To see the other types of publications on this topic, follow the link: Software protection. Computer software.

Dissertations / Theses on the topic 'Software protection. Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Software protection. Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Rush, Andrea Friedman. "Legal protection of computer software in Canada." Thesis, University of Ottawa (Canada), 1985. http://hdl.handle.net/10393/4750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fragkos, Georgios. "An event-trace language for software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002.
Thesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Volynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garren, Scott L. (Scott Leland). "Copyright protection of computer software : history, politics, and technology." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/28007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ostrovsky, Rafail. "Software protection and simulation on oblivious RAMs." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/103684.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1992.
Includes bibliographical references (p. 71-72).
by Rafail M. Ostrovsky.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
6

Råman, Jari. "Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /." Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Everett, Christopher E. "Fundamentals of software patent protection at a university." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lai, Stanley. "The copyright protection of computer software in the United Kingdom." Thesis, University of Cambridge, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woo, Yan. "A dynamic integrity verification scheme for tamper-resistance software." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Woo, Yan, and 胡昕. "A dynamic integrity verification scheme for tamper-resistancesoftware." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Peng, Xiaohui. "Copyright protection of computer software in the People's Republic of China conforming to international practice /." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ39220.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Karjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.

Full text
Abstract:
Thesis (LLD)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open-source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software. This development has made it necessary to re-evaluate the rationale for copyright protection of computer programs, and determine whether the continued protection of computer programs is justifiable. This study seeks to first establish a coherent theoretical justification for copyright protection, which it is submitted should be an economic justification, rather than a moral justification. The legal analysis in this work seeks to establish whether the copyright protection of computer programs is consistent with the economic justification for copyright protection. In particular, the analysis focuses on the current scope of copyright protection, and seeks to establish whether such protection is excessive, stifling creativity and innovation, and, thus, imposing too high a social cost. It is contended that copyright doctrine has generally sought to minimise these costs, and that current scope of copyright protection of computer programs leaves enough creative room for the production of new software. Despite the fact that the effect of open-source software licences is that authors are unable to earn the direct financial rewards which copyright enables authors to earn as an incentive to create such software, their authors continue to have financial incentives to create such software. Commercial firms who invest in open-source software do so because they seek to provide financially-rewarding related services in respect of software, or because it serves to promote sales in their complementary products. Similarly, the participation of individual computer programmers is largely consistent with the standard economic theories relating to labour markets and the private provision of public goods. Individuals are principally motivated by economic motives, such as career concerns. Copyright protection gives participants the choice to opt for the direct financial rewards which its proprietary protection enables, or the more indirect financial rewards of open-source software development. It is submitted within this research that rather than undermining the rationale for copyright protection of computer programs, the development of open-source software has illustrated that copyright protection allows for the emergence of alternative business models, which may be more economically advantageous to authors.
AFRIKAANSE OPSOMMING: Die rasionaal agter outeursregbeskerming wat deur die reg verleen word is gebasseer op 'n behoefte om die skepping van werke wat sosiaal voordelig geag word te bevorder. Outeursreg verleen aan outeurs direkte finansiële vergoeding vir hul inspanning deur die vestiging van eiendomsreg oor hul werke. Dus, outeursreg voorsien outeurs van die nodige insentiewe om sulke werke te skep. Sedert die begindae van kommersiële sagteware ontwikkeling, is outeursregbeskerming uitgebrei om aan rekenaarprogramme sulke beskerming te bied. Deur die bied van outeursregbeskerming word daar aangeneem dat die ontwikkeling van rekenaarprogramme aangemoedig word en dat sonder die genoemde beskerming programme nie geproduseer sal word tot in 'n mate benodig deur die samelewing nie. Onlangs egter, is daar 'n grootskaalse ontwikkeling van oopbronsagteware opgemerk. Hierdie sagteware word onder ruime terme gelisensieer en gee aan gebruikers die reg om die genoemde sagteware te gebruik, te wysig en vrylik te versprei. Deur sulke terme van lisensiëring aan te neem word outeurs verhoed om vanaf lisensiehouers 'n fooi te vorder vir die toestemming om die sagteware te gebruik. Outeursreg neem aan dat hierdie vergoeding die basis vorm waarom outeurs sulke sagteware ontwikkel. Hierdie ontwikkeling maak dit nodig om die rasionaal agter outeursregbeskerming van rekenaarprogramme te her-evalueer en ook om vas te stel of die volgehoue beskerming van rekenaarprogramme regverdigbaar is. Hierdie studie poog om, eerstens, 'n samehangende teoretiese regverdiging vir outeursreg te vestig. Daar word aan die hand gedoen dat hierdie beskerming 'n ekonomiese, eerder as 'n morele regverdiging as grondslag moet hê. Die regsontleding vervat in hierdie werk poog om vas te stel of die outeursregbeskerming wat aan rekenaarprogramme verleen word in lyn is met die ekonomiese regverdiging van outeursregbeskerming. Die analise fokus in besonder op die huidige bestek van outeursregbeskerming en poog om vas te stel of sodanige beskerming oormatig is, of dit kreatiwiteit en innovasie onderdruk en derhalwe te hoë sosiale koste tot gevolg het. Daar word geargumenteer dat outeursreg in die algemeen poog om sosiale koste te verlaag en dat die huidige omvang van outeursregbeskerming van rekenaarprogramme voldoende kreatiewe ruimte vir die ontwikkeling van nuwe sagteware laat. Die effek van oopbronsagteware is dat outeurs nie in staat is om direkte finansiële vergoeding te verdien, wat as insentief gesien word vir die ontwikkeling van sagteware, nie. Ten spyte hiervan is daar steeds voldoende finansiële insentiewe om sodanige sagteware te ontwikkel. Kommersiële firmas belê in oopbronsagteware om finansiëel lonende verwante dienste ten opsigte van sagteware te voorsien. Dit kan ook dien om verkope in hul onderskeie aanvullende produkte te bevorder. Eweweens is die deelname van individuele rekenaarprogrameerders oorwegend in lyn met die standaard ekonomiese teoriëe ten opsigte van die arbeidsmark en die privaat voorsiening van openbare goedere. Individue word gemotiveer deur ekonomiese motiewe, soos byvoorbeeld oorwegings wat verband hou met hul loopbane. Outeursregbeskerming bied aan deelnemers die keuse om voordeel te trek uit die direkte finansiële vergoeding wat moontlik gemaak word deur outeursregbeskerming of uit die meer indirekte finansiële vergoeding gebied deur die ontwikkeling van oopbronsagteware. In hierdie navorsing word daar geargumenteer dat die ontwikkeling van oopbronsagteware geillustreer het dat outeursregbeskerming die onstaan van alternatiewe besigheidsmodelle toelaat wat ekonomies meer voordelig is vir outeurs in plaas daarvan dat dit die rasionaal vir die outeursregbeskerming van rekenaarprogramme ondermyn.
APA, Harvard, Vancouver, ISO, and other styles
13

Tevis, Jay-Evan J. Hamilton John A. "Automatic detection of software security vulnerabilities in executable program files." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Aravalli, SaiKrishna. "Some Novice methods for Software Protection with Obfuscation." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/479.

Full text
Abstract:
Previously software is distributed to the users by using devices like CD.S and floppies and in the form of bytes. Due to the high usage of internet and in order to perform the tasks rapidly without wasting time on depending physical devices, software is supplied through internet in the form of source code itself. Since source code is available to the end users there is a possibility of changing the source code by malicious users in order to gain their personnel benefits which automatically leads to malfunctioning of the software. The method proposed in this thesis is based on the concept of using hardware to protect the software. We will obfuscate the relation between variables and statements in the software programs so that the attacker can not find the direct relation between them. The method combines software security with code obfuscation techniques, uses the concepts of cryptography like hashing functions and random number generators.
APA, Harvard, Vancouver, ISO, and other styles
15

Law, Greg. "A new protection model for component-based operating systems." Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Larsson, Tobias, and Niklas Lindén. "Blocking Privacy-Invasive Software Using a Specialized Reputation System." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4521.

Full text
Abstract:
Privacy-invasive software is an increasingly common problem for today's computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This thesis proposes the use of a specialized reputation system to gather and share information regarding software behaviour between community users. A client application helps guide the user at the point of executing software on the local computer, displaying other users' feedback about the expected behaviour of the software. We discuss important aspects to consider when constructing such a system, and propose possible solutions. Based on the observations made, we implemented a client/server based proof-of-concept tool, which helped us discover other issues such as the effect on system stability. We also compare this solution to other, more conventional, protection methods such as anti-virus and anti-spyware software.
APA, Harvard, Vancouver, ISO, and other styles
17

Birkenfeld, Daniela H. "The protection of computer software : a comparative study of the American and German law." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fatema, Kaniz. "Adding privacy protection to policy based authorisation systems." Thesis, University of Kent, 2013. https://kar.kent.ac.uk/47905/.

Full text
Abstract:
An authorisation system determines who is authorised to do what i.e. it assigns privileges to users and provides a decision on whether someone is allowed to perform a requested action on a resource. A traditional authorisation decision system, which is simply called authorisation system or system in the rest of the thesis, provides the decision based on a policy which is usually written by the system administrator. Such a traditional authorisation system is not sufficient to protect privacy of personal data, since users (the data subjects) are usually given a take it or leave it choice to accept the controlling organisation’s policy. Privacy is the ability of the owners or subjects of personal data to control the flow of data about themselves, according to their own preferences. This thesis describes the design of an authorisation system that will provide privacy for personal data by including sticky authorisation policies from the issuers and data subjects, to supplement the authorisation policy of the controlling organisation. As personal data moves from controlling system to controlling system, the sticky policies travel with the data. A number of data protection laws and regulations have been formulated to protect the privacy of individuals. The rights and prohibitions provided by the law need to be enforced by the authorisation system. Hence, the designed authorisation system also includes the authorisation rules from the legislation. This thesis describes the conversion of rules from the EU Data Protection Directive into machine executable rules. Due to the nature of the legislative rules, not all of them could be converted into deterministic machine executable rules, as in several cases human intervention or human judgement is required. This is catered for by allowing the machine rules to be configurable. Since the system includes independent policies from various authorities (law, issuer, data subject and controller) conflicts may arise among the decisions provided by them. Consequently, this thesis describes a dynamic, automated conflict resolution mechanism. Different conflict resolution algorithms are chosen based on the request contexts. As the EU Data Protection Directive allows processing of personal data based on contracts, we designed and implemented a component, Contract Validation Service (ConVS) that can validate an XML based digital contract to allow processing of personal data based on a contract. The authorisation system has been implemented as a web service and the performance of the system is measured, by first deploying it in a single computer and then in a cloud server. Finally the validity of the design and implementation are tested against a number of use cases based on scenarios involving accessing medical data in a health service provider’s system and accessing personal data such as CVs and degree certificates in an employment service provider’s system. The machine computed authorisation decisions are compared to the theoretical decisions to ensure that the system returns the correct decisions.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Guo Ying. "Three essays on managing information systems security : patch management, learning dynamics, and security software market /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/8773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Skandylas, Charilaos. "Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems." Licentiate thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99109.

Full text
Abstract:
Today’s software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty. Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence, while their consequences are often severe. Self-adaptive systems have been proposed to mitigate the complexity and frequent degree of change by adapting at run-time to deal with situations not known at design time. They, however, are not immune to attacks, as they themselves suffer from high degrees of complexity and uncertainty. Therefore, systems that can dynamically defend themselves from adversaries are required. Such systems are called self-protecting systems and aim to identify, analyse and mitigate threats autonomously. This thesis contributes two approaches towards the goal of providing systems with self-protection capabilities. The first approach aims to enhance the security of architecture-based selfadaptive systems and equip them with (proactive) self-protection capabilities that reduce the exposed attack surface. We target systems where information about the system components and its adaptation decisions is available, and control over its adaptation is also possible. We formally model the security of the system and provide two methods to analyze its security that help us rank adaptations in terms of their security level: a method based on quantitative risk assessment and a method based on probabilistic verification. The results indicate an improvement to the system security when either of our solutions is employed. However, only the second method can provide self-protecting capabilities. We have identified a direct relationship between security and performance overhead, i.e., higher security guarantees impose analogously higher performance overhead. The second approach targets open decentralized systems where we have limited information about and control over the system entities. Therefore, we attempt to employ decentralized information flow control mechanisms to enforce security by controlling interactions among the system elements. We extend a classical decentralized information flow control model by incorporating trust and adding adaptation capabilities that allow the system to identify security threats and self-organize to maximize the average trust between the system entities. We arrange entities of the system in trust hierarchies that enforce security policies among their elements and can mitigate security issues raised by the openness and uncertainty in the context and environment, without the need for a trusted central controller. The experiment results show that a reasonable level of trust can be achieved and at the same time confidentiality and integrity can be enforced with a low impact on the throughput and latency of messages exchanged in the system.
APA, Harvard, Vancouver, ISO, and other styles
21

Al, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.

Full text
Abstract:
Trade secrets have become an important aspect of competitive advantage for new and established businesses in the new digital economy. This is particularly true in corporate venturing, where most corporates rely on new entrepreneurial ventures with creative ideas to drive innovation and fuel growth. In this manner, these corporates run corporate venturing units such as corporate accelerators to support entrepreneurs creating new ventures. During the accelerated pace of venturing, trade secrets become the core intangible asset that requires protection for any new venture. Yet, people remain the weakest link in the cyber security chain and that requires more understanding to enhance cyber security protection. A new approach was suggested in this study to explore the protection of trade secrets through the confidentiality of information, the ownership of intellectual property and the secrecy of commercial secrets. This study developed a conceptual model to explore cyber security behaviour for trade secret protection within corporate accelerators. Well-established theories were adopted to develop the research conceptual model for trade secret protection, integrating the protection motivation theory (PMT), social bond theory (SBT) and the concept of psychological ownership. This study began with a comprehensive up-to-date systematic literature review in the field of cyber security behavioural intentions over the past decade. The top 10 journals in the field of cyber security behaviour were reviewed and 46 publications that used 35 behaviour theories were identified. A concept matrix based on a concept-centric approach was applied to present the behavioural theories used in the relevant literature. By analysing the relevant literature results, the key cyber security behaviour elements were identified and illustrated via a concept map and matrix. Based on the output of the literature review analysis, valuable findings and insights were presented. This study investigates entrepreneurs’ cyber security behavioural intentions to protect trade secrets in agile dynamic corporate environments. The research design adopted a hypothetico-deductive approach using a quantitative survey for empirical data collection. To evaluate the conceptual model, a partial least squares method of structural equation modelling (PLS-SEM) analysis was used. This involved validity and reliability assessments, in addition to hypotheses testing. The research results found statistically significant relationships for severity, vulnerability, response efficacy, response cost, involvement and personal norms in relation to cyber security behavioural intentions to protect trade secrets.
APA, Harvard, Vancouver, ISO, and other styles
22

Mellstrand, Per. "Protecting Software Execution by Dynamic Environment Hardening." Licentiate thesis, Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/904bf1276b462168c1257115004309ff?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ahmad, Saghir. "Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /." Oslo : Faculty of Law, Universitetet i Oslo, 2008. http://www.duo.uio.no/publ/jus/2008/87514/87514.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Paulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.

Full text
Abstract:
O uso de dispositivos móveis por um número cada vez maior de pessoas, e em um número crescente de atividades que requerem mais segurança da informação, coloca em evidência a necessidade de prover segurança nos softwares desse ambiente. O aspecto de segurança da informação em dispositivos móveis é preocupante. Entretanto os modelos utilizados pela indústria de software – e os encontrados na literatura atual - no desenvolvimento de aplicações móveis com requisitos de segurança da informação de alto nível ainda não respondem às necessidades de mais segurança reclamadas pelos usuários. O presente estudo considera que tais modelos podem ser melhorados com o incremento de métodos e técnicas específicas, algumas já utilizadas com sucesso no desenvolvimento de aplicações desktop ou não voltadas para o ambiente de dispositivos móveis. Este trabalho propõe a inclusão de abordagem de segurança da informação no início do ciclo de vida do desenvolvimento de software, a partir do estudo das ameaças e vulnerabilidades, da aplicação antecipada dos casos de abuso – aqui chamados de casos de uso impróprio, da análise de risco, dos testes de segurança baseados no risco e do uso de máquinas de ataque nos testes de segurança durante o processo de desenvolvimento do software. Para alcançar o objetivo desta pesquisa, os modelos mais conhecidos e utilizados no ciclo de vida do desenvolvimento de software são analisados do ponto de vista da segurança da informação, e uma nova abordagem é proposta por meio do uso de um modelo complementar de desenvolvimento de software voltado para a segurança. Alguns modelos de artefatos são apresentados e um estudo de caso aplicando os conceitos tratados na pesquisa é utilizado com o intuito de avaliar as principais contribuições discutidas no texto, e também alguns dos resultados preliminares obtidos com a realização do trabalho de pesquisa.
The increasingly wide and intense use of mobile devices - whose processing and storage capacity grows almost overcoming the desktops - exposes greatly issues relating to information security in this environment. This is a worrying fact. However, the models currently found in the literature and used by software industry in developing mobile applications with the highest information security requirements are not yet answering users’ needs for more security, and may be improved adding specific methods or techniques, sometimes already used in desktop - or not mobile ones - applications development. This work proposes to insert information security approach early in the software development life cycle using threats and vulnerabilities study, the early application of abuse case - also called misuse cases, the risk analysis, the risk based security test and the use of attack machines in the development process. To reach the research goal, this work analyzed usual models used on SDLC from the information security point of view, and presents a new approach thru the use of a security driven development complementary model. The work also presents some templates and uses a case study for apply the concepts and evaluate the main contributions discussed in the text, also as the preliminary results obtained on the research.
APA, Harvard, Vancouver, ISO, and other styles
25

Arancibia, Rafael. "Intellectual Property Protection for Computer Software: A Comparative Analysis of the United States and Japanese Intellectual Property Regimes." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/9685.

Full text
Abstract:
This thesis explores the reform of intellectual property regulation policies with respect to computer software within two advanced industrial nations after 1980. A comparative case analysis of the United States and Japan will provide insight as to how advanced industrial nations have responded to market forces, competing private interests, and international pressure for policy harmonization in the construction and implementation of intellectual property regulation reforms. This study will show that ideological and structural arrangements of state institutions have influenced the extent of liberalization in intellectual property policy, and the preservation of equilibrium between individual rights and public interests in the establishment of intellectual property.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
26

Mellstrand, Per. "Protection of System Layer Affordances." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4212.

Full text
Abstract:
With more and more open systems connected to the Internet security is perhaps the most important attribute of modern software systems. A large problem when creating secure systems is developers misunderstanding or incorrectly assuming how objects behave. In this paper I describe how such incorrect assumption can result in large problems in software systems, under which conditions these problems typically appear and a method that can be used to reduce the number of software defects caused by incorrect assumption.
Tele: 070-6470393 eller 0457-79875
APA, Harvard, Vancouver, ISO, and other styles
27

Forsyth, Guy, and N/A. "A minimalist sui generis legislative proposal for the application of common law principles to the protection of computer software." University of Canberra. Law, 1998. http://erl.canberra.edu.au./public/adt-AUC20090714.142532.

Full text
Abstract:
This thesis examines the development of copyright and patent protection in the United States, United Kingdom and Australia and proposes that intellectual property is not the correct mechanism for protecting computer software. Both copyright and patent protection are evaluated in relation to their application to protecting the various elements of software. The increased desire for patent protection of software in the United States has recently impacted the debate over the correct regime for intellectual property protection. There has also been a corresponding restriction in the application of copyright protection by the courts. Combined with an undercurrent of sui generis software legislation being advocated by academia this has lead to the situation where there is continuing uncertainty over which method of protection should be provided for software. It will be shown that copyright is inadequate for the protection of computer software and that it does not address the correct element requiring protection. Patents, by corollary, provide protection that is excessive. The socio-economic effects of patent protection will be shown to demonstrate that it is not a worthy successor or adjunct to copyright. While copyright has attempted to protect one aspect (source code) patents have attempted to protect another (functionality). The thesis identifies the fundamental flaws in the protection offered by both regimes and proposes that they are equally unsuitable for the protection of software. Software will be shown to possess a diverse array of elements that are largely indivisible if adequate protection is to be provided. It is proposed that software be considered as a new form of property, referred to as Binary property, which covers informational and information processing entities. Further, the existing common law principles should be applied to the aspects that are at the heart of the intellectual property protection dilemma. In reality the elements requiring protection in software are activities that wrongfully duplicate a work or replicate it to create clones. It will be shown that the common law principles of theft, trespass, breach of contract and passing-off are suitable for protecting developers from these infringements. It will also be contended that any legislative intervention should be limited so that a certain degree of replication is allowable where there is a benefit to society through technological advancement or enhancement through standardisation. As such the application of common law principles are applied in a minimalist legalistic environment. The minimalist approach takes the position that there should be minimal legislative intervention in the computer industry. It proposes that there should be legislative intervention to enable the existing common law to take account of computer technology and provide for its continuing impact on society that will accelerate into the next millennium. It further shows that the continuing development of computer technology will outpace intellectual property necessitating the recognition of computer software as a unique form of new property in existing jurisprudence. The application of existing common law principles of property and the reduction in the monopolistic nature of intellectual property will not only benefit the highly dynamic and creative international computer industry but it will also be in the best interests of the Australian software development industry.
APA, Harvard, Vancouver, ISO, and other styles
28

Tarhan, Faik Aras. "Distance Adaptive Shared Path Protection for Elastic Optical Networks under Dynamic Traffic." Thesis, KTH, Programvaruteknik och Datorsystem, SCS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141703.

Full text
Abstract:
Recently, the internet traffic demand has been compoundly rising up as a result of the increase in the number of users as well as data demand per user. That is why, Elastic Optical Networks (EONs), which employ Orthongonal Frequency Division Multiplexing (OFDM) , have been proposed to scale the demands by efficiently utilizing the spectrum as they provide finer spectrum granularity and distance adaptive modulation formatting. Not only efficiency and scalability but also survivability of the network is significant since even a single-link failure may cause huge volume of data considering that even a channel bandwidth may vary between 1 Gb/s and 1Tb/s. Hence, we propose a heuristic algorithm to increase the spectrum efficiency in EONs employing Shared Path Protection (SPP) as the recovery scheme provided that the traffic demand is dynamic and the modulation format is distance adaptive. Our algorithm, Primary First-Fit Modified Backup Last-Fit (PF-MBL), follows two step approach for Routing and Spectrum Assignment (RSA). In the first step, k-shortest path algorithm is applied and candidates paths are found regardless of spectrum availability for routing. In the second step, spectrum is assigned to working paths and backup paths starting from the different ends of the links’ frequency domain so as to group working and backup path resources separately. In working path spectrum assignment, First-Fit strategy is employed. In backup path spectrum assignment, the algorithm chooses a path according to a formula among candidate paths with available spectrum widths found by Last-Fit strategy. In this manner, we expect to provide less fragmented spectrum for backup paths as well as the network, thereby increasing their sharability and thus the spectrum efficiency. We compare our algorithm and the two current solutions by simulations. Results show that PF-MBL can improve the performance in terms of blocking and bandwidth blocking probability by 24% up to 59% compared to the current outperforming algorithm when the bandwidth acceptance ratio of the system varies from 90% to 99.9% in different loads. Moreover, it achieves between 41% to 59% savings over the current outperforming algorithm when the bandwidth acceptance ratio of the system varies from 99% to 99.9%.
APA, Harvard, Vancouver, ISO, and other styles
29

Galvez-Cruz, Dora Carmen. "An environment for protecting the privacy of e-shoppers." Thesis, University of Glasgow, 2009. http://theses.gla.ac.uk/590/.

Full text
Abstract:
Privacy, an everyday topic with weekly media coverage of loss of personal records, faces its bigger risk during the uncontrolled, involuntary or inadvertent disclosure and collection of personal and sensitive information. Preserving one's privacy while e-shopping, especially when personalisation is involved, is a big challenge. Current initiatives only offer customers opt-out options. This research proposes a `privacy-preserved' shopping environment (PPSE) which empowers customers to disclose information safely by facilitating a personalised e- shopping experience that protects their privacy. Evaluation delivered positive results which suggest that such a product would indeed have a market in a world where customers are increasingly concerned about their privacy.
APA, Harvard, Vancouver, ISO, and other styles
30

Cavalcante, Gabriel Dieterich. "Detecção e recuperação de intrusão com uso de controle de versão." [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275813.

Full text
Abstract:
Orientador: Paulo Lício de Geus
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-16T05:27:31Z (GMT). No. of bitstreams: 1 Cavalcante_GabrielDieterich_M.pdf: 3073328 bytes, checksum: aeb145421a7f9c0c3d3ac872eb9ac054 (MD5) Previous issue date: 2010
Resumo: Existe uma grande quantidade de configurações presentes em sistemas atuais e gerir essas configurações é um trabalho árduo para qualquer administrador de sistema. Inúmeras configurações podem ser definidas para uma só máquina e as combinações entre elas implicam de forma significativa no seu desempenho. A partir do momento que um sistema em pleno funcionamento pára de funcionar, algo em sua estrutura pode ter mudado. Este cenário é comum no processo de desenvolvimento de software onde o código fonte pode deixar de compilar ou ainda uma funcionalidade pode se perder. Controladores de versão são usados para reverter o estado do código para uma data anterior, solucionando o problema. Verificadores de Integridade são utilizados para detectar estas mudanças, porém não possuem mecanismos específicos para recuperação. Este estudo propõe e implementa uma arquitetura integrada que combina verificação de integridade e mecanismos de recuperação. Foram executados testes para determinar a sobrecarga total deste método, além de estudos de caso para verificar a sua eficiência de recuperação
Abstract: Current computer systems have a huge number of configurations that are hard to manage. The combinations of system configurations can impact on performance and behavior. From the moment that a system stops working correctly it is remarkable that something has changed. That is in common in software development, where changes made by the programmer may result in some features no longer working or the project not compiling anymore. Revision control systems can recover a previous state of the source code through revision mechanisms. Integrity checking is used to catch file modifications, however this technique does nothing toward recovering those files. This study proposes and implements an integrated architecture that combines integrity checking and restoring mechanisms. Tests were executed in order to measure the load imposed by the solution. In addition, analysis of three case studies shows the efficiency of the adopted solution
Mestrado
Segurança de Computadores
APA, Harvard, Vancouver, ISO, and other styles
31

Francisco, Andreia Marlene Correia. "A proteção jurídica de software na Europa: um percurso legislativo controverso." Dissertação, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.

Full text
Abstract:
Mestrado em Direito
Law
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
APA, Harvard, Vancouver, ISO, and other styles
32

Francisco, Andreia Marlene Correia. "A proteção jurídica de software na Europa: um percurso legislativo controverso." Master's thesis, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.

Full text
Abstract:
Mestrado em Direito
Law
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
APA, Harvard, Vancouver, ISO, and other styles
33

Eksteen, Lambertus Lochner. "An investigation into source code escrow as a controlling measure for operational risk contained in business critical software." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/95629.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2012.
This research report outlines corporate governance and information technology risk management frameworks and the use of software escrow within a holistic enterprise risk management strategy to maintain business continuity. Available risk mitigation tools and frameworks were analysed including the use of software escrow as an information technology risk mitigation tool and continuity instrument. The primary researched problem relates to how organisations can ensure business continuity through managing the risks surrounding business-critical software applications. Software escrow was identified in the literature review as a risk management tool used to mitigate operational risks residing in the licencing of mission-critical software applications. The primary research question is: “How can source code escrow contribute towards business continuity by limiting risks contained in licensed business critical software applications?” This study found that an escrow agreement ensures an end-user access to licenced mission-critical intellectual property in the event of the owner’s insolvency, acquisition or breach of maintenance agreements and thereby ensures continuity. The following secondary research questions were also answered: “What types of operational risks will be minimised using software escrow?” and “What constitutes an effective source code agreement in South Africa?” The research identified that the main driver for escrow was operational risk of a mission-critical system failure due to maintenance and upgrades not taking place. The reasons identified included insolvency of the software supplier, acquisition of the supplier, loss of key resources (developers) and breach of maintenance or development agreements. The research also identified some limitations to the application of escrow and the reasons for some agreements not being executed. Key escrow contract quality criteria were identified which ensure an effective agreement under South African law. The following essential quality criteria were found to improve the efficiency of execution of the escrow contract: - Frequency and quality of deposits; - Deposit verification to ensure usability of material post release; and - Well-defined release trigger events to avoid legal disputes regarding what constitutes a release. Case studies highlighted the main risks that drive the creation of escrow agreements and identified limitations to the execution of some escrow agreements. The software end-user operational risks mitigated by the use of escrow included: - Continued use of the software despite vendor bankruptcy; - Reducing the dependency on the supplier for maintenance and support of the software Safeguarding critical business processes; and - Return on investment (software implementation, hardware and training of staff). It was concluded that, despite the legal and practical complexities concerned with escrow, it remains the best instrument to ensure continuity when relying on licensed intellectual property used for business-critical functions and processes. Software escrow is therefore a vital component of a well-formulated license agreement to ensure access to mission-critical technology (including all related intellectual property) under pre-defined conditions of release to the end-user (licensee). In the event of a release, the escrow agent gives the end-user access to the deposited source code and related materials for the purposes of business continuity only and in no way affects the ownership rights of the supplier/owner.
APA, Harvard, Vancouver, ISO, and other styles
34

Chapman, Erin Elizabeth. "A Survey and Analysis of Solutions to the Oblivious Memory Access Problem." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/891.

Full text
Abstract:
Despite the use of strong encryption schemes, one can still learn information about encrypted data using side channel attacks [2]. Watching what physical memory is being accessed can be such a side channel. One can hide this information by using oblivious simulation - hiding the true access pattern of a program. In this paper we will review the model behind oblivious simulation, attempt to formalize the problem and define a security game. We will review the major solutions pro- posed so far, the square root and hierarchical solutions, as well as propose a new variation on the square root solution. Additionally, we will show a new formalization for providing software protection by using an encryption scheme and oblivious simulation.
APA, Harvard, Vancouver, ISO, and other styles
35

Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Murray, Jessica L. "An exfiltration subversion demonstration." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
37

Jiang, Jing Jing. "Self-synchronization and LUT based client side digital audio watermarking." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Louis, Christophe. "La protection des logiciels : une solution pour ordinateurs personnels utilisant la carte a micro-calculateur." Paris 6, 1988. http://www.theses.fr/1988PA066373.

Full text
Abstract:
Deux solutions de protection utilisant la carte a microcalculateur ont ete etudiees. L'une est une protection d'acces a la machine. La deuxieme protege le logiciel en chiffrant une partie de ses instructions. Ces solutions ont ete validees par deux maquettes associant du materiel et du logiciel afin de proteger des attaques des utilitaires pour ibm pc
APA, Harvard, Vancouver, ISO, and other styles
39

Mohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.

Full text
Abstract:
The proposed research is in the area of attribute-based authorization systems. We address two specific research problems in this area. First, evaluating authorization policies in multi-authority systems where there are multiple stakeholders in the disclosure of sensitive data. The research proposes to consider all the relevant policies related to authorization in real time upon the receipt of an access request and to resolve any differences that these individual policies may have in authorization. Second, to enable a lot of entities to participate in the authorization process by asserting attributes on behalf of the principal accessing resources. Since it is required that these asserted attributes be trusted by the authorization system, it is necessary that these entities are themselves trusted by the authorization system. Two frameworks are proposed to address these issues. In the first contribution a dynamic authorization system is proposed which provides conflict detection and resolution among applicable policies in a multi-authority system. The authorization system is dynamic in nature and considers the context of an access request to adapt its policy selection, execution and conflict handling based on the access environment. Efficient indexing techniques are used to increase the speed of authorization policy loading and evaluation. In the second contribution, we propose a framework for service providers to evaluate trust in entities asserting on behalf of service users in real time upon receipt of an access request. This trust evaluation is done based on a reputation system model, which is designed to protect itself against known attacks on reputation systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Hassan, Waqas. "Video analytics for security systems." Thesis, University of Sussex, 2013. http://sro.sussex.ac.uk/id/eprint/43406/.

Full text
Abstract:
This study has been conducted to develop robust event detection and object tracking algorithms that can be implemented in real time video surveillance applications. The aim of the research has been to produce an automated video surveillance system that is able to detect and report potential security risks with minimum human intervention. Since the algorithms are designed to be implemented in real-life scenarios, they must be able to cope with strong illumination changes and occlusions. The thesis is divided into two major sections. The first section deals with event detection and edge based tracking while the second section describes colour measurement methods developed to track objects in crowded environments. The event detection methods presented in the thesis mainly focus on detection and tracking of objects that become stationary in the scene. Objects such as baggage left in public places or vehicles parked illegally can cause a serious security threat. A new pixel based classification technique has been developed to detect objects of this type in cluttered scenes. Once detected, edge based object descriptors are obtained and stored as templates for tracking purposes. The consistency of these descriptors is examined using an adaptive edge orientation based technique. Objects are tracked and alarm events are generated if the objects are found to be stationary in the scene after a certain period of time. To evaluate the full capabilities of the pixel based classification and adaptive edge orientation based tracking methods, the model is tested using several hours of real-life video surveillance scenarios recorded at different locations and time of day from our own and publically available databases (i-LIDS, PETS, MIT, ViSOR). The performance results demonstrate that the combination of pixel based classification and adaptive edge orientation based tracking gave over 95% success rate. The results obtained also yield better detection and tracking results when compared with the other available state of the art methods. In the second part of the thesis, colour based techniques are used to track objects in crowded video sequences in circumstances of severe occlusion. A novel Adaptive Sample Count Particle Filter (ASCPF) technique is presented that improves the performance of the standard Sample Importance Resampling Particle Filter by up to 80% in terms of computational cost. An appropriate particle range is obtained for each object and the concept of adaptive samples is introduced to keep the computational cost down. The objective is to keep the number of particles to a minimum and only to increase them up to the maximum, as and when required. Variable standard deviation values for state vector elements have been exploited to cope with heavy occlusion. The technique has been tested on different video surveillance scenarios with variable object motion, strong occlusion and change in object scale. Experimental results show that the proposed method not only tracks the object with comparable accuracy to existing particle filter techniques but is up to five times faster. Tracking objects in a multi camera environment is discussed in the final part of the thesis. The ASCPF technique is deployed within a multi-camera environment to track objects across different camera views. Such environments can pose difficult challenges such as changes in object scale and colour features as the objects move from one camera view to another. Variable standard deviation values of the ASCPF have been utilized in order to cope with sudden colour and scale changes. As the object moves from one scene to another, the number of particles, together with the spread value, is increased to a maximum to reduce any effects of scale and colour change. Promising results are obtained when the ASCPF technique is tested on live feeds from four different camera views. It was found that not only did the ASCPF method result in the successful tracking of the moving object across different views but also maintained the real time frame rate due to its reduced computational cost thus indicating that the method is a potential practical solution for multi camera tracking applications.
APA, Harvard, Vancouver, ISO, and other styles
41

Hakola, Matthew B. "An exploratory analysis of convoy protection using agent-based simulation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHakola.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ma, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.

Full text
Abstract:
Thesis (M.S.)--Georgia State University, 2007.
Title from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Tao. "RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-08042006-122745/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.
Ahamad, Mustaque, Committee Member ; Pande, Santosh, Committee Chair ; Lee, Wenke, Committee Member ; Schwan, Karsten, Committee Member ; Yang, Jun, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Kun. "Dynamic pointer tracking and its applications." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33936.

Full text
Abstract:
Due to the significant limitations of static analysis and the dynamic nature of pointers in weakly typed programming languages like C and C++, the points-to sets obtained at compile time are quite conservative. Most static pointer analysis methods trade the precision for the analysis speed. The methods that perform the analysis in a reasonable amount of time are often context and/or flow insensitive. Other methods that are context, flow, and field sensitive have to perform the whole program inter-procedural analysis, and do not scale with respect to the program size. A large class of problems involving optimizations such as instruction prefetching, control and data speculation, redundant load/store instructions removal, instruction scheduling, and memory disambiguation suffer due to the imprecise and conservative points-to sets computed statically. One could possibly live without optimizations, but in domains involving memory security and safety, lack of the precise points-to sets can jeopardize the security and safety. In particular, the lack of dynamic points-to sets drastically reduce the ability to reason about a program's memory access behavior, and thus illegal memory accesses can go unchecked leading to bugs as well as security holes. On the other hand, the points-to sets can be very useful for other domains such as the heap shape analysis and garbage collection. The knowledge of precise points-to sets is therefore becoming very important, but has received little attention so far beyond a few studies, which have shown that the pointers exhibit very interesting behaviors during execution. How to track such behaviors dynamically and benefit from them is the topic covered by this research. In this work, we propose a technique to compute the precise points-to sets through dynamic pointer tracking. First, the compiler performs the pointer analysis to obtain the static points-to sets. Then, the compiler analyzes the program, and inserts the necessary instructions to refine the points-to sets. At runtime, the inserted instructions automatically update the points-to sets. Dynamic pointer tracking in software can be expensive and can be a barrier to the practicality of such methods. Several optimizations including removal of redundant update, post-loop update, special pattern driven update removal, pointer initialization update removal, update propagation, invariant removal, and on demand update optimization are proposed. Our experimental results demonstrate that our mechanism is able to compute the points-to sets dynamically with tolerable overheads. Finally, the memory protection and garbage collection work are presented as the consumers of dynamic pointer tracking to illustrate its importance. In particular, it is shown how different memory properties can be easily tracked using the dynamic points-to sets opening newer possibilities.
APA, Harvard, Vancouver, ISO, and other styles
45

Coetzee, Dirk. "Visualisation of PF firewall logs using open source." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018552.

Full text
Abstract:
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the opportunity to find the mistake or fault in the organisation’s defence systems. Historically, it remains difficult to choose what logs are required by your organization. A number of questions should be considered: should a centralised or decentralised approach for collecting these logs be followed or a combination of both? How many events will be collected, how much additional bandwidth will be required and will the log collection be near real time? How long must the logs be saved and what if any hashing and encryption (integrity of data) should be used? Lastly, what system must be used to correlate, analyse, and make alerts and reports available? This thesis will address these myriad questions, examining the current lack of log analysis, practical implementations in modern organisation, and also how a need for the latter can be fulfilled by means of a basic approach. South African organizations must use technology that is at hand in order to know what electronic data are sent in and out of their organizations network. Concentrating only on FreeBSD PF firewall logs, it is demonstrated within this thesis the excellent results are possible when logs are collected to obtain a visual display of what data is traversing the corporate network and which parts of this data are posing a threat to the corporate network. This threat is easily determined via a visual interpretation of statistical outliers. This thesis aims to show that in the field of corporate data protection, if you can measure, you can manage.
APA, Harvard, Vancouver, ISO, and other styles
46

Schmidt, Phillip. "Protection of Software in China." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01653856002/$FILE/01653856002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pei, Breivold Hongyu. "Software Architecture Evolution and Software Evolvability." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-4540.

Full text
Abstract:

Software is characterized by inevitable changes and increasing complexity, which in turn may lead to huge costs unless rigorously taking into account change accommodations. This is in particular true for long-lived systems. For such systems, there is a need to address evolvability explicitly during the entire lifecycle, carry out software evolution efficiently and reliably, and prolong the productive lifetime of the software systems.

In this thesis, we study evolution of software architecture and investigate ways to support this evolution.           The central theme of the thesis is how to analyze software evolvability, i.e. a system’s ability to easily accommodate changes. We focus on several particular aspects: (i) what software characteristics are necessary to constitute an evolvable software system; (ii) how to assess evolvability in a systematic manner; (iii) what impacts need to be considered given a certain change stimulus that results in potential requirements the software architecture needs to adapt to, e.g. ever-changing business requirements and advances of technology.

To improve the capability in being able to on forehand understand and analyze systematically the impact of a change stimulus, we introduce a software evolvability model, in which subcharacteristics of software evolvability and corresponding measuring attributes are identified. In addition, a further study of one particular measuring attribute, i.e. modularity, is performed through a dependency analysis case study.

We introduce a method for analyzing software evolvability at the architecture level. This is to ensure that the implications of the potential improvement strategies and evolution path of the software architecture are analyzed with respect to the evolvability subcharacteristics. This method is proposed and piloted in an industrial setting.

The fact that change stimuli come from both technical and business perspectives spawns two aspects that we also look into in this research, i.e. to respectively investigate the impacts of technology-type and business-type of change stimuli.

APA, Harvard, Vancouver, ISO, and other styles
48

Wallace, Julia. "Quantum computer software." Thesis, University of Exeter, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Shvadlenko, Irina. "Evaluation of Environmental Education Software “Protecting Your Environment”." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1108407292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sherwood, Patricia Ann. "Inspections : software development process for building defect free software applied in a small-scale software development environment /." Online version of thesis, 1990. http://hdl.handle.net/1850/10598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography