian) system in kernel mode to filter the users’ data access activity on two prevalent operating systems of Microsoft Windows and open-source Linux. They respectively use techniques of filter driver for Windows and hooking system call table for Linux to protect the files comprehensively. On the other hand, the proposed FSG system also encrypts the content of protected file via famous RC5 to ensure the protection reliability and then prevent the possible crisis caused by malicious users.
Lu-chung, Weng, and 翁履中. "A Study of Singapore''s Comprehensive Security Strategy." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/39007688118385593363.
Full text淡江大學
東南亞研究所
92
Abstract In the past, the safety concept during the cold war period all emphasized the threat on national security by external factors, however, countries today all are confronted with uncertain factors coming from inside and also the threat of outside factors on inner stability of the country. As a small state, national survival for Singapore is an issue of the highest priority, given the fluctuations in regional and world politics, and current political and economic challenges in neighboring countries. For the sake of political, economic and diplomatic relations and security, the government of Singapore must to communicate with other Southeast Asian nations positively and attempted to arrange them in a link of the chain of her comprehensive security strategy. Therefore, Singapore also promotes regional security cooperation, especially with immediate neighbors such as Malaysia and Indonesia, in order to achieve the goals of mutual security and good neighborliness. ASEAN therefore offers Singapore and its neighbors the best framework to resolve issues of a bilateral or multilateral nature. Thus, for Singapore, advancing from independent from Malaysia to now, facing the above transition in the inner and external environment, it is necessary to rethink the adjustment of its inner and external security strategies, to cooperate with the situation development and guarantee its national security. This dissertation analyzes and studies the security strategy both internally and externally of Singapore, from the viewpoint of comprehensive security. This dissertation will divide inner security strategy into 1.political security strategy; 2.social security strategy; 3.economic security strategy; and external security strategy into 1.diplomatic security strategy; 2. national defense strategy and the international cooperation of non-traditional security field, from the viewpoint of comprehensive security, and based on the above 6 aspects, this article will analyze how Singapore derived its security strategy from many threatening factors both internally and externally, and also explain the practice for its security strategy. Finally, the author will try to forecast the problems that Singapore may face in the future, and try to find out some useful security strategies that Taiwan can learn from Singapore. Keywords: Singapore, ASEAN, Comprehensive Security, National Security, Foreign Policy
李文夆. "Singapore's Comprehensive Security in the Post-Cold War Era." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/65765741167855776031.
Full text南華大學
亞洲太平洋研究所
90
Singapore’s Comprehensive Security in the Post-Cold War Era Abstract During the post-cold war period, the conflict between eastern and western ideology has ended officially. In the past, the safety concept during the cold war period all emphasized the threat on national security by external factors, however, countries today all are confronted with uncertain factors coming from inside and also the threat of outside factors on inner stability of the country. This dissertation analyzes and studies the security view both internally and externally of Singapore during the cold war period to post-cold war period, from the viewpoint of comprehensive security. During the cold war period, there was threat on the inner and external security of Singapore, with great crisis caused on the national security, and until the post-cold war period, Singapore has become a country with prosperously developed economy and stable and flourishing society, however, the traditional values that held together political and social stability were also eroded, thus there was impact caused on the inner security. At the same time, external environment changed, including the army retreat of USA and Soviet Union, and also emergence of China and Japan, all brought the imbalance of power in Asia-Pacific Region. On the other hand, Southeastern Asia countries’ emphasis on economic cooperation inside the region has also influenced the external security view of Singapore. Thus, for Singapore, advancing from cold war period to post-cold war period, facing the above transition in the inner and external environment, it is necessary to rethink the adjustment of its inner and external security views, to cooperate with the situation development and guarantee its national security. This dissertation will divide inner security views into 1. political security view; 2. social security view; 3. economic security view; and external security views into 1. diplomatic security view; 2. national defense security view from the viewpoint of comprehensive security, and based on the above 5 aspects, this article will analyze how Singapore derived its security view from many threatening factors both internally and externally, and also explain the practice for its security view. Furthermore, it will analyze and discuss how Singapore corrected and adjusted its security view under the significant change of inner and external environment during the cold war period. Finally, the author will try to forecast the problems that Singapore may face in political, social, economic, diplomatic, and national defense security views and its future development direction, from the analysis on security views since the cold war period until now. Keywords: Post-Cold War Period, Singapore, Comprehensive Security, People’s Action Party, National Security
王韋龍. "Study on the CPC's comprehensive concept of National Security since the end of the Cold War:case study on National Security Committee and Law of National Security." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/c834kn.
Full text國立政治大學
國家安全與大陸研究碩士在職專班
104
Afterthe era of Cold War the international arena has been dramatically transformed and changed ever since and the establishment of National Security Committee (NSC) has been greatly in demand in Western countries. From the point of view of Communist Party of China (CPC), the continuing formation and development of concept of national security has been majorly focusing on two basic principleswhich arerespectively aiming at the purpose of defending the core of national interest and in the pursuit ofstabilityinternally as well as to assure sustainability and national development externally. Since Xi Jinping took office of the General Secretary of CPC, the so calledComprehensive Concept of National Security,NSC and the newly legislatedLaw of National Securityhave been brought to the public. The above mentioned party theory, committee and law will be subsequently implemented to coordinate various relevant departments within the party and government and also will be required to cope with wide range of issues in regarding of national security challenge and complexity in the long run. The reason behind the establishment of NSC is not accidental. Since 18th National Congress of the CPC began on November 2012, from perspective of the strategic implementation of national security the CPC has obviously foreseen the coming of dire situation by which it might further jeopardize the legitimacy of the ruling CPC and the safeguarding of political safety has become CPC’s first priority agenda and thereforethe national security strategic deployment to counteract the containment led by US’s Pivot to Asia will be swiftly adjusted to cope with new scenario thereafter. Nevertheless, the NSC as well as National Security Law should both play a significantly critical role in dealing with all kind of challenges in related to national security in the future. The research and study of NSC along with the implication of theNational Security Law, shaping of perspective of national security since the Cold War andtheory of Comprehensive Concept of National Security brought by Xi as well as further assessment of impact and ramifications on the development of Cross Straight relations will be the focal point in my thesis.
Huang, Li-Fang, and 黃立方. "China’s Economic Security Strategy Toward Taiwan: The Case Study of Pingtan Comprehensive Experimental Zone." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/12957699776600448790.
Full text淡江大學
國際事務與戰略研究所碩士在職專班
103
Ever since the implementation of the Reform and Open Policy in 1978, and more than 30 years of economic development through the developing model of Special Economic Zones, China has gained tremendous success and become the world’s second largest economies in 2010. After the Cold War, China initiated a so-called ‘New Security Concept’, of which Economic Security was regarded as vital components of stability and development. To achieve its final goals of ‘peaceful reunification’, China has inputted huge amount of resources in the economic security strategies toward Taiwan. After the Cold War, international relations theories have varied greatly, and what attracted peoples’ attention most was the emerging of the theory of constructivism. The constructivism theory suggests that international politics shall be viewed from the perspectives of sociology, and therefore attention be paid to the social construction existed in the international relations rather than the material construction, and thus take on a critical attitude toward the principle of rationalism of ‘Neo-realism’. Since China has adopted Pingtan, Fujian Province as ‘The 12th 5-Year Plan Guidelines for National Economic and Social Developments’ (abbrev. for 12th 5-Year Plan Guidelines) on Mar. 16, 2011, ‘Pingtan Comprehensive Experimental Zone’ has formally been raised to a high status of national strategy. The Zone advertised itself with ‘Five-Commons’ Principle, of which aimed to explore new organisms for building homes for the people across the strait and broadening mutual exchanges and cooperation, and made it a do-first and try-first zone for reaching the goals of ‘Peaceful Reunification & One Country, Two Systems’. Xi, jiping, as a political giant of China’s new generation, has currently raised the issue of fulfilling ‘China Dream’ as national goal. After Xi’s seizing powers, being one of the very few new leaders who were familiar with Taiwan affairs, what changes of China’s economic security strategy will bring about toward Taiwan? While Xi was serving as Secretary of Fu-jian Province, the ‘Pingtan Comprehensive Experimental Zone’ being developed and built by him, what on earth does it mean anything and special? This thesis, from the perspectives of Constructivism of international relations theory, will try to give it a thought about the different frameworks of national security strategy analysis, and thus, based on these frameworks, to analyze the ‘Pingtan Comprehensive Experimental Zone’, and then to further examine how China’s economic security strategy works toward Taiwan, and the way how does Taiwan cope with it as well.
Lee, Chi-Kit, and 李志杰. "Construct and Change of China Asia-Pacific Security Strategy (1979~2004) - Comprehensive National Power Perspective." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/59884810868491594152.
Full text國立暨南國際大學
公共行政與政策學系
93
Abstract: China became a strong and powerful state since “Reform and Open Policy” was conducted since 1979. As an important actor in the world, Chinese development is closely linked with Asia-Pacific region. So, China Strategy in Asia-Pacific is interrelated with China domestic and overseas security, and interrelated with changing of Asia-Pacific and global situation. Since Deng, Xiao-Ping came into power in 1978 and took “Comprehensive National Power” as the core interests of China. This led to a significant change of China’s security concepts. Deng, Xiao-Ping changed the subsistence-led strategy into a development-led strategy and performed the developmental strategy of “Reform and Open” to accelerate the fulfillment of developmental object of “The Four Modernization” so as to promote China’s “Comprehensive National Power” and to conserve China’s core interests. But in phase of Deng, Xiao-Ping is not to bring up the concept of “Comprehensive National Power”, since 1992, Jiang, Ze-min just to bring up the concept of “Comprehensive National Power”. The raised of China “Comprehensive National Power” to lead Asia-Pacific appear “The China Threat Theory” in 1990’s, and to bring influence of China to development “Comprehensive National Power”. So, Jiang, Ze-min advocated “New Security Concept, NSC” to settle the pressure of “The China Threat Theory”. Since Hu, Jin-tao came into power, except to continue cooperation mode of “New Security Concept”, and expand the security contents to “non-traditional security concept”. Hu, Jin-tao as well as advocate “China’s Peaceful Rise Theory” to settle the pressure of “The China Threat Theory”, can enhance rise of China’s “Comprehensive National Power”. This research tries to use the Comprehensive National Power Perspective to construct China Security Concept, and significance of China Asia-Pacific Security Strategy in Comprehensive National Power development, hope to know well the full view of China Asia-Pacific Security Strategy. Key word: Comprehensive National Power, China security concept, China Asia-Pacific Security Strategy, The China Threat Theory, China’s Peaceful Rise Theory.
"Japan's comprehensive national security strategy and its economic cooperation with and assistance to the ASEAN countries." Chinese University of Hong Kong, 1989. http://library.cuhk.edu.hk/record=b5886204.
Full text"Empowerment of women recipients of comprehensive social security assistance in the welfare campaign in Hong Kong." Chinese University of Hong Kong, 1995. http://library.cuhk.edu.hk/record=b5888508.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1995.
Includes bibliographical references (leaves 150-153).
Abstract --- p.ii
Acknowledgment --- p.iii
Introduction --- p.1
Chapter 1. --- Ecumenical Grassroots Development Center and the Welfare Campaign --- p.3
Chapter 2. --- Literature Review and Methodology --- p.19
Chapter 3. --- The Empowerment Process --- p.36
Chapter 4. --- The Free-Riders --- p.72
Chapter 5. --- Selective Incentives: A Panacea? --- p.93
Chapter 6. --- Mobilizing Acts of EGDC --- p.108
Conclusion --- p.137
Appendix I --- p.146
Appendix II --- p.149
Bibliography --- p.150
Lee, Mei-Hsien, and 李玫憲. "New Research Approach to Regional Security Governance in Europe-A Comprehensive Analysis of Power, Institute, and Idea." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52646599932664286735.
Full text國立中興大學
國際政治研究所
98
Because of its oncoming conceptualization, security governance neither becomes a popular research approach, nor has any acceptable operation-definition. This thesis aims to re-construct the analyzing framework of the security governance, and test its applicability for contemporary European security research. First, it re-constructs the security governance research model by combining governance with eclecticism analysis included power, institute, and idea. Second, it comprehensively analyzes the development, practice, and challenge of security governance toward Europe by case-study among Central and Eastern Europe, Arctic Ocean, and South Europe. Finally, it sums up all discussions and verifies research propositions and model. This thesis finds that, in order to deal with multilateral security threats, main regional actors have developed a synthetic governance strategy based on the need to handle different security threats in each sub-region. Regional actors have different choices of governing approach; however, under the same goal of resolving regional security problems, they still work on common principles included policy co-ordination, strategic co-management, and security co-operation.
LIN, YEN-HUNG, and 林彥宏. "Exploring the New Strategic Relationship between the US and China from the Restricted Realism: Asia Pacific Comprehensive security Research." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wb7m4x.
Full text國立中正大學
戰略暨國際事務研究所
106
As the US and China compete for power, they have considerable influence on the security and peace and stability of the Asia-Pacific region. Therefore, the purpose of this study is to use the theory of international relations “Restrained Realism” as the basis of the argument, and to put forward the “Security of the military to adopt a low profile” and “Economic cooperation” proposed in the theory, and to “Defend regional conflicts with international organizations”. The balance model, together with case studies, verified the stable structure of the “New strategic relationship” between the United States and China in the Asia-Pacific region, and developed the “Asia-Pacific comprehensive security” that constrains “Structure” to restrict “Units”. Keywords:US-China power;The security of the Asia-Pacific region;Restrained Realism;New strategic relationship;Comprehensive security
Dekker, Adriette Hendrina. "Informal social security : a legal analysis." Thesis, 2005. http://hdl.handle.net/10500/624.
Full textJurisprudence
LLD
Ramovha, Ditebogo Audry. "Socio and economic impact of comprehensive rural development programme : a case study of Muyexe Comprehensive Rural Development Programme Site in the Greater Giyani Local Municipality in Limpopo Province, South Africa." Diss., 2016. http://hdl.handle.net/10500/20990.
Full textGeography
M. Sc. (Geography)