Dissertations / Theses on the topic 'LTE Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'LTE Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Full textRecently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
DeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.
Full textPfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.
Full textSäkerhetsprotokoll används i många typer av applikationer för att säkerställa säkerhet och integritet för kommunikation. För att uppnå detta mål behövs en behövs mekanismer som tillhandahåller pålitlig och systematisk verifiering av protokollen. Därför har det visats stort akademiskt intresse för forskning inom formell verifiering av säkerhetsprotokoll de senaste två decennierna. Sådana metoder formaliserar protokollsemantiken, vilket lägger grunden till automatiserad verifiering med modellverifieringsverktyg. Än så la¨nge har det inte varit stort focus på praktiska tilla¨mpningar, som t.ex. hur väl metoderna fungerar för de problem som dyker upp under en standardiseringsprocess. I detta examensarbete konstrueras en formell modell för ett säkerhetsprotokoll som etablerar en säkerhetsassociation mellan en terminal och två Long-Term Evolution (LTE) basstationer i ett delsystem kallat Dual Connectivity. Detta delsystem standardiseras för närvarande i 3GPP. Den formella modellen verifieras sedan med bästa tillgängliga verktyg för automatiserad modellverifiering (Scyther och Tamarin Prover). För att åstadkomma detta har den formella modellen implementerats i inmatningsspråken för de två verktygen. Slutligen ha de två verktygen evaluerats. Huvudslutsatsen är att inget av de två verktygen tillräckligt väl kan modellera de koncept där maskinstödd verifiering som mest behövs. Skälen till detta är Scythers begränsade syntax, och Tamarins begränsade prestanda och möjlighet att terminera för komplexa protokollmodeller. Trots detta är formella metoder andvändbara i standardiseringsprocessen eftersom de tvingar fram väldigt noggrann granskning av protokollens fundamentala delar. Därför kan formella metoder bidra till att förbättra strukturen på protokollkonstruktionsprocessen om det kombineras med nuvarande metoder.
Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.
Full textShahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.
Full textPh. D.
Pestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.
Full textParvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.
Full textLegonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.
Full textSmå celler sätts ut i områden med höga krav på täckning och kapacitet. Det är svårt att adressera båda dessa krav samtidigt med en konventionell mobil nätverksarkitektur baserad på makro-celler. I många fall finns ingen kabel tillgänglig att koppla den lilla cellen till kärnan i det mobila nätverket. Under dessa omständigheter kan en trådlös länk vara en lämplig lösning för backhaul. I denna avhandling utvärderas IEEE 802.11n-teknikens lämplighet för backhaul av små celler. Prestandan hos trådlös utrustning tillverkad av flera olika tillverkare har mätts. Resultaten av dessa mätningar analyserades och jämfördes med en mängd krav uppsatta för backhaul av små celler. Analysen har förankrat att IEEE 802.11n är kapabel till att tillhandahålla tillräcklig prestanda för backhaul av små celler i diverse miljöer. Notera att i denna avhandling så inkluderas femto-celler, pico-celler, Wireless LAN-åtkomstpunkter, och andra teknologier i kategorin små celler". Andra forskningsfrågor berörda i avhandlingen är säkerhet vid backhaul av små celler. Utöver att skydda backhaul-länken själv så undersökte säkerhetsforskningen säkerheten av hela mobilnätsarkitekturen när små celler används i arkitekturen. En mekanism för att integrera säkra små celler i ett mobilnät utvecklades. De resultat som införskaffades under projektets genomförande kommer att användas som input till produktutvecklingsaktiviteter hos företaget som sponsrade projektet. Den resulterande produkten skulle kunna bli mål för framtida prestandamätningar av trådlösa system.
Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.
Full text5G-telekommunikationssystem måste vara extremt tillförlitliga för att möta behoven för den kommande utvecklingen inom kommunikation. Systemen som används måste testas noggrant och måste överensstämma med deras standarder. Programvara och nätverksprotokoll testas ofta med tekniker som fuzzing, penetrationstest, kodgranskning, testning av överensstämmelse. Med fuzzing kan testare skicka utformade input för att övervaka System Under Test (SUT) för ett svar. 3GPP, standardiseringsorganet för telekomsystemet, producerar ofta nya versioner av specifikationer för att möta kraven och bristerna från tidigare utgåvor. Detta leder till många versioner av specifikationer för ett nätverksprotokoll som Radio Resource Control (RRC) och testare behöver ständigt uppdatera testverktygen och testmiljön. I detta arbete visar vi att genom att använda den generiska karaktären av RRC-specifikationer, som ges i beskrivningsspråket Abstract Syntax Notation One (ASN.1), kan man designa ett testverktyg för att anpassa sig till alla versioner av 3GPP-specifikationer. Detta uppsatsarbete introducerar en ASN.1-baserad adaptiv fuzzer som kan användas för att testa RRC och andra nätverksprotokoll baserat på ASN.1- beskrivningsspråk. Fuzzer extraherar kunskap om pågående RRC meddelanden med användning av protokollbeskrivningsfiler för RRC, dvs RRC ASN.1 schema från 3GPP, och använder kunskapen för att fuzz RRC meddelanden. Den adaptiva fuzzer identifierar enskilda fält, delmeddelanden och anpassade datatyper enligt specifikationer när innehållet i befintliga meddelanden muteras. Dessutom har den adaptiva fuzzer identifierat en tidigare oidentifierad sårbarhet i Evolved Packet Core (EPC) för srsLTE och openLTE, två opensource LTE-implementeringar, vilket bekräftar tillämpligheten för robusthetsprovning av RRC och andra nätverksprotokoll.
Hutchinson, Simon James. "Investigation of late time response analysis for security applications." Thesis, Manchester Metropolitan University, 2015. http://e-space.mmu.ac.uk/608771/.
Full textGuedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.
Full textIn a world strongly dependent on distributed data communication, the design of secure infrastructures is a crucial task. Distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal
Yao, Håkansson Jonathan, and Niklas Rosencrantz. "Formal Verification of Hardware Peripheral with Security Property." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807.
Full textMålet med vårt projekt är att verifiera olika specifikationer av externa enheter som ansluts till datorn. Vi utför formell verifikation av sådan datorutrustning och virtuellt minne. Verifikation med temporal logik, LTL, utförs. Specifikt verifierar vi 4 olika use-case och 9 formler för seriell datakommunikation, DMA och virtuellt minne. Slutsatsen är att anslutning av extern hårdvara är säker om den är ordentligt konfigurerad.Vi gör jämförelser mellan olika minnesstorlekar och mätte tidsåtgången för att verifiera olika system. Vi ser att tidsåtgången för verifikation är långsammare än linjärt beroende och att relativt små system tar relativt lång tid att verifiera.
Eneroth, Nathanael. "Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240425.
Full textDen fjärde generationens mobila bredband, Long-Term Evolution (LTE), möjliggör användandet av höghastighetsinternet över Internet Protocol (IP). Dagens trådlösa infrastrukturer banar väg för ett fritt och lättillgängligt digitalt samhälle där alla kan vara uppkopplade samtidigt. För att uppnå global trådlös infrastruktur måste mobilabonnenten ha möjlighet att utnyttja flera andra trådlösa nätverk än det nätverk som teleoperatören binder dem till. Därför utgör fri roaming en viktig del i utvecklingen av framtidens globala trådlösa infrastrukturer. Local Breakout (LBO) Voice over Long-Term Evolution (VoLTE) är en roamingarkitektur som gör det möjligt för en mobilabonnent att kopplas upp från en teleoperatörs nät till en annans. LBO kräver att kontrollsignaler och användardata skickas mellan flera operatörer innan trafiken når sitt mål, och därmed utsätts mobilabonnenten för laglig avlyssning av elektronisk information på flera platser samtidigt. Det här examensarbetet undersöker möjligheten att använda Multimedia Internet KEYing (MIKEY) och Secure Real-Time Transport Protocol (SRTP) för att kryptera mediatrafik i VoLTE. Under arbetets gång utvecklas och utvärderas en Law Enforcement Monitoring Provider (LEMP). LEMP är placerad i en mobiltelefon och distribuerar delar av krypteringsnycklar till flera betrodda tredje parter (till flera escrow agents). Detta gör det möjligt att uppfylla kraven för laglig avlyssning av elektronisk information även när flera teleoperatörer avlyssnar användardata och kontrollsignaler. Resultatet visar att distribueringstiden primärt beror på nätverkslatens, och inte på den tid det tar att fördela krypteringsnyckeln i mindre delar. Därför kan den här metoden användas i praktiken.
Alegre, Alberto. "Parental behaviors and late adolescents' adjustment: The role of emotional security and emotional intelligence." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26056.
Full textPh. D.
Dykas, Matthew Jason. "Attachment security and the processing of attachment-relevant social information in late adolescence." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3488.
Full textThesis research directed by: Psychology. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Lee, Andrew Wei Tien. "A framework for supporting anonymity in text-based online conversations /." Gold Coast, QLD : Bond University, 2001. http://epublications.bond.edu.au/theses/lee.
Full text"A thesis submitted to Bond University in fulfillment of the requirements for the degree of Masters of Science in Computer Science"-- t.p. Bibliography: leaves 124-125. Also available via the World Wide Web.
Frenn, Evan. "Towards a Trustworthy Thin Terminal for Securing Enterprise Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/300.
Full textCook, Joshua Lee. "Employees' Perceptions About the Deterrence Effect of Polygraph Examination Against Security Compromises." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1844.
Full textTyler, Lamonte Bryant. "Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.
Full textYoon, Seongwon. "Distorted security discourses : the ROK's securitisation of the Korean nuclear crisis, 2003-2013." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15865.
Full textYoon, Seongwon. "Distorted Security Discourses. The ROK’s Securitisation of the Korean Nuclear Crisis, 2003–2013." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15865.
Full textPaulauskas, Nerijus. "Analysis of Computer System Incidents and Security Level Evaluation." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090610_130504-11943.
Full textDisertacijoje nagrinėjamos incidentų kompiuterių tinkluose ir kompiuterių sistemų saugumo lygio įvertinimo problemos. Pagrindiniai tyrimo objektai yra incidentai kompiuterių tinkluose, atakų atpažinimo sistemos ir kompiuterių tinklo žvalgos būdai. Disertacijos tikslas – incidentų kompiuterių tinkluose tyrimas ir kompiuterių sistemų saugumo lygio įvertinimas. Darbe sprendžiami šie pagrindiniai uždaviniai: atakų klasifikavimas ir jų sunkumo lygio skaitinis įvertinimas; kompiuterių sistemos saugumo lygio kiekybinis įvertinimas; kompiuterių sistemos našumo ir pasiekiamumo priklausomybės nuo sistemą veikiančių atakų ir joje naudojamų apsaugos mechanizmų tyrimas; modelio, imituojančio kompiuterių tinklo horizontalią ir vertikalią žvalgą kūrimas. Disertaciją sudaro įvadas, penki skyriai ir bendrosios išvados. Įvadiniame skyriuje nagrinėjamas problemos aktualumas, formuluojamas darbo tikslas bei uždaviniai, aprašomas mokslinis darbo naujumas, pristatomi autoriaus pranešimai ir publikacijos, disertacijos struktūra. Pirmasis skyrius skirtas literatūros apžvalgai. Jame apžvelgiamos atakų atpažinimo sistemos, analizuojami atakų atpažinimo metodai. Nagrinėjami atakų klasifikavimo būdai. Didelis dėmesys skiriamas kompiuterių sistemos saugumo lygio įvertinimo metodams, kompiuterių prievadų žvalgos būdams ir žvalgos atpažinimo metodams. Skyriaus pabaigoje formuluojamos išvados ir konkretizuojami disertacijos uždaviniai. Antrajame skyriuje pateikta sudaryta atakų nukreiptų į kompiuterių... [toliau žr. visą tekstą]
Jastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.
Full textNuolat augantys informacijos saugumo incidentų atvejai ir mastai iliustruoja, kad informacijos saugumo problemų aktualumas tampa kritinis, o esamos informacijos saugumo valdymo priemonės nėra pakankamos informacijos saugumui valdyti. Siaurą informacijos saugumo, kaip technologinės problemos, supratimą plečia ekonominių, vadybinių, psichologinių, teisinių ir kitų susijusių aspektų įtaka informacijos saugumui. Disertacijoje teigiama, kad informacijos saugumo valdymo objektas yra informacija, todėl informacijos saugumui valdyti pasitelktini informacijos vadybos metodai ir būdai. Identifikavus ir kritiškai įvertinus informacijos vadybos bei informacijos saugumo valdymo diskursų sąsajas sukurtas teorinis pagrindas suformuoti integralų informacijos saugumo valdymo modelį. Teoriniame lygmenyje sukonstruotas integralus informacijos saugumo valdymo modelis atskleidžia kompleksinį požiūrį į informacijos saugumą, integruoja informacijos vadybą ir informacijos saugumo valdymą bei leidžia identifikuoti informacijos saugumo valdymo Lietuvos valstybės institucijose trūkumus, o šiuos trūkumus pašalinus, užtikrinti kompleksišką ir efektyvų informacijos saugumo valdymą. Empirinis tyrimas ir gauti rezultatai pagrindė teoriniame lygmenyje sukonstruoto modelio pritaikomumą tiek tolesniems teoriniams moksliniams tyrimams, tiek praktinėje Lietuvos valstybės institucijų veikloje.
Vasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.
Full textŠio darbo teorinė ir praktinė svarba yra naujų žinių, susijusių su saugumo ir pasitikėjimo problemų sprendimais mobilios komercijos kontekste, kūrimas kuris pasitarnaus ne tik mokslinei bendruomenei, bet ir e-verslui. Nepaisant to, jog mobilios komercijos įsisavinimas plačiai analizuotas holistiniu požiūriu, magistrinio darbo autorius nerado atliktų išsamių tyrimų išsamiau aptariančių pasitikėjimo ir saugumo veiksnių poveikio mobilios komercijos kontekste. Darbo problema formuluojama, kaip patikimumo ir saugumo veiksniai daro įtaką mobilios komercijos įsisavinimui. Tiriamieji objektai yra mobili komercija, saugumas ir patikimumas. Šio tyrimo tikslas yra dvejopas: empirinis ir aiškinamasis. Siekiant tyrimo tikslo, buvo išstudijuota literatūra, pasiūlytas mokslinio tyrimo modelis, išanalizuoti rezultatai ir įvertintos suformuluotos hipotezės. Mokslinio tyrimo eigoje autorius panaudojo teorinius ir empirinius duomenų analizės ir rinkimo metodus. Teorinėje dalyje buvo panaudoti panašumo, apibendrinimo ir modeliavimo metodai. Empirinėje dalyje įgyvendintas kiekybinis tyrimas, duomenys renkami apklausos būdu struktūruoto klausimyno pagalba. Surinkti duomenys apdoroti SPSS aplinkoje atliekant aprašomųjų duomenų analizę pagal Likerto suminių vertinimo skales. Galutinis šio tyrimo tikslas buvo patikrinti suformuluotas hipotezes. Kalbant apie išvadas, privatumo rizikos suvokimas, mobilių mokėjimų, mobilios komercijos įstatymų ir gaunamų produktų kokybė turėjo neigiamą įtaką mobilios... [toliau žr. visą tekstą]
Ravndal, Ellen Jenny. "A force for peace : expanding the role of the UN Secretary-General under Trygve Lie, 1946-1953." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:4524630e-0f72-4169-b3e3-c53d250a3424.
Full textEriksson-Asp, Ebba, and Berglund Katarina Inta. "Betala nu, senare eller lite då och då : En kvalitativ studie om betalningsmetoders betydelse för svenska konsumenters köpprocess online." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-46039.
Full textAlišauskaitė, Vaida. "Kompiuterių tinklų saugos modelių sudarymas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080128_103419-62847.
Full textThe master's work analysis different types of security models. It also proposes a new computer network security reference model, which includes risk management process. A suspicious network events detection system is designed to make network monitoring easier.
Miškelevičius, Andrius. "Bankinių apmokėjimų pranešimų perdavimo sauga." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102917-11422.
Full textNowadays, many banking payments takes place in cyberspace. Timeliness and convenience through several decades integrated banking systems in the business world. However e.commerce popularity integrated electronic banking systems into Web applications that are available to all users of electronic space. Payments in cyberspace creates significant added value to the economy as a whole but on a large spread banking systems increase sensitive security threat. The hostile actions in e.space damage per year increase to 1 trillion dollars, for the losses incurred by major reduction in investment in new technologies it resulting in further decrease in the level of safety. All IT professionals can help create a safer online space, because the future of electronic payments become more closely associated with our business and life. The purpose of this work is to analyze banking systems safety and threats. In this work I designed and tested several banking systems and choose the best security solutions, to reduce security threats of electronic payments.
Aleksa, Karolis. "The Impact of the US Military Transformation on Russian and Chinese Security Policy." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121211_095626-96389.
Full textPo Šaltojo karo JAV išliko stipriausia kariniu požiūriu valstybė, tačiau, nepaisant to, JAV buvo itin susirūpinusi savo karinio pranašumo išlaikymu ateityje, kuris leistų užtikrinti tolesnę JAV lyderystę sprendžiant svarbiausius tarptautinius klausimus. JAV karinio pranašumo išlaikymo priemonėmis po Šaltojo karo tapo trys karinės JAV tranformacijos iniciatyvos: konvencinių pajėgų transformacija, priešraketinių gynybos sistemų ir ilgo nuotolio tikslaus konvencinio smūgio pajėgumų kūrimas. Atsižvelgiant į tai, kad Rusijai ir Kinijai – oponuojančioms JAV valstybėms, JAV karinė transformacija tapo dideliu iššūkiu, disertacijoje tyrimo problema apibrėžta kaip siekis suprasti, ar ir kaip JAV karinė transformacija kelia grėsmę Rusijos ir Kinijos saugumui, ir kaip tai veikia Rusijos ir Kinijos saugumo politiką JAV atžvilgiu. Atitinkamai darbo tikslas buvo ištirti JAV karinės transformacijos poveikį Rusijos ir Kinijos saugumo politikai nuo Šaltojo karo pabaigos iki 2010 m. Puolimo-gynybos balanso teorija buvo pasirinkta kaip disertacijos tyrimo teorinė ir analitinė prieiga. Disertacijos tyrimas parodė, kad, nepaisant įgyto konvencinio puolimo pranašumo ir realios galimybės siekti branduolinio puolimo pranašumo, JAV nevykdė agresyvios saugumo politikos Rusijos ir Kinijos atžvilgiu. Rusija ir Kinija jautriai reagavo į JAV karinę transformaciją, stengdamosi įgyti konvencinį puolimo pranašumą, išsaugoti branduolinį puolimo-gynybos balansą, o taip pat užkirsti kelią JAV susikurti... [toliau žr. visą tekstą]
Tauginas, Tomas. "Lieutva Europos ir euroatlantinėje saugumo sistemose: raida, dabartis, ateities perspektyvos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_094852-62582.
Full textGrabliauskaitė, Aušra. "ES šiaurinio regiono vaidmuo įgyvendinant ES energetinį saugumą XXI amžiuje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090612_103411-39900.
Full textThe main object of this study is to analyze the role of the North region of European Union, ensuring energy security in the EU and foresee the possible perspectives of the EU’s energy policy in the nearest future. The North region is analyzed emphasizing two countries which are main energy suppliers for Europe – Russian Federation and Norway. For a better understanding of the object, the specific proposition has been formulated: the struggle of the national states for energy resources and individual decisions allow energy insecurity in the European Union since the EU’s declared objective „to speak in one voice“ is inconsistent with national interests of EU’s member states. Although the European Union can be defined as the complex of energy security in which the relation of dependence is comprehended as a threat (the main source of this threat is the Russian Federation’s energy monopoly), however the growing consumption and competition for energy resources encourage the countries to search for alternative energy resources and its suppliers. These actions disrupt the initiatives of the common European Union’s energy policy. The political consciousness is not yet grown in the EU’s countries and it determinates the weakness of the EU as a political construct in case of competition with the rising economical powers (such as India and China) for energy resources. On the other hand the consumption is growing in the Russian market as well, which implies possible insecurity of supply... [to full text]
Brobliauskas, Žilvinas. "Reliacinių duomenų bazių saugumo modelio tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090828_133828-02790.
Full textThe multilateral security model of relational databases is analyzed in master thesis of Žilvinas Brobliauskas. The results of research includes: the formulated requirements for multilateral security model of relational databases, proposed model, which allows range queries and aggregation functions over encrypted data without decrypting them at RDBMS level, and determined advantages and disadvantages of it. The program which realizes proposed model is given as proof of concept.
Cipière, Sébastien. "Un système de médiation distribué pour l'e-santé et l'épidémiologie." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22716/document.
Full textThe implementation of a grid network to support large-scale epidemiology analysis (based on distributed medical data sources) and medical data sharing require medical data integration and semantic alignment. In this thesis, we present the GINSENG (Global Initiative for Sentinel eHealth Network on Grid) network that federates existing Electronic Health Records through a rich metamodel (FedEHR), a semantic data model (SemEHR) and distributed query toolkits. A query interface based on the VIP platform, and available through the e-ginseng.com web portal helps medical end-users in the design of epidemiological studies and the retrieval of relevant medical data sets
Delettre, Christian. "Plateforme ouverte, évolutive, sécurisée et orientée utilisateur pour l'e-commerce." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4111/document.
Full textNowadays, e-commerce has become a complex ecosystem where multiple solutions (in terms of platforms) are possible and feasible for e-merchant. Concurrently, a new paradigm called Cloud Computing has emerged. Despite some advantages it brings, few of these platforms have been designed to operate on a Cloud architecture. Thus, because of the complexity to design a flexible and scalable e-commerce platform (EP), based on existing heterogeneous applications/services and fulfilling the needs of e-merchants, it is legitimate to ask ourself if a PE based on the Cloud would really simplify the difficulties faced by e-merchants. This thesis aims to validate the relevance of using the Cloud Computing in the e-commerce context and propose the architectural principles of an open, scalable and secure EP based on a Cloud architecture. In addition, the EP used by e-merchants are not user-centric EP. As a consequence, we propose a user-centric mechanism simplifying the design and implementation of an EP while ensuring a high security level. Finally, we tried to answer the following question: How to ensure that no activity inference on a database size, in an e-commerce context, can be achieved by unauthorized entities? As a response, we propose a user-centric security solution of data concealment to resolve the property of strong data confidentiality within relational database management system (RDBMS)
Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.
Full textIn the current world data is one the most valued items. Loss of relevant and secret data may cause huge material harm. Grant sums of money are spent for data security methods. In the paper the available tools and methods of data security are analyzed, security methods for CD and DVD media are discussed. The information collected on the data copy-protect and cryptography as well as use security is used in an experiment aiming to identify the most fitting methods for software of data security. The implementation of the experiment is aimed at checking the time input for cryptography algorithms. For this purpose the crypt and decrypt operations with 10 MB and100 MB files are performed. The developed system allows to keep data safe from illegal review and use in CD and DVD. Safety data records developed with the help of the system may be used without any extra software in other computers in which Windows XP/Vista/Win7 operation system is installed.
Radzevičius, Vitalius. "Žiniatinklio turinio valdymo sistemų saugumo tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095111-64553.
Full textThere are quite a few websites online that use one of many currently available web content management systems (CMS). CMS usually do not require in-depth technological knowledge. In fact, they are designed with an idea that any user can create and publish their website. Unfortunately, ordinary CMS users often lack knowledge in security area. CMS-based websites, same as those that are created from scratch, experience similar common security threats. In addition to common security threats, there are some CMS-specific ones that are hardly discovered by standard security assessment programs, generally called web vulnerability scanners. Security problems often lie in configuration level and, in order to discover them, CMS-specific security checking rules are required. In this paper, CMS-specific security requirements list was compiled and model of the programs that checks if CMS complies with requirements was provided. Then two algorithms were programmed that helped assess how Joomla and Drupal web content management systems comply with security requirements. Experimental study was carried out with two aforementioned content management systems. The study was carried out with the freshly installed content management systems, and then repeated after system configuration parameters adjustment. Finally, two Drupal CMS-based and online-accessible websites were assessed.
Kavaliūnaitė, Sigita. "Soft security in the context of Eastern Dimension of European neighbourhood policy: a management approach." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130206_095551-32509.
Full textŠios disertacijos tyrimo objektas – minkštasis saugumas Europos kaimynystės politikos Rytų dimensijos kontekste, identifikuojant ir analizuojant minkštąjį saugumą kaip Europos Sąjungos inicijuojamų bendrų projektų ES Kaimynystės politikos Rytų dimensijos erdvėje, apimančioje Armėniją, Azerbaidžaną, Baltarusiją, Gruziją, Moldovą ir Ukrainą, o taip pat ir Rusijos Federaciją,valdymo komponentą. Siekiama, analizuojant minkštąjį saugumo komponentą, atskeisti jo gebėjimą skatinti, įgalinti ir lengvinti regiono saugumo ir stabilumo efektyvaus valdymo procesą.
Milkeraitytė, Kristina. "Private Military and Security Companies and Their Personnel in the Context of International Humanitarian Law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090629_101808-18164.
Full textPasibaigus Šaltajam karui išryškėjusi tendencija valstybėms mažinti savo ginkluotąsias pajėgas ir nuolatiniai kariniai konfliktai nestabiliuose Afrikos, Artimųjų Rytų, Balkanų regionuose sudarė palankias sąlygas atgyti ir sparčiai plėtotis privačių, karines ir saugumo paslaugas teikiančių, kompanijų verslui. Vyraujantis požiūris, kad PKSK-jų darbuotojai atstovauja naują samdinystės formą nėra teisiškai korektiškas ir gali lemti grubius žmogaus teisių pažeidimus. Gausi praktika bei mokslinės literatūros analizė rodo, kad privačių kompanijų darbuotojų teisinis statusas klaidingai ir skirtingai kvalifikuojamas pagal tarptautinę humanitarinę teisę. Viena vertus tai sąlygoja kad kompanijų darbuotojams nesuteikiama jiems priklausanti apsauga. Antra vertus, nesant aiškių tarptautinės PKSK-jų atskaitomybės ir kontrolės mechanizmų, susidaro sąlygos piktnaudžiavimui bei nebaudžiamumui už įvykdytus nusikaltimus. Šiame magistro baigiamajame darbe siekiama išanalizuoti PKSK-jų ir jų darbuotojų tarptautinį teisinį statusą ginkluotų konfliktų metu ir įvertinti egzistuojančios praktikos atitikimą tarptautinės humanitarinės teisės normoms. Siekiant atlikti išsamų tyrimą, iškelti uždaviniai pateikti istorinę karo privatizacijos apžvalgą, aptarti procesą skatinančius faktorius, apibrėžti, kas yra PKSK, kokie jų tipai ir kiekvieno iš jų kompetencija, išryškinti skiriamuosius privačių karių ir samdinių bruožus bei apžvelgti dabartinę praktiką šioje srityje. Remiantis pirmine literatūros analize... [toliau žr. visą tekstą]
Lanne, Jean-Baptiste. "Des vies en veille : géographies abandonnées des acteurs quotidiens de la sécurité à Nairobi." Thesis, Bordeaux 3, 2018. http://www.theses.fr/2018BOR30050/document.
Full textThis PhD thesis aims at analysing the place within the city of everyday security actors in Nairobi, Kenya. I call them “veilleurs” (sentinels of the city), playing on the double meaning of the word in French : referring both to their professional activity (watching over the city) and their feeling of living a passive life (watching all day long can be considered as a non-action). The study focuses on two groups in particular : private security guards at the gate of residential compounds in the planned city, and youthgroups members in slum areas. Adopting an individual and everyday-centred approach, this work fits in with the recent renewal of security studies. For the last ten years, those have been advocating a closer attention to “micro” effects produced by security assemblages, especially on subjectivities, affects, bodies, and everyday routines. The city of Nairobi displays a double feature that sheds new light on the sensitive question of the veilleurs. First, its urban fragmentation appears as particularly iconic in terms of imaginaries. Second, Nairobi can be qualified as an “anxious city” in light of the recent political violence (2007-2008) and the emerging terrorist threat. This study is based on both an ethnographic approach and a creative methodology using poetry as a way to free the speech of my interlocutors. It seeks to analyse the place of the veilleurs through three layered readings: their ambiguous political condition (being “on the line” between familiarity and otherness: neither inside nor outside the community they are supposed to watch over), the uncertain everyday life resulting from this condition, and the diverse imaginaries they produce to make sense of it. These three layers allow me to develop both a spatial and social reading of the key concepts of abandonment, lives on hold, and complex place to better understand this particular category of urban workers
Dailidė, Martynas. "Interneto paslaugų saugumo užtikrinimo metodų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040611_154830-55239.
Full textŽabinskas, Vidas. "Interneto serverių apsaugos priemonių tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040601_222038-85803.
Full textPachomov, Artiom. "Serverių saugumo užtikrinimo sistema Šiaulių valstybinei kolegijai." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120702_124451-96789.
Full textThis project is about computer network server security vulnerabilities, basic security options and “Honey Pot” technology solution. This project analyzes by applying basic security options to the presented system, how it makes remote administration security more effective, making it easier and more reliable as well as not requiring big financial investments.
Valinčius, Tomas. "Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080811_151738-05648.
Full textIs security in computing a problem? There are many methods and ways developed to help in software quality management. However, the need to quickly release a new software or its version is often more important than software security requirements or threats analysis. The main goal of this work is to analyse the threats in computing and methods to manage software security. The main objectives are: (1) To recognize and discuss the threats in computing; (2) To find the reasons that are causing security problems while studying the software development process; (3) To find ways to eliminate the threats or minimize their impact. First of all, there is a study of technical reasons that are causing vulnerabilities and threats in software to appear. Then there is a review of existing methods to manage software security and quality. An important part of this work is dedicated to privacy, private data management problem. There are methods discussed that ensures privacy in computing. After the review of technical aspects of security, there are methods discussed that insures security from organization’s point of view. Finally, there is a review of encryption systems, there types, differences and measures.
Timofejevaitė, Raminta. "Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323.
Full textThis paper analyses application of social protection measures in relation to risk of unemployment. Conception of unemployment as of a social risk is exposed together with its negative effect on economic development and welfare of the state. Legal regulation of the state guaranteed social protection in case of unemployment provided for in legislative acts of the Republic of Lithuania and international legislative acts is reviewed. Drawbacks of legal regulation of this institute are discussed. The paper analyses not only Lithuanian experience, but also experience of foreign countries in applying social protection measures in relation to risk of unemployment. Invoking the data provided by the Statistics Lithuania on emigration of Lithuanian residents over years 2010-2011, social security systems of Great Britain, Ireland and Norway were chosen for survey, because social guarantees provided by those countries are especially relevant to Lithuanian citizens who work or reside there. Thorough review of active and passive social security measures in relation to risk of unemployment provided by Lithuania and the aforementioned countries is made, analyzing its content, amount, effectiveness, drawbacks; new amendments of adopted legislative acts, regulating social security in case of unemployment are reviewed together with circumstances that conditioned the amendments. Considering the experience of these economically strong foreign counties in application of social protection measures... [to full text]
Kranauskienė, Regina. "Informacijos saugumo valdymas X organizacijoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050518_105648-27939.
Full textChlapotinaitė, Jurgita. "Duomenų apsaugos sistemos analizė." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050615_123415-57036.
Full textRamoška, Aidas. "Apsaugos nuo SQL injekcijų el.verslo svetainėse metodikos sudarymas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131104_105203-08297.
Full textThe target of SQL injection attack – interactive web programs, which use database servers. Those programs allow users to input information and as it is imputed, it forms SQL queries, which are sent into database server. With SQL injection help, the attacker using input fields forms harmful section of SQL query, which modifies previous query. Exploiting attack of SQL injection, the attacker may learn confidential information, modify it or connect to system without knowing the password by authorisation bypass. In this research-paper the proposed security model takes over all information inputted by user, adjusts the safety rules and that way it improves the safety in order to guard from SQL injections at electronic business web systems as well as it register potential attempts to disrupt normal work of the system. In order to install the proposed safety model there is no need to configure the server or its software because in the moment of installation it changes only files of website programs. For purpose of executing this work, we use PHP programming language and MySQL database. During the analysis, the received test results show what configuration parameters of safety model we need to use in order to guarantee the maximum level of safety.
Čereška, Nerijus. "RFID žymų apsaugos nuo klastojimo metodo sudarymas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130821_135039-15742.
Full textThis paper is addressed to RFID tags anti-counterfeiting problem: how to prevent significant counterfeiters get all important information from orginal tags or all RFID system. The disclosure of that information would provide a chance to create a genuine RFID tag means. A work analysis is a part of a wider survey of RFID tags against counterfeiting problem, explores the general principles of operation of RFID technology and RFID tag categories. It is also explores possible RFID tags manipulation techniques, the avoidance opportunities, an overview and details of other authors to create protection methods and recommendations for a new RFID tags anti-counterfeiting method. The next workflow is composed of new RFID tags anti-counterfeiting method according to the analysis of the recommendations made and the conclusions drawn, provide an initial approach to security analysis. The software model is created by concluded RFID tag anti-counterfeiting method and a detailed description of the concept. The model simulates the performance of the method in a real environment. The ratings of resistance to RFID tags counterfeiting were set using this software model and its generated results. The final part is dedicated to method‘s performance analysis, obtained results and conclusions. It also has objectives and tasks seen in the introduction to the work evaluation.
Šlančauskaitė, Giedrė. "PRIVATŪS PENSIJŲ FONDAI IR JŲ RAIDOS LIETUVOJE ANALIZĖ." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20101108_095249-52288.
Full textThis master‘s final paper details examination of the concept of social security also discussed historical development of private pension funds, presents analyzed and structured objective need of private pension funds in Lithuania. Systematically investigates the structure of pension funds market of Lithuania also executes detailed analysis of private pension funds of Lithuania, according to the result of which the opportunities of improvement of private pension funds system are given. Hypothesis that was formulated by the author is approved.
Giedraitienė, Indrė. "Vaikų saugumo veiksniai ir kompetencijų ugdymo tobulinimas pradinėje mokykloje (atvejo analizė)." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060609_154514-24406.
Full text