Siga este link para ver outros tipos de publicações sobre o tema: Trust by the way of security.

Teses / dissertações sobre o tema "Trust by the way of security"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Trust by the way of security".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.

Texto completo da fonte
Resumo:
While not uncontested, the finding that liberal democracies rarely, if ever, fight wars against each other represents one of the seminal discoveries of international relations (IR) scholarship. Nevertheless, 'democratic peace theory' (DPT) – the body of scholarship that seeks to explain the democratic peace finding – still lacks a satisfactory explanation for this phenomenon. In this thesis, I argue that a primary source of this failure has been DPT's failure to recognize the importance of collective identification and trust for the eventuation of the 'liberal peace'. Building on existing DPT
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Manor, Mike. "The home front : civil rights, American values, and public trust when America is at war /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Lemaitre, Freddy. "La monnaie comme objet de sûretés." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.

Texto completo da fonte
Resumo:
Partant du constat que l’affectation en garantie de la monnaie est aujourd’hui susceptible de revêtir de multiples qualifications et d’obéir à des régimes tout aussi divers, selon que la monnaie est analysée comme un bien corporel ou incorporel et selon que les sommes affectées en garantie sont ou non confondues dans le patrimoine du créancier, cet essai propose d’adopter une conception unifiée de la monnaie susceptible de la soumettre à un régime simplifié d’affectation en garantie qui, sans faire fi de l’irréductible dualité tenant au caractère individualisé ou non des sommes d’argent, est a
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gilberg, Ole Rasmus. "Cloud Security without Trust." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.

Texto completo da fonte
Resumo:
The usage of cloud services is increasing for each day. This applies to private persons which store pictures and documents, as well as bigger corporations whom outsource parts of, or all, handling of their ICT infrastructure to cloud providers. Despite the continuous increase in application, there are still substantial security concerns among current and potential cloud users. Much of the concerns are due to lack of transparency to how the cloud providers maintain and process the user data. Motivated by this, multiple cryptographic schemes has been proposed to provide users with confidence tha
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Texto completo da fonte
Resumo:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized tr
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Leonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.

Texto completo da fonte
Resumo:
La mondialisation et la spécialisation de la chaîne d'approvisionnement des circuits intégrés (CI) ont conduit les entreprises de semi-conducteurs à partager leur précieuse propriété intellectuelle (PI) avec de nombreuses parties pour les faire fabriquer, tester, etc. En conséquence, les PI et les CI sensibles sont exposés à des parties potentiellement malveillantes, ce qui entraîne de graves menaces de piratage telles que la contrefaçon ou la retro ingénierie. Dans cette thèse, nous développons des méthodes pour sécuriser les IP/CI analogiques et mixtes contre les menaces de piratage dans la
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Bilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.

Texto completo da fonte
Resumo:
The thesis aims to develop a theoretical perspective for studying illegal protection-seeking migration, and possible responses to this movement adopted by the receiving communities. Using the security dilemma as the framework of analysis, the discussion will be conducted through the theoretical perspective provided by emancipatory security theory. The thesis has three parts. In Part I, the insecurity experienced by illegal sub-Saharan protection-seekers during their journey will be analyzed based on some accounts publicized by various civil society organizations. Part II will develop the theor
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Elsalamouny, Ehab M. "Probablistic trust models in network security." Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

El, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.

Texto completo da fonte
Resumo:
One of the dominant properties of a global computing network is the incomplete information available to principals about each other. This was the motivation of using the notion of probabilistic trust as an approach to security sensitive decision making in modern open and global computing systems. In such systems any principal A uses the outcomes of past interactions with another principal B to construct a probabilistic model approximating the behaviour of B. Using this model, the principal A can take decisions regarding interactions with B by estimating its future actions. Many existing framew
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Poirrier, Alexandre. "Formal Security of Zero Trust Architectures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAX050.

Texto completo da fonte
Resumo:
La sécurité des systèmes d'information repose traditionnellement sur le modèle de sécurité du périmètre, qui compartimentalise le réseau en différents périmètres isolés qui regroupent les ressources. Un système accède à un périmètre en s'authentifiant, et une fois au sein d'un périmètre, il est implicitement considéré comme étant de confiance, jouissant d'un accès non restreint à toutes les ressources de ce périmètre. Cependant, de nombreuses attaques envers les architectures périmétriques ont montré les limites de cette confiance. De plus, la transformation des systèmes d'information, par exe
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Morris, Cameron. "Browser-Based Trust Negotiation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.

Texto completo da fonte
Resumo:
<p>With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.</p><p>The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the i
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Moe, Marie Elisabeth Gaup. "Security, Privacy and Trust in Dynamic Networks." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5540.

Texto completo da fonte
Resumo:
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer networks and social networks are introducing new and exciting opportunities of communication between people and devices. But these dynamic networks also introduce many security- and privacy-related challenges. When dealing with complex and dynamic environments, information about the current level of security or privacy, expressed in a quantified manner, could be of great value in a decision-making process. In order to derive such quantified measures there is a need for mathematical models for s
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Messaggi, Kaya Monica. "Trust and security risks in mobile banking." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.

Texto completo da fonte
Resumo:
With the development and growth of mobile technologies, mobile phones enable users to perform a number of different tasks with their devices: from sending simple text messages, checking e-mails and browsing the internet, to running elaborated applications. Nowadays, the mobile phone platform creates great opportunities for businesses, especially due to its capabilities and population coverage: the number of mobile subscriptions approaches global population figures. In order to explore such opportunities, most banks have already launched their mobile applications and/or re-designed mobile versi
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Weissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.

Texto completo da fonte
Resumo:
This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Alruwaythi, Maryam. "User-Behavior Trust Modeling in Cloud Security." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/31537.

Texto completo da fonte
Resumo:
With the cloud computing increasing in popularity by providing a massive number of services such as recourses and data center, the number of attacks is increasing. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating systems, and network infrastructure provided by the cloud service providers (CSPs). Evaluating users? behavior in the cloud-computing infrastructure is becoming more important for both cloud users (CSs) and the CSPs that must ensure safety for users accessing the clou
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Yang, Seokwon. "Security and trust management in collaborative computing." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002375.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Le, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148/document.

Texto completo da fonte
Resumo:
Nous vivons aujourd’hui dans l'ère cybernétique où de nouvelles technologies naissent chaque jour avec la promesse de rendre la vie humaine plus confortable, pratique et sûre. Parmi ces nouvelles technologies, l'informatique mobile se développe en influençant la vie de l’utilisateur. En effet, les plates-formes mobiles (smartphone, tablette) sont devenues les meilleurs compagnons de l’utilisateur pour mener à bien ses activités quotidiennes, comme les activités commerciales ou de divertissement. En jouant ces rôles importants, les plates-formes mobiles doivent opérer dans des environnements de
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.

Texto completo da fonte
Resumo:
Les menaces pour la sécurité matérielle trouvent leur origine dans la chaîne d'approvisionnement en circuits intégrés (IC) massivement mondialisée et basée sur l'externalisation que nous connaissons aujourd'hui. Le coût prohibitif de la possession d'une fonderie de semi-conducteurs de haut niveau oblige les sociétés de conception de circuits intégrés à opter pour la sous-traitance de la fabrication, l'assemblage et le test de leurs circuits. L'externalisation de ces tâches intensifie le risque d'attaques de piratage de IC et d'insertion de chevaux de Troie matériels (HT), et ces deux menaces s
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Le, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148.

Texto completo da fonte
Resumo:
Nous vivons aujourd’hui dans l'ère cybernétique où de nouvelles technologies naissent chaque jour avec la promesse de rendre la vie humaine plus confortable, pratique et sûre. Parmi ces nouvelles technologies, l'informatique mobile se développe en influençant la vie de l’utilisateur. En effet, les plates-formes mobiles (smartphone, tablette) sont devenues les meilleurs compagnons de l’utilisateur pour mener à bien ses activités quotidiennes, comme les activités commerciales ou de divertissement. En jouant ces rôles importants, les plates-formes mobiles doivent opérer dans des environnements de
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Mignard, Cédric. "Le crédit-bailleur mobilier face à la procédure collective du crédit-preneur." Electronic Thesis or Diss., Toulon, 2019. http://www.theses.fr/2019TOUL0127.

Texto completo da fonte
Resumo:
Le contrat de crédit-bail est une technique de financement par laquelle le crédit-bailleur acquiert la propriété d’un bien en vue de le louer au crédit-preneur qui dispose d’une option d’achat au terme de la période irrévocable de location. Dans l’hypothèse où une procédure collective est ouverte à l’encontre du crédit-preneur, le crédit-bailleur se trouve nécessairement affecté. Le droit des entreprises en difficulté offre à l’organe compétent la possibilité d’exiger la continuation du contrat de crédit-bail, sans aucune autre contrepartie que l’exécution du contrat aux conditions initiales.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Crosby, Garth Valentine. "Trust Based Security Mechanisms for Wireless Sensor Networks." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/61.

Texto completo da fonte
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to addres
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Shearer, Charles Dylan. "Assumptions, trust, and names in computer security protocols." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5657.

Texto completo da fonte
Resumo:
Approved for public release; distribution is unlimited.<br>A major goal of using any security protocol is to create certain beliefs in the participants. A security protocol will use techniques like cryptography to guarantee some things, but it will still require a participant to make assumptions about other things that the protocol cannot guarantee; such assumptions often constitute trust in other participants. In this thesis, we attempt to precisely identify the required assumptions of some example protocols. In the process, we find that we must consider the names that participants use to
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Mustapa, Muslim. "PUF based FPGAs for Hardware Security and Trust." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1436361629.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Han, Weijun. "Trust-based distributed security framework for active networks." Thesis, Loughborough University, 2006. https://dspace.lboro.ac.uk/2134/34945.

Texto completo da fonte
Resumo:
Active networks are a possible Internet architecture for the future. They provide network users with more flexibility by allowing them to customise and control the behaviour of networks dynamically. Internet Friendly Active Network (IFAN) is an active network architecture based on the existing IP architecture. In this thesis a practical implementation of an active network node is presented, named IFAN Virtual Router (IFAN VR). IFAN VR is a software framework built on an IFAN node in IFAN networks, providing researchers, developers and users with an IFAN test-bed. The main modules of the IFAN V
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Chinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.

Texto completo da fonte
Resumo:
Videoconferencing is increasingly becoming a trend worldwide in applications where clients need to access lectures, meeting proceedings, communicating with family and friends etc. It provides a platform enabling the visual, audio and video communication between clients. The aim of this project is to utilize the open source Java software to build a desktop application enabling communication between clients. When a user needs to transfer a secured file, it’s unsafe to send it using social networking sites because of lack of security. So, with the “Multi-Way Communication System” (MWCS) we resolv
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Ford, Sarah Gordon. "Changing the way the world thinks about computer security." Thesis, Middlesex University, 2006. http://eprints.mdx.ac.uk/7995/.

Texto completo da fonte
Resumo:
Small changes in an established system can result in larger changes in the overall system (e.g. network effects, émergence, criticality, broken Windows theory). However, in an immature discipline, such as computer security, such changes can be difficult to envision and even more difficult to amplement, as the immature discipline is likely to lack the scientific framework that would allow for the introduction of even minute changes. (Cairns, P. and Thimbleby, H, 2003) describe three of the signs of an immature discipline as postulated by (Kuhn, 1970): a. squabbles over what are legitimate tools
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Xia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.

Texto completo da fonte
Resumo:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Dong, Changyu. "Non-monotonic trust management for distributed systems." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505456.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Maijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.

Texto completo da fonte
Resumo:
Inter-organisational trust is increasingly important among supply chain participants, where threats are building up from sources out of organisational control. The same problem is faced in the cyber security field, where threat level increases from the changes outside organisational boundaries. Each value chain participating in the supply chain must be secured. Trust building is mandated among all trust network members. The business interaction between supply chain participants is enabled by building inter-organisational trust first. This study provided ways to build this inter-organisational
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Duma, Claudiu. "Security and trust mechanisms for groups in distributed services /." Linköping : Univ, 2005. http://www.bibl.liu.se/liupubl/disp/disp2005/tek979s.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Paillissé, Vilanova Jordi. "Next generation overlay networks : security, trust, and deployment challenges." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672330.

Texto completo da fonte
Resumo:
Overlay networks are a technique to build a new network on top of an existing one. They are a key tool to add functionality to existing networks, and are used in different layers of the Internet stack for a wide variety of purposes, like confidentiality, Quality of Service, virtual networking, etc. Specifically, network overlays in the IP networking layer are widely used in some of these use cases. However, these kind of overlay networks do not have as many functionalities as overlays in other layers. For example, thanks to the Zero Trust Networking paradigm it is possible to build secure over
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Cozzi, Maxime. "Infrared Imaging for Integrated Circuit Trust and Hardware Security." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS046.

Texto completo da fonte
Resumo:
La généralisation des circuits intégrés et plus généralement de l'électronique à tous les secteurs d'activité humaine, nécessite d'assurer la sécurité d'un certain nombre de systèmes critiques (militaire, finance, santé, etc). Aujourd'hui, l'intégrité de ces systèmes repose sur un éventail d'attaques connues, pour lesquelles des contremesures ont été développées.Ainsi, la recherche de nouvelles attaques contribue fortement à la sécurisation des circuits électroniques. La complexité toujours croissante des circuits, permise par les progrès dans les technologies silicium, a pour conséquence l'ap
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

DE, BENEDICTIS MARCO. "Security and trust in a Network Functions Virtualisation Infrastructure." Doctoral thesis, Politecnico di Torino, 2020. http://hdl.handle.net/11583/2842509.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Yang, Yinan Information Technology &amp Electrical Engineering Australian Defence Force Academy UNSW. "W3 Trust Model (W3TM): a trust-profiling framework to assess trust and transitivity of trust of web-based services in a heterogeneous web environment." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Information Technology and Electrical Engineering, 2005. http://handle.unsw.edu.au/1959.4/38655.

Texto completo da fonte
Resumo:
The growth of eCommerce is being hampered by a lack of trust between providers and consumers of Web-based services. While Web trust issues have been addressed by researchers in many disciplines, a comprehensive approach has yet to be established. This thesis proposes a conceptual trust-profiling framework???W3TF???which addresses issues of trust and user confidence through a range of new user-centred trust measures???trust categories, trust domains, transitivity of trust, fading factor analysis, standalone assessment, hyperlinked assessment and relevance assessment. While others now use the co
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Dean, Kevin. "TrustVoucher: automating trust in websites." Thesis, Kansas State University, 2014. http://hdl.handle.net/2097/17638.

Texto completo da fonte
Resumo:
Master of Science<br>Department of Computing and Information Science<br>Eugene Vasserman<br>Since the early 2000s, Internet users have continuously fallen prey to the perils of identity theft and malware . A number of tools have been proposed and implemented to foster trust towards deserving websites and alert users of undeserving websites, including P3P and trust seals. Each of these has fallen short, with studies showing that users simply do not use them. TrustVoucher is a prototype system o forge bonds of trust between users and websites by automatically determining if the website is backed
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.

Texto completo da fonte
Resumo:
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret s
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Weyl, Benjamin. "On interdomain security : trust establishment in loosely coupled federated environments /." München : Verl. Dr. Hut, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017084239&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Vasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.

Texto completo da fonte
Resumo:
This work is of theoretical and practical importance, that is, generation of new knowledge associated with mobile commerce adoption in terms of security concerns and trust which will help not only future researchers but also e-businesses. Despite the fact researchers have examined the adoption of m-commerce in a holistic way, the author found there was no research focusing solely and in-depth on the determinants of trust and perceived risk. The problem was to examine how the above determinants affect the intention to adopt m-commerce. The objects are mobile commerce, security concerns and trus
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Ihsan, M. "A dynamic trust and mutual authentication scheme for MANET security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48328/.

Texto completo da fonte
Resumo:
MANETs are attractive technology in providing communication in the absence of a fixed infrastructure for applications such as, first responders at a disaster site or soldiers in a battlefield (Kumar, and Mishra, 2012). The rapid growth MANET has experienced in recent years is due to its Ad Hoc capabilities that have also made it prime target of cybercrimes (Jhaveri, 2012). This has raised the question of how could we embrace the benefits of MANET without the increased security risks. MANETs have several vulnerabilities such as lack of a central point, mobility, wireless links, limited energy r
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

McGinthy, Jason M. "Solutions for Internet of Things Security Challenges: Trust and Authentication." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91443.

Texto completo da fonte
Resumo:
The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, cur
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Hendrickson, Selim L. Y. Tuğlular Tuğkan. "Web Services Security: A Proposed Architecture For Interdomain Trust Relationship/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000581.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Weyl, Benjamin. "On interdomain security trust establishment in loosely coupled federated environments." München Verl. Dr. Hut, 2007. http://d-nb.info/992163153/04.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Spazzoli, Rowan. "Mental health and social decision making: How depression alters the way we trust." Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31013.

Texto completo da fonte
Resumo:
Depression is one of the most prevalent causes of disease burden in the world, with a particularly high prevalence in South Africa. Significant evidence exists for how depression affects employment, income and education, but there is little research on how it affects social decision making. This dissertation addresses the direct impact of depression on the prosocial behaviours that influence economic outcomes, specifically trust and trustworthiness, rather than the economic outcomes themselves. Using experimental and survey data from a randomised control trial, I show that depression reduces t
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Porter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Jarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Vilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.

Texto completo da fonte
Resumo:
<p>The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this new SIM capabilities together with its pervasiveness and security can support the development and design of trust-based applications. It reviews the new trust possibilities based on the identity factor, connectivity and context-awareness sensors on the SIM. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Corre, Kevin. "User controlled trust and security level of Web real-time communications." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S029/document.

Texto completo da fonte
Resumo:
Dans cette thèse, je propose trois contributions principales : dans notre première contribution, nous étudions l'architecture d'identité WebRTC et plus particulièrement son intégration aux algorithmes de délégation d'authentification existants. Cette intégration n'a pas encore été étudiée jusqu'à présent. Dans cette perspective, nous implémentons les composants de l'architecture d'identité WebRTC ce qui nous permet de montrer que cette architecture n'est pas particulièrement adaptée à une intégration aux protocoles de délégation d'authentification existants tels qu'OpenID Connect. Pour répondr
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Farooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.

Texto completo da fonte
Resumo:
XML (Extensible Mark-up Language) databases are an active research area. The topic of security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. Trust based access is an established technique in many fields, such as networks and distributed systems, but it has not previously been used for XML databases. In Trust Based Access Control, user privileges are calculated dynamically depending on the user’s behaviour. In this thesis, the novel idea of applying Trust Based Access Control (TBAC) for XML databases has been developed. This
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Pirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks." University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.

Texto completo da fonte
Resumo:
[Truncated abstract] An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. Due to its peculiar establishment and operational properties it is also often termed an infrastructure-less, self-organised, or spontaneous network. In order to extend the communication range of the nodes, beyond a single hop, specially configured routing protocols are used. The unique feature of these protocols is their ability to form routes in spite of a dynamic topology. For effective functioning of the network it is essential that the network nod
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!