Dissertations / Theses on the topic 'Integrity Confidentiality'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Integrity Confidentiality.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Miklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Full textRanj, Bar Amin. "Confidentiality and integrity management in online systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.
Full textShi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.
Full textFerradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.
Full textLiu, Baolong. "XML security in XML data integrity, authentication, and confidentiality." Thesis, University of Huddersfield, 2010. http://eprints.hud.ac.uk/id/eprint/9671/.
Full textRocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.
Full textChen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.
Full textLindner, Patricia J. "Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1554911833066868.
Full textSolum, Erik. "Achieving over-the-wire configurable confidentiality, integrity, authentication and availability in GridStat's status dissemination." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/e_solum_121807.pdf.
Full textPanchapakesan, Santosh Kumar. "Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity." [Ames, Iowa : Iowa State University], 2008.
Find full textRaheem, Muhammad. "Evaluation of Cryptographic Packages." Thesis, Linköping University, Linköping University, Information Theory, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-17441.
Full textDukes, Renata. "Proposed iNET Network Security Architecture." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605971.
Full textRadvärn, Johan. "CRM-system och utmaningar för dataskydd inom detaljhandel." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-41987.
Full textWang, Yongzhi. "Constructing Secure MapReduce Framework in Cloud-based Environment." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2238.
Full textGeihs, Matthias [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Ahto [Akademischer Betreuer] Buldas. "Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions / Matthias Geihs ; Johannes Buchmann, Ahto Buldas." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169305288/34.
Full textVahldiek-Oberwagner, Anjo Lucas [Verfasser], and Peter [Akademischer Betreuer] Druschel. "Techniques to Protect Confidentiality and Integrity of Persistent and In-Memory Data / Anjo Lucas Vahldiek-Oberwagner ; Betreuer: Peter Druschel." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2019. http://d-nb.info/1177797216/34.
Full textMužilová, Gabriela. "Návrh zavedeni DMS systému v organizační složce společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241417.
Full textSandelius, Johnna, and Louise Sundberg. "Vuxna patienters erfarenheter av bedsiderapportering : En litteraturöversikt." Thesis, Ersta Sköndal Bräcke högskola, Institutionen för vårdvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:esh:diva-6800.
Full textKasten, Andreas [Verfasser], Rüdiger [Gutachter] Grimm, and Ansgar [Gutachter] Scherp. "Secure semantic web data management : confidentiality, integrity, and compliant availability in open and distributed networks / Andreas Kasten ; Gutachter: Rüdiger Grimm, Ansgar Scherp." Koblenz, 2016. http://d-nb.info/1119804043/34.
Full textGraf, Jonathan Peter. "Optimizing Programmable Logic Design Security Strategies." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/89920.
Full textLázaro, Pablo García-Crovetto. "Forensic Computing from a Computer Security perspective." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2421.
Full textLarsson, Nicklas, and Kim Hallén. "Informationsklassificering : ett styrdokument för klassificering av informationssystem." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6126.
Full textAlmberg, Tilde, and Frida Gustafsson. "På ungdomars uppdrag : En kvalitativ studie om kuratorers tankar om och erfarenheter av möten med ungdomar." Thesis, Stockholms universitet, Institutionen för socialt arbete - Socialhögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-105736.
Full textHussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Full textPecl, David. "Návrh metody pro hodnocení bezpečnostních zranitelností systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413067.
Full textEnany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.
Full textQahur, Al Mahri Hassan Musallam Ahmed. "Analysis of selected block cipher modes for authenticated encryption." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/119361/1/Hassan%20Musallam%20Ahmed_Qahur%20Al%20Mahri_Thesis.pdf.
Full textElis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.
Full textde, Souza Jaqueline. "Comparison of Liberty Alliance and OpenID regarding their ability to protect the confidentiality, integrity and availability of the users’ information : a study based on the analysis of resistance to common attacks." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4424.
Full textHoolash, Mahendranath. "E-securité, e-confidentialité et e-integrité." Aix-Marseille 3, 2001. http://www.theses.fr/2001AIX30083.
Full textKauffmann-Tourkestansky, Xavier. "Analyses sécuritaires de code de carte à puce sous attaques physiques simulées." Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00771273.
Full textMahfoud, Houari. "Contrôle d'accès efficace pour des données XML : problèmes d'interrogation et de mise-à-jour." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0011/document.
Full textLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Full textZajíček, Juraj. "Návrh metodiky analýzy rizik kritických aplikací v bankovním sektoru." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2018. http://www.nusl.cz/ntk/nusl-382716.
Full textMahfoud, Houari. "Contrôle d'accès efficace pour des données XML : problèmes d'interrogation et de mise-à-jour." Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0011.
Full textBolin, Agnes, Julia Petersson, and Johanna Sjöholm. "Skydd av elektroniska patientjournaler – en studie om faktorer för olovlig läsning." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10448.
Full textAkimana, Rachel. "Grid Fault management techniques: the case of a Grid environment with malicious entities." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210460.
Full textHolmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.
Full textКасянчук, Н. В., та Л. М. Ткачук. "Захист інформації в базах даних". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24448.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textBuys, Pieter Willem. "The legitimacy predicament of current day accounting theory / Pieter Willem Buys." Thesis, North-West University, 2010. http://hdl.handle.net/10394/4578.
Full textGorayeb, Diana Maria da Câmara. "Gestão de continuidade de negócios aplicada no ensino presencial mediado por recursos tecnológicos." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-08052012-115710/.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textSandén, Ulrika. "Sekretess och tystnadsplikt inom offentlig och privat hälso- och sjukvård : ett skydd för patientens integritet." Doctoral thesis, Umeå universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-45818.
Full textAttasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Full textPierrot, David. "Détection dynamique des intrusions dans les systèmes informatiques." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE2077.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full text