Tesis sobre el tema "Control toolbox (Computer file)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 18 mejores tesis para su investigación sobre el tema "Control toolbox (Computer file)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Tang, Wai-hung y 鄧偉雄. "An anonymity scheme for file retrieval systems". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.
Texto completoMazières, David (David Folkman) 1972. "Security and decentralized control of the SFS global file system". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43610.
Texto completoIncludes bibliographical references (p. 47-53).
SFS (secure file system) is a global file system designed to be secure against all active and passive network attacks, provide a single namespace across all machines in the world, and avoid any form of centralized control. Using SFS, any unprivileged user can access any file server in the world securely and with no prior arrangement on the part of system administrators. New file servers are immediately accessible securely by all client machines. Users can name such new servers from any existing file system by specifying public keys in symbolic links. A prototype implementation of SFS installs easily, coexists with other file systems, and should port trivially to most UNIX platforms. Preliminary performance numbers on application benchmarks show that, despite its use of encryption and user-level servers, SFS delivers performance competitive with an in-kernel NFS implementation.
by David Mazières.
M.S.
Leung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks". Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.
Texto completoLeung, Ka-ho Andrew y 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.
Texto completoMerritt, John W. "Distributed file systems in an authentication system". Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.
Texto completoFaltemier, Timothy Collin. "A groupware interface to a shared file system". Texas A&M University, 2004. http://hdl.handle.net/1969.1/1352.
Texto completoChung, Jae Won. "Congestion control for streaming media". Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.
Texto completoKeywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Beedu, Atul. "Integrated inventory control to manage blanket orders in a contract manufacturing environment a case study /". Diss., Online access via UMI:, 2005.
Buscar texto completoPerera, Dinesh Sirimal. "Design metrics analysis of the Harris ROCC project". Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/935930.
Texto completoDepartment of Computer Science
Bhargava, Manjari. "Analysis of multiple software releases of AFATDS using design metrics". Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834502.
Texto completoDepartment of Computer Science
LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Texto completoAllman, Mark. "Improving TCP performance over satellite channels". Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.
Texto completoNain, Philippe. "Application des methodes analytiques a la modelisation des systemes informatiques". Paris 6, 1987. http://www.theses.fr/1987PA066550.
Texto completoScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Texto completo"FADE: secure overlay cloud storage with access control and file assured deletion". 2011. http://library.cuhk.edu.hk/record=b5894616.
Texto completoThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 60-65).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Policy-based File Assured Deletion --- p.7
Chapter 2.1 --- Background --- p.7
Chapter 2.2 --- Policy-based Deletion --- p.9
Chapter 3 --- Basic Design of FADE --- p.13
Chapter 3.1 --- Entities --- p.13
Chapter 3.2 --- Deployment --- p.15
Chapter 3.3 --- "Security Goals, Threat Models, and Assumptions" --- p.16
Chapter 3.4 --- The Basics - File Upload/Download --- p.18
Chapter 3.5 --- Policy Revocation for File Assured Deletion --- p.23
Chapter 3.6 --- Multiple Policies --- p.23
Chapter 3.7 --- Policy Renewal --- p.25
Chapter 4 --- Extensions of FADE --- p.27
Chapter 4.1 --- Access Control with ABE --- p.27
Chapter 4.2 --- Multiple Key Managers --- p.31
Chapter 5 --- Implementation --- p.35
Chapter 5.1 --- Representation of Metadata --- p.36
Chapter 5.2 --- Client --- p.37
Chapter 5.3 --- Key Managers --- p.38
Chapter 6 --- Evaluation --- p.40
Chapter 6.1 --- Experimental Results on Time Performance of FADE --- p.41
Chapter 6.1.1 --- Evaluation of Basic Design --- p.42
Chapter 6.1.2 --- Evaluation of Extensions --- p.46
Chapter 6.2 --- Space Utilization of FADE --- p.49
Chapter 6.3 --- Cost Model --- p.51
Chapter 6.4 --- Lessons Learned --- p.53
Chapter 7 --- Related Work --- p.54
Chapter 8 --- Conclusions --- p.58
Bibliography --- p.60
"A model for the evaluation of control with reference to a simple path context model in a UNIX environment". Thesis, 2015. http://hdl.handle.net/10210/14471.
Texto completoInformation and the IT systems that support it are important business assets. Their availability, integrity and confidentiality are essential to maintain an organisations competitive edge, cash flow, profitability, company image and compliance with legal requirements. Organisations world-wide are now facing increased security threats from a wide range of sources. Information systems may be the target of a range of serious threats including computer-based fraud, espionage, sabotage, vandalism and other sources of failure or disaster ...
Pradeepa, B. K. "Performance Modelling Of TCP-Controlled File Transfers In Wireless LANs, And Applications In AP-STA Association". Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2121.
Texto completoBooi, Mutshavhani Charlotte. "Quality management systems used by nursing education institution in Gauteng Province". Thesis, 2008. http://hdl.handle.net/10500/2606.
Texto completoHealth Studies
M.A. (Health Studies)