To see the other types of publications on this topic, follow the link: Integrity Confidentiality.

Dissertations / Theses on the topic 'Integrity Confidentiality'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Integrity Confidentiality.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Miklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ranj, Bar Amin. "Confidentiality and integrity management in online systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.

Full text
Abstract:
The dominant role of social networking in the web is turning human relations into conduits of information flow. This means that the way information spreads on the web is determined to a large extent by human decisions. Consequently, information security, confidentiality and integrity of shared data, relies on the quality of the collective decisions made by the users. Recently, many access control schemes have been proposed to control unauthorized propagation and modification of information in online systems; however, there is still a need for mechanisms to evaluate the risk of information leak
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.

Full text
Abstract:
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes certain cryptographic and security features integrated into the general purpose processor and computing platform to protect confidentiality and integrity of digital content stored in a computing system's memory. System designers can take advantages of the availability of the proposed security model to build future security systems such as systems with strong anti-reverse engineering capability, digital
APA, Harvard, Vancouver, ISO, and other styles
4

Ferradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.

Full text
Abstract:
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à clé publique : l’intégrité, l’authentification et la confidentialité. Au sein de chaque thème nous concevons des nouvelles primitives et améliorons des primitives existantes. Le premier chapitre, dédié à l’intégrité, introduit une preuve non-interactive de génération appropriée de clés publiques RSA et un protocole de co-signature dans lequel tout irrespect de l’équité laisse automatiquement la partie lésée en possession d’une preuve de culpabilité incriminant la partie tricheuse. Le second chapi
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Baolong. "XML security in XML data integrity, authentication, and confidentiality." Thesis, University of Huddersfield, 2010. http://eprints.hud.ac.uk/id/eprint/9671/.

Full text
Abstract:
The widely application of XML has increasingly required high security. XML security confronts some challenges that are strong relating to its features. XML data integrity needs to protect element location information and contextreferential meaning as well as data content integrity under fine-grained security situations. XML data authentication must satisfy a signing process under a dependent and independent multi-signature generation scenario. When several different sections are encrypted within the XML data, it cannot query the encrypted contents without decrypting the encrypted portions. The
APA, Harvard, Vancouver, ISO, and other styles
6

Rocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.

Full text
Abstract:
The advantages of always available services, such as remote device backup or data storage, have helped the widespread adoption of cloud computing. However, cloud computing services challenge the traditional boundary between trusted inside and untrusted outside. A consumer’s data and applications are no longer in premises, fundamentally changing the scope of an insider threat. This thesis looks at the security risks associated with an insider threat. Specifically, we look into the critical challenge of assuring data confidentiality and integrity for the execution of arbitrary software in a cons
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.

Full text
Abstract:
Security of data is tightly coupled to its access policy. However, in practice, a data owner has control of his data’s access policies only as far as the boundaries of his own systems. We introduce graduated access control, which provides mobile, programmable, and dynamically-resolving policies for access control that extends a data owner’s policies across system boundaries. We realize this through a novel data-centric abstraction called trusted capsules and its associated system, the trusted data monitor. A trusted capsule couples data and policy into a single mobile unit. A capsule is backwa
APA, Harvard, Vancouver, ISO, and other styles
8

Lindner, Patricia J. "Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1554911833066868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Solum, Erik. "Achieving over-the-wire configurable confidentiality, integrity, authentication and availability in GridStat's status dissemination." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/e_solum_121807.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Panchapakesan, Santosh Kumar. "Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Raheem, Muhammad. "Evaluation of Cryptographic Packages." Thesis, Linköping University, Linköping University, Information Theory, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-17441.

Full text
Abstract:
<p>The widespread use of computer technology for information handling resulted in the need for higher data protection.The usage of high profile cryptographic protocols and algorithms do not always necessarily guarantee high security. They are needed to be used according to the needs of the organization depending upon certain characteristics and available resources.The communication system in a cryptographic environment may become vulnerable to attacks if the cryptographic packages don’t meet their intended goals.</p><p>This master’s thesis is targeted towards the goal of evaluating contemporar
APA, Harvard, Vancouver, ISO, and other styles
12

Dukes, Renata. "Proposed iNET Network Security Architecture." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605971.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Morgan State University's iNET effort is aimed at improving existing telemetry networks by developing more efficient operation and cost effectiveness. This paper develops an enhanced security architecture for the iNET environment in order to protect the network from both inside and outside adversaries. This proposed architecture addresses the key security components of confidentiality, integri
APA, Harvard, Vancouver, ISO, and other styles
13

Radvärn, Johan. "CRM-system och utmaningar för dataskydd inom detaljhandel." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-41987.

Full text
Abstract:
The purpose of this study is to investigate what new challenges CRM systems, Customer Relationship Management, have for the protection of personal data and security in retail. Today's IT development offers companies effective solutions for acquiring new customers and for retaining current customers. IT solutions such as data collection, data storage and analysis of data in real time are just a few examples of what a successfully implemented IT system can offer. CRM systems are the overall IT system solution that companies use, or show interest in using, to be competitive and ultimately achieve
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Yongzhi. "Constructing Secure MapReduce Framework in Cloud-based Environment." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2238.

Full text
Abstract:
MapReduce, a parallel computing paradigm, has been gaining popularity in recent years as cloud vendors offer MapReduce computation services on their public clouds. However, companies are still reluctant to move their computations to the public cloud due to the following reason: In the current business model, the entire MapReduce cluster is deployed on the public cloud. If the public cloud is not properly protected, the integrity and the confidentiality of MapReduce applications can be compromised by attacks inside or outside of the public cloud. From the result integrity’s perspective, if any
APA, Harvard, Vancouver, ISO, and other styles
15

Geihs, Matthias [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Ahto [Akademischer Betreuer] Buldas. "Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions / Matthias Geihs ; Johannes Buchmann, Ahto Buldas." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169305288/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Vahldiek-Oberwagner, Anjo Lucas [Verfasser], and Peter [Akademischer Betreuer] Druschel. "Techniques to Protect Confidentiality and Integrity of Persistent and In-Memory Data / Anjo Lucas Vahldiek-Oberwagner ; Betreuer: Peter Druschel." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2019. http://d-nb.info/1177797216/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mužilová, Gabriela. "Návrh zavedeni DMS systému v organizační složce společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241417.

Full text
Abstract:
Master´s thesis focuses on company´s internal documentation and Document Management Systems. It presents a proposal for the project of SharePoint implementation in the selected organisational unit of a company, using the Cloud Computing technology. An assessment of risks, resulted from the project and especially from the Cloud Computing, leads to the essential part of this paper, to the proposal of security arrangements and solutions. The arrangements will be advised to the organisational unit considering the economic cost comparison with potential risks.
APA, Harvard, Vancouver, ISO, and other styles
18

Sandelius, Johnna, and Louise Sundberg. "Vuxna patienters erfarenheter av bedsiderapportering : En litteraturöversikt." Thesis, Ersta Sköndal Bräcke högskola, Institutionen för vårdvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:esh:diva-6800.

Full text
Abstract:
Bakgrund: Personcentrerad vård blir allt viktigare i dagens sjukvård. Avsikten med det är att patienten ska inkluderas som en del av teamet. Patientens rätt till delaktighet står reglerat i patientlagen som anger att vården ska utformas i samråd med patienten. Informationsöverföringsprocessen är en kritisk del i vården som ofta ligger till grund för de patientskador som uppstår. Bedsiderapportering är en relativt ny form av överrapportering där målet är att göra patienten delaktig genom att överrapporteringen sker vid patientens säng. Sjukvårdspersonalen ska förvissa sig om att adekvat informa
APA, Harvard, Vancouver, ISO, and other styles
19

Kasten, Andreas [Verfasser], Rüdiger [Gutachter] Grimm, and Ansgar [Gutachter] Scherp. "Secure semantic web data management : confidentiality, integrity, and compliant availability in open and distributed networks / Andreas Kasten ; Gutachter: Rüdiger Grimm, Ansgar Scherp." Koblenz, 2016. http://d-nb.info/1119804043/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Graf, Jonathan Peter. "Optimizing Programmable Logic Design Security Strategies." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/89920.

Full text
Abstract:
A wide variety of design security strategies have been developed for programmable logic devices, but less work has been done to determine which are optimal for any given design and any given security goal. To address this, we consider not only metrics related to the performance of the design security practice, but also the likely action of an adversary given their goals. We concern ourselves principally with adversaries attempting to make use of hardware Trojans, although we also show that our work can be generalized to adversaries and defenders using any of a variety of microelectronics exp
APA, Harvard, Vancouver, ISO, and other styles
21

Lázaro, Pablo García-Crovetto. "Forensic Computing from a Computer Security perspective." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2421.

Full text
Abstract:
<p>This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. </p><p>Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. </p><p>Using a Computer Security perspective for analysing why the incorrect security management generates problems in the
APA, Harvard, Vancouver, ISO, and other styles
22

Larsson, Nicklas, and Kim Hallén. "Informationsklassificering : ett styrdokument för klassificering av informationssystem." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6126.

Full text
Abstract:
<p>Hantering av information blir allt viktigare i dagens informationssamhälle då information är en av de värdefullaste tillgångarna för verksamheter. Syftet med uppsatsen har varit att skapa ett styrdokument för IT-administratörer som hjälper dem vid klassificering av informationssystem. Styrdokumentet har som uppgift att kontrollera att informationssystem lever upp till verksamheternas krav som finns på konfidentialitet, integritet, tillgänglighet och spårbarhet. Styrdokumentets vetenskapliga värde har verifierats genom att utvalda IT-administratörer undersökt och utvärderat styrdokumentet. R
APA, Harvard, Vancouver, ISO, and other styles
23

Almberg, Tilde, and Frida Gustafsson. "På ungdomars uppdrag : En kvalitativ studie om kuratorers tankar om och erfarenheter av möten med ungdomar." Thesis, Stockholms universitet, Institutionen för socialt arbete - Socialhögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-105736.

Full text
Abstract:
The aim of this study was to investigate how counselors who work at youth clinics relate to the question of the integrity of adolescents who are under 18 years old in relation to the parents rights to information. The study was based on semi-structured interviews with eight counselors from youth clinics in the StockholmCounty. We have analyzed our empirical material by categorizing the statements from the counselors and by using two different theories. The first one is a consequential ethics theory and the second one is a cognitive theory. These two theories have helped us to understand the th
APA, Harvard, Vancouver, ISO, and other styles
24

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Full text
Abstract:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du nive
APA, Harvard, Vancouver, ISO, and other styles
25

Pecl, David. "Návrh metody pro hodnocení bezpečnostních zranitelností systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413067.

Full text
Abstract:
The thesis deals with the assessment of security vulnerabilities. The aim of this work is to create a new method of vulnerability assessment, which will better prioritize critical vulnerabilities and reflect parameters that are not used in currently used methods. Firstly, it describes the common methods used to assess vulnerabilities and the parameters used in each method. The first described method is the Common Vulnerability Scoring System for which are described all three types of scores. The second analysed method is OWASP Risk Rating Methodology. The second part is devoted to the design o
APA, Harvard, Vancouver, ISO, and other styles
26

Enany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.

Full text
Abstract:
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented
APA, Harvard, Vancouver, ISO, and other styles
27

Qahur, Al Mahri Hassan Musallam Ahmed. "Analysis of selected block cipher modes for authenticated encryption." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/119361/1/Hassan%20Musallam%20Ahmed_Qahur%20Al%20Mahri_Thesis.pdf.

Full text
Abstract:
Information assets stored or transmitted electronically require protection from unauthorised disclosure or modification. Authenticated encryption provides both confidentiality and integrity assurance services. This research examines the security of four authenticated encryption block cipher modes submitted to the recent cryptographic competition CAESAR: ++AE, OTR, XEX/XE and AEZ. Flaws in these designs were identified and forgery attacks exploiting these flaws were proposed. Certain modes were shown to be vulnerable to fault attacks. This work contributes to both the CAESAR evaluation process
APA, Harvard, Vancouver, ISO, and other styles
28

Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.

Full text
Abstract:
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own desig
APA, Harvard, Vancouver, ISO, and other styles
29

de, Souza Jaqueline. "Comparison of Liberty Alliance and OpenID regarding their ability to protect the confidentiality, integrity and availability of the users’ information : a study based on the analysis of resistance to common attacks." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4424.

Full text
Abstract:
It is essential to solve the problem due to password fatigue in order to increase the security of the transactions on the Web and secure the users’ account and information. Web Single Sign-On is one of the techniques that have been created to solve these issues. Unfortunately, this method creates new opportunities for hackers. The Liberty Alliance and OpenID are two of the most known Web Single Sign-On frameworks. This work intends to review the strengths and the weaknesses of both regarding their ability to protect the confidentiality, integrity and availability of the users’ information, by
APA, Harvard, Vancouver, ISO, and other styles
30

Hoolash, Mahendranath. "E-securité, e-confidentialité et e-integrité." Aix-Marseille 3, 2001. http://www.theses.fr/2001AIX30083.

Full text
Abstract:
La trilogie : e-confidentialité, e-sécurité et e-intégrité, détermine la valeur d'une information sur le web. La sécurité des systèmes d'information (SSI) a pour but de garantir la valeur des informations qu'on utilise. Si cette garantie n'est plus assurée, on dira que le système d'information a été altéré (corrupted). Une altération. Il est donc indispensable d'assurer la protection de l'information de l'entreprise lorsqu'elle est stockée sans précautions sur le disque dur d'un ordinateur relié à internet, Car. Elle peut être lue, copiée, modifiée ou détruite à partir d'un poste de travail si
APA, Harvard, Vancouver, ISO, and other styles
31

Kauffmann-Tourkestansky, Xavier. "Analyses sécuritaires de code de carte à puce sous attaques physiques simulées." Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00771273.

Full text
Abstract:
Cette thèse s'intéresse aux effets des attaques par fautes physiques sur le code d'un système embarqué en particulier la carte à puce. De telles attaques peuvent compromettre la sécurité du système en donnant accès à des informations confidentielles, en compromettant l'intégrité de données sensibles ou en perturbant le fonctionnement pendant l'exécution. Dans cette thèse, nous décrivons des propriétés de sécurité permettant d'exprimer les garanties du système et établissons un modèle d'attaque de haut niveau définissant les capacités d'un attaquant à modifier le système. Ces propriétés et ce m
APA, Harvard, Vancouver, ISO, and other styles
32

Mahfoud, Houari. "Contrôle d'accès efficace pour des données XML : problèmes d'interrogation et de mise-à-jour." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0011/document.

Full text
Abstract:
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le but de la réplication de données au sein de différents sites est de minimiser le temps d'accès à ces données partagées. Cependant, différents problèmes sont liés à la sécurisation de ces données. Le but de cette thèse est de proposer des modèles de contrôles d'accès XML qui prennent en compte les droits de lecture et de mise-à-jour et qui permettent de surmonter les limites des modèles qui existent. Nous considérons les langages XPath et XQuery Update Facility pour la formalisation des requêtes
APA, Harvard, Vancouver, ISO, and other styles
33

Leung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.

Full text
Abstract:
The project aims at solving the problem of non-repudiation, integrity and confidentiality of data when digitally exchanging sensitive resources between parties that need to be able to trust each other without the need for a trusted third party. This is done in the framework of answering to what extent digital resources can be shared securely in a decentralized public ledger-based system compared to trust-based alternatives. A background of existing resource sharing solutions is explored which shows an abundance third party trust-based systems, but also an interest in public ledger solutions in
APA, Harvard, Vancouver, ISO, and other styles
34

Zajíček, Juraj. "Návrh metodiky analýzy rizik kritických aplikací v bankovním sektoru." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2018. http://www.nusl.cz/ntk/nusl-382716.

Full text
Abstract:
This diploma thesis deals with the problem of risk analysis of critical applications in banking. The sponsor is the bank operating in the Czech Republic. The thesis is based on the theoretical apparatus in the field of information security and legal normatives of the Czech Republic. The thesis analyzes the laws and directives related to the issue of risk analysis, the bank's internal regulations and the previous analyzes carried out in the bank.
APA, Harvard, Vancouver, ISO, and other styles
35

Mahfoud, Houari. "Contrôle d'accès efficace pour des données XML : problèmes d'interrogation et de mise-à-jour." Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0011.

Full text
Abstract:
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le but de la réplication de données au sein de différents sites est de minimiser le temps d'accès à ces données partagées. Cependant, différents problèmes sont liés à la sécurisation de ces données. Le but de cette thèse est de proposer des modèles de contrôles d'accès XML qui prennent en compte les droits de lecture et de mise-à-jour et qui permettent de surmonter les limites des modèles qui existent. Nous considérons les langages XPath et XQuery Update Facility pour la formalisation des requêtes
APA, Harvard, Vancouver, ISO, and other styles
36

Bolin, Agnes, Julia Petersson, and Johanna Sjöholm. "Skydd av elektroniska patientjournaler – en studie om faktorer för olovlig läsning." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10448.

Full text
Abstract:
I vården är det idag många anställda som kräver åtkomst till patientjournaler. Detta medför att informationen måste vara lättåtkomlig när behoven uppstår. Att skydda patienters integritet är samtidigt mycket viktigt och att inte riskera att några uppgifter läcker ut. Ett problem är att vårdpersonal kan läsa patientjournaler utan att ha behörighet för detta.Studien belyser ett dilemma mellan vårdpersonals etiska inställning till informationssystem i förhållande till hur systemen skyddas. Ena sidan av dilemmat fokuserar på hur benägen vårdpersonal i Sverige är till att medvetet otillåtet läsa el
APA, Harvard, Vancouver, ISO, and other styles
37

Akimana, Rachel. "Grid Fault management techniques: the case of a Grid environment with malicious entities." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210460.

Full text
Abstract:
<p>La tolérance et la gestion des fautes dans les grilles de données/calcul est d’une importance capitale. En effet, comme dans tout autre système distribué, les composants d’une grille sont susceptibles de tomber en panne à tout moment. Mais le risque de panne croît avec la taille du système, et est donc plus exacerbé dans un système de grille. En plus, tout en essayant de mettre à profit les ressources offertes par la grille, les applications tournant sur celle-ci sont de plus en plus complexes (ex. impliquent des interactions complexes, prennent des jours d’exécution), ce qui les rend plus
APA, Harvard, Vancouver, ISO, and other styles
38

Holmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.

Full text
Abstract:
Today’s massive usage of smartphones has put a high demand on all application developers in the matter of security. For us to be able to keep using all existing and new applications, a process that removes significant security vulnerabilities is essential. To remove these vulnerabilities, the applications have to be tested. In this thesis, we identify six methods for functional and security testing of client-server applications running Android and Python Flask. Regarding functional testing, we implement Espresso testing and RESTful API testing. In regards to the security testing of the system,
APA, Harvard, Vancouver, ISO, and other styles
39

Касянчук, Н. В., та Л. М. Ткачук. "Захист інформації в базах даних". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24448.

Full text
Abstract:
В даній статті розглянуто питання захисту інформації в базах даних та методи їх захисту. Проаналізовано основні методи захисту інформацію в базах даних,виявлено їх позитивні та негативні сторони. А також в даній роботі розглянуто основні моделі безпеки для організації доступу до бази даних та процедури ідентифікації, аутентифікації та авторизації в СУБД.<br>This article deals with the protection of information in databases and methods of protection. The basic methods of protecting information in databases revealed their positive and negative sides. Also in this paper, the basic security model
APA, Harvard, Vancouver, ISO, and other styles
40

Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.

Full text
Abstract:
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, consid
APA, Harvard, Vancouver, ISO, and other styles
41

Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.

Full text
Abstract:
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, consid
APA, Harvard, Vancouver, ISO, and other styles
42

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
43

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
44

Buys, Pieter Willem. "The legitimacy predicament of current day accounting theory / Pieter Willem Buys." Thesis, North-West University, 2010. http://hdl.handle.net/10394/4578.

Full text
Abstract:
Recent corporate reporting history is well–known for its corporate failures and questionable accountancy practices, many of which caused the profession to be frowned upon. However, the splodge on the accounting profession?s reputation goes deeper than its corporate reporting failures. The scientific foundation thereof is also being questioned in academic circles. Even though accounting scholars have been trying to formulate foundational accounting theories, it has been the accounting regulators that have been more successful in promoting their versions of what accounting theory should be, whic
APA, Harvard, Vancouver, ISO, and other styles
45

Gorayeb, Diana Maria da Câmara. "Gestão de continuidade de negócios aplicada no ensino presencial mediado por recursos tecnológicos." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-08052012-115710/.

Full text
Abstract:
Este trabalho propõe diretrizes de Gestão de Continuidade de Negócios (GCN) para a tecnologia de Ensino Presencial Mediado por Recursos Tecnológicos (EPMRT), que conta, para a realização de suas atividades acadêmicas, com um sistema complexo para transmissão de aulas e exige um grande esforço para o controle das suas operações e das respostas coordenadas diante de erros, falhas e defeitos, ou quaisquer incidentes que resultem na interrupção das suas atividades. A manutenção deste ambiente tecnológico está relacionada com a implantação de processos eficientes de gestão de risco e do ciclo de me
APA, Harvard, Vancouver, ISO, and other styles
46

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Full text
Abstract:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discu
APA, Harvard, Vancouver, ISO, and other styles
47

Sandén, Ulrika. "Sekretess och tystnadsplikt inom offentlig och privat hälso- och sjukvård : ett skydd för patientens integritet." Doctoral thesis, Umeå universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-45818.

Full text
Abstract:
This thesis focuses on the protection of the patient’s privacy in health care in Sweden. It is crucially important that the patient has confidence in the health care and that patient data are kept secret from other persons and authorities. A patient who is unsure about secrecy and confidentiality may choose not to provide data that could prove necessary for health care personnel to arrive at an accurate diagnosis. Some individuals might even avoid seeking medical help from fear that data may be spread to outsiders. Inadequate protection of sensitive data may lead to the confidence of citizens
APA, Harvard, Vancouver, ISO, and other styles
48

Attasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.

Full text
Abstract:
Les systèmes d’information décisionnels dans le cloud Computing sont des solutions de plus en plus répandues. En effet, ces dernières offrent des capacités pour l’aide à la décision via l’élasticité des ressources pay-per-use du Cloud. Toutefois, les questions de sécurité des données demeurent une des principales préoccupations notamment lorsqu'il s’agit de traiter des données sensibles de l’entreprise. Beaucoup de questions de sécurité sont soulevées en terme de stockage, de protection, de disponibilité, d'intégrité, de sauvegarde et de récupération des données ainsi que des transferts des do
APA, Harvard, Vancouver, ISO, and other styles
49

Pierrot, David. "Détection dynamique des intrusions dans les systèmes informatiques." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE2077.

Full text
Abstract:
La démocratisation d’Internet, couplée à l’effet de la mondialisation, a pour résultat d’interconnecter les personnes, les états et les entreprises. Le côté déplaisant de cette interconnexion mondiale des systèmes d’information réside dans un phénomène appelé « Cybercriminalité ». Des personnes, des groupes mal intentionnés ont pour objectif de nuire à l’intégrité des systèmes d’information dans un but financier ou pour servir une cause. Les conséquences d’une intrusion peuvent s’avérer problématiques pour l’existence d’une entreprise ou d’une organisation. Les impacts sont synonymes de perte
APA, Harvard, Vancouver, ISO, and other styles
50

Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Full text
Abstract:
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!