Dissertations / Theses on the topic 'Control toolbox (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 dissertations / theses for your research on the topic 'Control toolbox (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tang, Wai-hung, and 鄧偉雄. "An anonymity scheme for file retrieval systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.
Full textMazières, David (David Folkman) 1972. "Security and decentralized control of the SFS global file system." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43610.
Full textIncludes bibliographical references (p. 47-53).
SFS (secure file system) is a global file system designed to be secure against all active and passive network attacks, provide a single namespace across all machines in the world, and avoid any form of centralized control. Using SFS, any unprivileged user can access any file server in the world securely and with no prior arrangement on the part of system administrators. New file servers are immediately accessible securely by all client machines. Users can name such new servers from any existing file system by specifying public keys in symbolic links. A prototype implementation of SFS installs easily, coexists with other file systems, and should port trivially to most UNIX platforms. Preliminary performance numbers on application benchmarks show that, despite its use of encryption and user-level servers, SFS delivers performance competitive with an in-kernel NFS implementation.
by David Mazières.
M.S.
Leung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.
Full textLeung, Ka-ho Andrew, and 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.
Full textMerritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.
Full textFaltemier, Timothy Collin. "A groupware interface to a shared file system." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1352.
Full textChung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.
Full textKeywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Beedu, Atul. "Integrated inventory control to manage blanket orders in a contract manufacturing environment a case study /." Diss., Online access via UMI:, 2005.
Find full textPerera, Dinesh Sirimal. "Design metrics analysis of the Harris ROCC project." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/935930.
Full textDepartment of Computer Science
Bhargava, Manjari. "Analysis of multiple software releases of AFATDS using design metrics." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834502.
Full textDepartment of Computer Science
LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Full textAllman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.
Full textNain, Philippe. "Application des methodes analytiques a la modelisation des systemes informatiques." Paris 6, 1987. http://www.theses.fr/1987PA066550.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full text"FADE: secure overlay cloud storage with access control and file assured deletion." 2011. http://library.cuhk.edu.hk/record=b5894616.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 60-65).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Policy-based File Assured Deletion --- p.7
Chapter 2.1 --- Background --- p.7
Chapter 2.2 --- Policy-based Deletion --- p.9
Chapter 3 --- Basic Design of FADE --- p.13
Chapter 3.1 --- Entities --- p.13
Chapter 3.2 --- Deployment --- p.15
Chapter 3.3 --- "Security Goals, Threat Models, and Assumptions" --- p.16
Chapter 3.4 --- The Basics - File Upload/Download --- p.18
Chapter 3.5 --- Policy Revocation for File Assured Deletion --- p.23
Chapter 3.6 --- Multiple Policies --- p.23
Chapter 3.7 --- Policy Renewal --- p.25
Chapter 4 --- Extensions of FADE --- p.27
Chapter 4.1 --- Access Control with ABE --- p.27
Chapter 4.2 --- Multiple Key Managers --- p.31
Chapter 5 --- Implementation --- p.35
Chapter 5.1 --- Representation of Metadata --- p.36
Chapter 5.2 --- Client --- p.37
Chapter 5.3 --- Key Managers --- p.38
Chapter 6 --- Evaluation --- p.40
Chapter 6.1 --- Experimental Results on Time Performance of FADE --- p.41
Chapter 6.1.1 --- Evaluation of Basic Design --- p.42
Chapter 6.1.2 --- Evaluation of Extensions --- p.46
Chapter 6.2 --- Space Utilization of FADE --- p.49
Chapter 6.3 --- Cost Model --- p.51
Chapter 6.4 --- Lessons Learned --- p.53
Chapter 7 --- Related Work --- p.54
Chapter 8 --- Conclusions --- p.58
Bibliography --- p.60
"A model for the evaluation of control with reference to a simple path context model in a UNIX environment." Thesis, 2015. http://hdl.handle.net/10210/14471.
Full textInformation and the IT systems that support it are important business assets. Their availability, integrity and confidentiality are essential to maintain an organisations competitive edge, cash flow, profitability, company image and compliance with legal requirements. Organisations world-wide are now facing increased security threats from a wide range of sources. Information systems may be the target of a range of serious threats including computer-based fraud, espionage, sabotage, vandalism and other sources of failure or disaster ...
Pradeepa, B. K. "Performance Modelling Of TCP-Controlled File Transfers In Wireless LANs, And Applications In AP-STA Association." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2121.
Full textBooi, Mutshavhani Charlotte. "Quality management systems used by nursing education institution in Gauteng Province." Thesis, 2008. http://hdl.handle.net/10500/2606.
Full textHealth Studies
M.A. (Health Studies)