To see the other types of publications on this topic, follow the link: LTE Security.

Dissertations / Theses on the topic 'LTE Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'LTE Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Full text
Abstract:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du nive
APA, Harvard, Vancouver, ISO, and other styles
2

DeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.

Full text
Abstract:
Modern cellular networks including LTE (Long Term Evolution) and the evolving LTE- Advanced provide high-speed and high-capacity data services for mobile users. As we become more reliant on wireless connectivity, the security of voice and data transmissions on the network becomes increasingly important. While the LTE network standards provide strict security guidelines, these requirements may not be completely followed when LTE networks are deployed in practice. This project provides a method for improving the security of LTE networks by 1) characterizing a gap between security requirements de
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.

Full text
Abstract:
Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. Accordingly, a major interest in academic research on formal methods for protocol analysis has been apparent for the last two decades. Such methods formalize the operational semantics of a protocol, laying the base for protocol verification with automatic model checking tools. So far, little work in this field has focused on protocol standardization. Within this thesis
APA, Harvard, Vancouver, ISO, and other styles
4

Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.

Full text
Abstract:
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Statio
APA, Harvard, Vancouver, ISO, and other styles
5

Shahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.

Full text
Abstract:
This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto' air-interface of most wireless broadband standards including LTE and WiMAX. The major contributions of this dissertation are: 1) developing jamming taxonomy, 2) proposing OFDM and MIMO equalization jamming attacks and countermeasures, 3) developing antijam (AJ) MIMO systems, and 4) designing null space projected overlapped-MIMO radar waveform for spectrum sharing between radar and communications s
APA, Harvard, Vancouver, ISO, and other styles
6

Pestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.

Full text
Abstract:
In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. In this thesis, afuzzer was developed targeting an E-UTRAN Node B (eNB) in the Long-Term Evolution(LTE) landscape. The eNB is current prototype and is from the company Ericsson. Thefuzzer is particularly designed for testing the Medium Access Control (MAC) layer of theeNB. The fuzzer uses a genetic method where all of the fuzzer’s flags (the R, F2,
APA, Harvard, Vancouver, ISO, and other styles
7

BETTASSA, COPET PIERGIUSEPPE. "User-friendly Formal Methods for Security-aware Applications and Protocols." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644847.

Full text
Abstract:
Formal support in the design and implementation of security-aware applications increases the assurance in the final artifact. Formal methods techniques work by setting a model that unambiguously defines attacker capabilities, protocol parties behavior, and expected security properties. Rigorous reasoning can be done on the model about the interaction of the external attacker with the protocol parties, assessing whether the security properties hold or not. Unfortunately, formal verification requires a high level of expertise to be used properly and, in complex systems, the model analysis r
APA, Harvard, Vancouver, ISO, and other styles
8

Parvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.

Full text
Abstract:
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand,
APA, Harvard, Vancouver, ISO, and other styles
9

Legonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.

Full text
Abstract:
Small cells are deployed in a crowded areas with a high demand for both coverage and capacity. It is hard to address both of these requirements simultaneous with a conventional mobile network architecture based on macro cells. In many case a wire is not available to connect the small cell to the core of the mobile network. Under these circumstances a wireless link could be a convenient solution for the backhaul. In this master’s thesis IEEE 802.11n technology was evaluated to assess its suitability for backhaul from a small wireless cell. The performance of wireless equipment manufactured by s
APA, Harvard, Vancouver, ISO, and other styles
10

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to
APA, Harvard, Vancouver, ISO, and other styles
11

Hutchinson, Simon James. "Investigation of late time response analysis for security applications." Thesis, Manchester Metropolitan University, 2015. http://e-space.mmu.ac.uk/608771/.

Full text
Abstract:
The risk of armed attack by individual’s intent on causing mass casualties against soft targets, such as transport hubs continues. This has led to an increased need for a robust, reliable and accurate detection system for concealed threat items. This new system will need to improve upon existing detection systems including portal based scanners, x-ray scanners and hand held metal detectors as these all suffer from drawbacks of limited detection range and relatively long scanning times. A literature appraisal has been completed to assess the work being undertaken in the relevant field of Concea
APA, Harvard, Vancouver, ISO, and other styles
12

Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.

Full text
Abstract:
Dans un monde fortement dépendant de la communication de données distribuées, la conception d’infrastructures sécurisées est une tâche cruciale. Les systèmes et réseaux distribués prennent de plus en plus d’importance, car la plupart des services et des possibilités qui caractérisent la société moderne sont basés sur ces technologies.La communication entre les agents sur les réseaux a donc suscité un grand intérêt pour la recherche. Afin de fournir des moyens de communication efficaces et fiables, de plus en plus de protocoles de communication sont inventés, et pour la plupart d’entre eux, la
APA, Harvard, Vancouver, ISO, and other styles
13

Yao, Håkansson Jonathan, and Niklas Rosencrantz. "Formal Verification of Hardware Peripheral with Security Property." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807.

Full text
Abstract:
One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that the security is an important issue to look at.The aim of our project is to see in which cases hardware peripherals can be trusted. We built amodel of the universal asynchronous transmitter/receiver (UART), a model of the main memory(RAM) and a model of a DMA controller. We analysed interaction between hardware peripherals,user processes and the mai
APA, Harvard, Vancouver, ISO, and other styles
14

Dykas, Matthew Jason. "Attachment security and the processing of attachment-relevant social information in late adolescence." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3488.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Psychology. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
15

Eneroth, Nathanael. "Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240425.

Full text
Abstract:
The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. To achieve this, a mobile service subscriber can no longer be bound to a single network provided by a single operator. Thus, roaming constitutes a key pillar in shaping the connected society Local Breakout (LBO) Voice over Long-Term Evolution (VoLTE) roaming enables a mobile service subscriber to breakout from its
APA, Harvard, Vancouver, ISO, and other styles
16

Alegre, Alberto. "Parental behaviors and late adolescents' adjustment: The role of emotional security and emotional intelligence." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26056.

Full text
Abstract:
Based on hypothesized relations advanced by Cummings and Davies (1995), the current study tests the hypothesis that parental availability and parental control, experienced during middle adolescence, relate to late adolescentsâ adjustment through influence on their emotional security. The study also examines the role of late adolescentsâ emotional intelligence and its relationship with parental behaviors, emotional security, and adolescentsâ adjustment. This study proposes a model of relationships where emotional security and emotional intelligence influence each other and mediate the rel
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Andrew Wei Tien. "A framework for supporting anonymity in text-based online conversations /." Gold Coast, QLD : Bond University, 2001. http://epublications.bond.edu.au/theses/lee.

Full text
Abstract:
Thesis (MSc(CompSc) -- Bond University, 2001.<br>"A thesis submitted to Bond University in fulfillment of the requirements for the degree of Masters of Science in Computer Science"-- t.p. Bibliography: leaves 124-125. Also available via the World Wide Web.
APA, Harvard, Vancouver, ISO, and other styles
18

Frenn, Evan. "Towards a Trustworthy Thin Terminal for Securing Enterprise Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/300.

Full text
Abstract:
Organizations have many employees that lack the technical knowledge to securely operate their machines. These users may open malicious email attachments/links or install unverified software such as P2P programs. These actions introduce significant risk to an organization's network since they allow attackers to exploit the trust and access given to a client machine. However, system administrators currently lack the control of client machines needed to prevent these security risks. A possible solution to address this issue lies in attestation. With respect to computer science, attestation is the
APA, Harvard, Vancouver, ISO, and other styles
19

Cook, Joshua Lee. "Employees' Perceptions About the Deterrence Effect of Polygraph Examination Against Security Compromises." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1844.

Full text
Abstract:
Controversy continues over the use of polygraph testing to deter and detect potential leakers as critics argue that the technique is based on faulty assumptions. The purpose of this descriptive and exploratory research study was to determine whether there was a perceived deterrence effect related to the use of polygraphs between a group of participants who were subjected to a polygraph examination within the past year compared to those who have not experienced a polygraph examination within the same time period. Paternoster and Simpson's, as well as Vance and Siponen's, rational choice models
APA, Harvard, Vancouver, ISO, and other styles
20

Bosnjak, Ljubica. "The contribution of attachment security/insecurity and self-esteem to identity formation in late adolescence." Master's thesis, Australian Catholic University, 2003. https://acuresearchbank.acu.edu.au/download/cc960b33f757fa396491f9f45e6ed2dc0b0219784ef8ea5e2ef8cd8eeda24c59/3822524/Bosnjak_2003_The_contribution_of_attachment_security_insecurity.pdf.

Full text
Abstract:
This study examined the contribution of attachment security/insecurity and self-esteem to identity formation. A convenience sample of 120 volunteer university students, 106 women and 14 men, aged between 18-25 years, participated in this study. The Extended Objective Measure of Ego Identity Status-Two, (EOMEIS -2), (Adams, Bennion & Huh, 1989) was used to measure the participants' identity status, the Adult Attachment Scale (AAS) (Collins and Read, 1990) to measure attachment styles and the Self-Liking Self-Competence Scale (SLSC) (Tafarodi and Swann, 1995) to measure self - esteem. A Hierarch
APA, Harvard, Vancouver, ISO, and other styles
21

Tyler, Lamonte Bryant. "Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.

Full text
Abstract:
Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical fa
APA, Harvard, Vancouver, ISO, and other styles
22

Yoon, Seongwon. "Distorted security discourses : the ROK's securitisation of the Korean nuclear crisis, 2003-2013." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15865.

Full text
Abstract:
South Korea’s security discourse on the nuclear threat posed by North Korea has been dichotomised by its position within the political spectrum between the progressives and conservatives. By drawing upon Securitisation Theory (ST), this study challenges the current security discourse in South Korea, which has divided and misled the public as well as securitising actors. This study examines the security discourses of the Roh Moo-hyun (2003–2008) and Lee Myung-bak (2008–2013) administrations, since they represent the archetypes of the progressives and conservatives respectively. The results of t
APA, Harvard, Vancouver, ISO, and other styles
23

Yoon, Seongwon. "Distorted Security Discourses. The ROK’s Securitisation of the Korean Nuclear Crisis, 2003–2013." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15865.

Full text
Abstract:
South Korea’s security discourse on the nuclear threat posed by North Korea has been dichotomised by its position within the political spectrum between the progressives and conservatives. By drawing upon Securitisation Theory (ST), this study challenges the current security discourse in South Korea, which has divided and misled the public as well as securitising actors. This study examines the security discourses of the Roh Moo-hyun (2003–2008) and Lee Myung-bak (2008–2013) administrations, since they represent the archetypes of the progressives and conservatives respectively. The results of t
APA, Harvard, Vancouver, ISO, and other styles
24

Paulauskas, Nerijus. "Analysis of Computer System Incidents and Security Level Evaluation." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090610_130504-11943.

Full text
Abstract:
The problems of incidents arising in computer networks and the computer system security level evaluation are considered in the thesis. The main research objects are incidents arising in computer networks, intrusion detection systems and network scanning types. The aim of the thesis is the investigation of the incidents in the computer networks and computer system security level evaluation. The following main tasks are solved in the work: classification of attacks and numerical evaluation of the attack severity level evaluation; quantitative evaluation of the computer system security level; inv
APA, Harvard, Vancouver, ISO, and other styles
25

Jastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.

Full text
Abstract:
Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information security management in this thesis, and new information security management solutions are searched in the in
APA, Harvard, Vancouver, ISO, and other styles
26

Vasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.

Full text
Abstract:
This work is of theoretical and practical importance, that is, generation of new knowledge associated with mobile commerce adoption in terms of security concerns and trust which will help not only future researchers but also e-businesses. Despite the fact researchers have examined the adoption of m-commerce in a holistic way, the author found there was no research focusing solely and in-depth on the determinants of trust and perceived risk. The problem was to examine how the above determinants affect the intention to adopt m-commerce. The objects are mobile commerce, security concerns and trus
APA, Harvard, Vancouver, ISO, and other styles
27

Ravndal, Ellen Jenny. "A force for peace : expanding the role of the UN Secretary-General under Trygve Lie, 1946-1953." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:4524630e-0f72-4169-b3e3-c53d250a3424.

Full text
Abstract:
The UN secretary-general plays an important political role in world politics, yet the UN Charter describes him merely as "the chief administrative officer of the Organization". How did such a development come about? The existing narrative tends to emphasise the contribution made by Dag Hammarskjöld, the United Nation's second secretary-general from 1953 to 1961. This thesis argues that there are two problems with this narrative. First, it overlooks the precedents set under the first UN secretary-general, Trygve Lie, who was in office from 1946 to 1953. Second, it places too much emphasis on t
APA, Harvard, Vancouver, ISO, and other styles
28

Eriksson-Asp, Ebba, and Berglund Katarina Inta. "Betala nu, senare eller lite då och då : En kvalitativ studie om betalningsmetoders betydelse för svenska konsumenters köpprocess online." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-46039.

Full text
Abstract:
The growing e-commerce market has fundamentally changed the consumption behaviors among swedes, and it is more popular than ever for people to carry out their everyday transactions online. These new shopping opportunities place different demands on the consumer compared to traditional shopping, and the consumer behavior has come to include more analysis regarding risk and security especially when it comes to the final payment step. This study therefore aims to create an understanding of consumers' experience of the importance of payment methods during the online buying process. To execute this
APA, Harvard, Vancouver, ISO, and other styles
29

Aleksa, Karolis. "The Impact of the US Military Transformation on Russian and Chinese Security Policy." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121211_095626-96389.

Full text
Abstract:
Although US remained the strongest military power in international system after the Cold War, it was still deeply concerned how to retain its military dominance in the longer term, that could guarantee US further predominance in solving major international issues. Three US military transformation initiatives, namely the transformation of the US conventional forces, the development of missile defence systems and long-range conventional precision-strike capability, are considered as the main instruments to maintain US military dominance in the future. Considering that for Russia and China, which
APA, Harvard, Vancouver, ISO, and other styles
30

Ališauskaitė, Vaida. "Kompiuterių tinklų saugos modelių sudarymas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080128_103419-62847.

Full text
Abstract:
Magistriniame darbe išanalizuoti įvairios paskirties saugos modeliai. Pagal gautus rezultatus sudarytas apibendrintas informacijos saugos praradimo riziką įvertitnantis kompiuterių tinklų saugos modelis. Sukurta grėsmę keliančius įvykius aptinkanti sistema.<br>The master's work analysis different types of security models. It also proposes a new computer network security reference model, which includes risk management process. A suspicious network events detection system is designed to make network monitoring easier.
APA, Harvard, Vancouver, ISO, and other styles
31

Miškelevičius, Andrius. "Bankinių apmokėjimų pranešimų perdavimo sauga." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102917-11422.

Full text
Abstract:
Šiais laikais daugelis bankinių atsiskaitymų vyksta elektroninėje erdvėje. Operatyvumas bei patogumas per kelis dešimtmečius bankines sistemas integravo į viso pasaulio verslą. Vis populiarėjant e. komercijai elektroninės bankininkystės sistemos integravosi į WEB aplikacijas, kuriomis gali naudotis visi elektroninės erdvės vartotojai. Atsiskaitymai elektroninėje erdvėje sukuria didelę pridėtinę vertę visai ekonomikai tačiau dėl didelio panaudojimo masto išaugo ir opios saugumo grėsmės. Dėl piktavališkų veiksmų el.erdvėje per metus padaroma žala siekia 1 trilijoną dolerių, dėl šių patiriamų did
APA, Harvard, Vancouver, ISO, and other styles
32

Tauginas, Tomas. "Lieutva Europos ir euroatlantinėje saugumo sistemose: raida, dabartis, ateities perspektyvos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_094852-62582.

Full text
Abstract:
This Final Paper consists of analysis of NATO and EU role to Lithuanian security by identifying our days and future threats to Lithuanian security and identification of the future of the Lithuanian security policy. In the first part of this final paper was glanced through NATO and EU CFSP and DP history, highlighting problems of EU integration to Euroatlantic security. It can be assumed that more then half of continuing Cold War century NATO has assured the creation and the welfare of Eastern Europe. The collective defense remains further of one’s NATO functions, by that time EU is not respo
APA, Harvard, Vancouver, ISO, and other styles
33

Cipière, Sébastien. "Un système de médiation distribué pour l'e-santé et l'épidémiologie." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22716/document.

Full text
Abstract:
À ce jour, les mesures de risque des cancers ou d’efficacité de leur suivi, se font à partir de recueils de données médicales spécifiques initiés par les médecins épidémiologistes. Ces recueils disposent néanmoins de certaines limites : perte d’information, biais de déclaration, absence de données pour un risque non connu, biais de mesure (par exemple pour les données de nature médico-économiques). Le partage sécurisé de données médicales entre différentes structures médicales publiques et/ou privées est à ce jour en pleine mutation technologique. Les technologies proposées doivent rendre poss
APA, Harvard, Vancouver, ISO, and other styles
34

Grabliauskaitė, Aušra. "ES šiaurinio regiono vaidmuo įgyvendinant ES energetinį saugumą XXI amžiuje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090612_103411-39900.

Full text
Abstract:
Pagrindinis darbo tikslas yra išanalizuoti Europos Sąjungos šiaurinio regiono, akcentuojant Rusijos Federacijos ir Norvegijos Karalystės įtaką regione, vaidmenį, užtikrinant energetinį saugumą Europos Sąjungoje, bei numatyti galimas ES energetikos politikos perspektyvas netolimoje ateityje. Siekiant geriau atskleisti darbo tikslą, keliami šie uždaviniai: apibrėžti saugumo sąvokos pagrindines dimensijas, veiksnius bei regioninio saugumo komplekso svarbą ir reikšmę Europos Sąjungos kontekste; atskleisti Europos Sąjungos šiaurinio ir Arkties regionų vaidmenį ES energetikos politikoje; išanalizuot
APA, Harvard, Vancouver, ISO, and other styles
35

Brobliauskas, Žilvinas. "Reliacinių duomenų bazių saugumo modelio tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090828_133828-02790.

Full text
Abstract:
Žilvino Brobliausko magistro studijų baigiamajame darbe atliekamas daugiašalio reliacinių duomenų bazių saugumo modelio teorinis tyrimas: suformuluojami pagrindiniai reikalavimai, keliami tokio tipo modeliui; pasiūlomas modelis, leidžiantis vykdyti paiešką ir taikyti sumos, bei vidurkio agregatines funkcijas neiššifruojant skaitinių duomenų RDBVS pusėje; nurodomi pateikto modelio privalumai ir trūkumai. Pateikiama demonstracinė programa, realizuojanti pasiūlytą modelį.<br>The multilateral security model of relational databases is analyzed in master thesis of Žilvinas Brobliauskas. The results
APA, Harvard, Vancouver, ISO, and other styles
36

Delettre, Christian. "Plateforme ouverte, évolutive, sécurisée et orientée utilisateur pour l'e-commerce." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4111/document.

Full text
Abstract:
De nos jours, l’e-commerce est devenu un écosystème complexe où de multiples solutions (en termes de plateforme) sont possibles et réalisables pour un e-commerçant. En parallèle, un nouveau paradigme a fait son apparition, celui du Cloud Computing. Malgré les avantages certains qu’il apporte, peu des plateformes existantes sont pensées pour fonctionner sur une architecture Cloud. De plus, face à la complexité d’obtenir une plateforme d’e-commerce (PE) sécurisée, flexible et évolutive s’appuyant sur des applications et services hétérogènes existants et répondant aux besoins des e-commerçants, i
APA, Harvard, Vancouver, ISO, and other styles
37

Kavaliūnaitė, Sigita. "Soft security in the context of Eastern Dimension of European neighbourhood policy: a management approach." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130206_095551-32509.

Full text
Abstract:
The subject matter of this research is content, features, role and prospects of soft security in the context of Eastern Dimension of European Neighbourhood Policy by identifying and analysing soft security as a component of the European Union initiated joint project management in the area of Eastern Dimension of European Neighbourhood Policy covering Armenia, Azerbaijan, Belarus, Georgia, Moldova and Ukraine, as well as Russian Federation. The objective of this research is to define ability of soft security component to effectively facilitate the process of security governance leading to incre
APA, Harvard, Vancouver, ISO, and other styles
38

Milkeraitytė, Kristina. "Private Military and Security Companies and Their Personnel in the Context of International Humanitarian Law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090629_101808-18164.

Full text
Abstract:
The tendency after the end of the Cold war to downsize national armies on the one hand and persistent armed conflicts in unstable African, Near East and Balkan regions on the other created opening conditions for the revival and rapid evolvement of the private business structures that provide military and security services. Prevailing viewpoint that PMSCs and their personnel represent the new form of the mercenary is not correct from the IHL perspective and could lead to serious human rights abuses. Numerous cases and analysis of the scholar literature shows that inaccurate qualification of th
APA, Harvard, Vancouver, ISO, and other styles
39

Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.

Full text
Abstract:
Šiandieniniame pasaulyje duomenys yra viena vertingiausių prekių. Svarbių ar slaptų duomenų praradimai gali padaryti didelę materialinę žalą. Duomenų apsaugos priemonėms yra išleidžiamos milžiniškos pinigų sumos. Darbo metu analizuojami esami duomenų apsaugos įrankiai ir metodai, gilinantis į duomenų apsaugą pernešamose laikmenose, CD ir DVD diskuose. Analizės metu surinkti duomenys apie duomenų apsaugą nuo kopijavimo ir peržiūrėjimo bei panaudojimo naudojami eksperimente siekiant nustatyti tinkamiausius metodus būsimai programinei įrangai, skirtai duomenims apsaugoti. Vykdant eksperimentą sie
APA, Harvard, Vancouver, ISO, and other styles
40

Radzevičius, Vitalius. "Žiniatinklio turinio valdymo sistemų saugumo tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095111-64553.

Full text
Abstract:
Internete galima rasti nemažai svetainių, kurios yra sukurtos naudojantis viena iš daugelio šiuo metu prieinamų žiniatinklio turinio valdymo sistemų (TVS). TVS paprastai nereikalauja išsamių techninių žinių, jos ir kuriamos su idėja, kad bet kuris naudotojas galėtų nesunkiai sukurti ir paskelbti savo interneto svetainę. Deja, eiliniai TVS naudotojai dažnai turi nedaug žinių informacijos saugumo srityje. Turinio valdymo sistemų pagrindu sukurtoms svetainėms, kaip ir nuo pagrindų suprogramuotiems tinklalapiams, kyla panašios bendrosios su saugumu susiję grėsmės. Tačiau be bendrųjų grėsmių dar eg
APA, Harvard, Vancouver, ISO, and other styles
41

Lanne, Jean-Baptiste. "Des vies en veille : géographies abandonnées des acteurs quotidiens de la sécurité à Nairobi." Thesis, Bordeaux 3, 2018. http://www.theses.fr/2018BOR30050/document.

Full text
Abstract:
Cette thèse porte sur la place dans la ville des acteurs quotidiens de la sécurité à Nairobi, au Kenya. Ces acteurs, appelés génériquement « les veilleurs » afin de signifier du même coup leur tâche professionnelle (surveiller la ville) et leur condition incertaine (« être en veille », vivre dans une forme de suspens), sont entrevus au prisme de deux groupes particuliers : les gardiens de sécurité privée aux portes des résidences de la ville planifiée et les jeunes recrues des youthgroups dans les quartiers de bidonvilles. Privilégiant une approche par les individus et le quotidien, je m’inscr
APA, Harvard, Vancouver, ISO, and other styles
42

Žabinskas, Vidas. "Interneto serverių apsaugos priemonių tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040601_222038-85803.

Full text
Abstract:
Transferring the activities to electronic space, each Internet user could be involved in a risk that the information accessed and transmitted by network might be read, retrieved and, supposedly, trespassed. Therefore, the preventive protection of personal computer and computer system security is relevant in order security gaps in a computer system would appear as less as possible. Subject of the Work: “PC Security” Internet service website designated to check-out personal computer system security by users on their own. Goal of the Work: computer security measures analysis and computer security
APA, Harvard, Vancouver, ISO, and other styles
43

Dailidė, Martynas. "Interneto paslaugų saugumo užtikrinimo metodų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040611_154830-55239.

Full text
Abstract:
A functional ASP.NET application relies on the successful interoperation of many different elements and technologies. Each solution component provides security capabilities designed to meet its own requirements. However, it is not enough to look at security purely from the perspective of individual components. To provide security for the overall solution you must also consider how the components interact. This paper describes the common characteristics of .NET Web applications from a security perspective. It contains a detail analysis of the key elements of authentication, authorization, and s
APA, Harvard, Vancouver, ISO, and other styles
44

Pachomov, Artiom. "Serverių saugumo užtikrinimo sistema Šiaulių valstybinei kolegijai." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120702_124451-96789.

Full text
Abstract:
Šiame darbe analizuojami populiarūs įsilaužimo būdai, apsaugos būdai bei viena įdomesnių apsaugos sprendimų technologijų. Taikant įprastus apsaugos būdus, yra analizuojamas naujas apsaugos būdas ir jo galimybės kurios padės efektyviau apsaugoti serverio nuotolinį administravimą ir palengvinti programinės apsaugos įrangos naudojimą, nereikalaujant didelių papildomų finansinių kaštų.<br>This project is about computer network server security vulnerabilities, basic security options and “Honey Pot” technology solution. This project analyzes by applying basic security options to the presented system
APA, Harvard, Vancouver, ISO, and other styles
45

Valinčius, Tomas. "Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080811_151738-05648.

Full text
Abstract:
Darbo tikslas – išnagrinėti būdus darbo kompiuteriu keliamoms grėsmėms valdyti: (1) Aptarti, pažinti grėsmes kompiuterinių sistemų saugumui; (2) Suprasti, kas sukelia šias grėsmes, nagrinėjant programinės įrangos kūrimo procesą; (3) Nustatyti būdus, kurie gali sumažinti ar eliminuoti grėsmes. Darbe pirmiausiai aptariamos techninės priežastys, lemiančios saugumo spragų programinėje įrangoje pasirodymą; piktavališkų programų tipai bei jų daroma žala. Toliau aptarti šiuo metu naudojami metodai programinės įrangos saugumui ir kokybei užtikrinti, suformuluoti pagrindiniai saugios programinės įrango
APA, Harvard, Vancouver, ISO, and other styles
46

Timofejevaitė, Raminta. "Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323.

Full text
Abstract:
Šiame darbe nagrinėjamas socialinės apsaugos priemonių nedarbo rizikos atveju taikymas. Atskleidžiama nedarbo, kaip socialinės rizikos, samprata ir neigiama įtaka valstybės ekonominei raidai ir gerovei. Apžvelgiamas valstybės garantuojamos socialinės apsaugos nedarbo atveju teisinis reguliavimas Lietuvos Respublikos ir tarptautiniuose teisės aktuose. Aptariami šio instituto teisinio reglamentavimo trūkumai. Darbe analizuojama ne tik Lietuvos, bet ir užsienio valstybių patirtis taikant socialinės apsaugos priemones nedarbo rizikos atveju. Remiantis Statistikos depatamento pateiktais 2010-2011 m
APA, Harvard, Vancouver, ISO, and other styles
47

Kranauskienė, Regina. "Informacijos saugumo valdymas X organizacijoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050518_105648-27939.

Full text
Abstract:
In 2001, the Lithuanian Government, considering EU’s eEurope 2005 and eEurope+ Action Plans, approved Lithuania’s strategic plan of information society development, which set a goal to ensure the IT security at public institutions and offices. The same year saw the State’s strategy of technological security approved, which enforced legal regulation of general data security requirements. On December 31st, 2002, the General data security requirements treat information security policy as a sum of different documents (rules and detailed instructions), while commercial IT providers offer organizati
APA, Harvard, Vancouver, ISO, and other styles
48

Chlapotinaitė, Jurgita. "Duomenų apsaugos sistemos analizė." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050615_123415-57036.

Full text
Abstract:
The security system of AES data has been analyzed in this work. The basics of Galue fields, which are related to the mathematical model of the AES algorithm, are also presented in this work. The transformations of The AES algorithm have been analyzed and illustrated with examples. The programmes of the AES algorithm performing these transformations are also presented here. In this piece of paper you will also find some suggestions and their realizations concerning the possibility of the modification of the AES algorithm. Moreover, the restrictions of the key and block of the AES algorithm are
APA, Harvard, Vancouver, ISO, and other styles
49

Ramoška, Aidas. "Apsaugos nuo SQL injekcijų el.verslo svetainėse metodikos sudarymas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131104_105203-08297.

Full text
Abstract:
SQL injekcijos atakos taikinys – interaktyvios interneto programos, kurios naudoja duomenų bazės serverius. Šios programos leidžia vartotojams įvesti informaciją ir ją įvedus formuojamos SQL užklausos, kurios siunčiamos į duomenų bazės serverį. Darydamas SQL injekcijos ataką, atakuotojas per įvesties laukus suformuoja kenksmingą SQL užklausos segmentą, kuris modifikuoja buvusią užklausą. Naudodamas SQL injekcijos ataką, atakuotojas gali prieiti prie konfidencialios informacijos, ją modifikuoti ar, apeidamas autorizacijos scenarijų, prisijungti prie sistemos nežinodamas slaptažodžio. Šiame darb
APA, Harvard, Vancouver, ISO, and other styles
50

Šlančauskaitė, Giedrė. "PRIVATŪS PENSIJŲ FONDAI IR JŲ RAIDOS LIETUVOJE ANALIZĖ." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20101108_095249-52288.

Full text
Abstract:
Magistro darbe yra išsamiai išnagrinėta pensinio socialinio draudimo samprata bei aptarta privačių pensijų fondų istorinė raida, pateikiamas išanalizuotas ir susistemintas privačių pensijų fondų objektyvus reikalingumas Lietuvoje. Sistemingai ištirta Lietuvos pensijų fondų rinkos struktūra bei atlikta išsami Lietuvos privačių pensijų fondų rinkos analizė, pagal kurios rezultatus pateiktos privačių pensijų fondų sistemos tobulinimo galimybės. Patvirtinta autoriaus suformuluota hipotezė, jog Valstybinio socialinio draudimo fondas Lietuvoje negali užtikrinti pakankamo pensinio aprūpinimo, todėl b
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!