• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2595
  • 1642
  • 1321
  • 1038
  • 381
  • 226
  • 192
  • 138
  • 110
  • 101
  • 101
  • 100
  • 55
  • 49
  • 49
  • Tagged with
  • 9690
  • 1740
  • 1150
  • 1135
  • 1074
  • 1049
  • 773
  • 661
  • 616
  • 602
  • 567
  • 526
  • 490
  • 470
  • 467
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Privacy preserving data publishing: an expected gain model with negative association immunity. / CUHK electronic theses & dissertations collection

January 2012 (has links)
隱私保護是許多應用(特別是和人們有關的)要面對的重要問題。在隱私保護數據發布之研究中,我們探討如何在個人隱私不會被侵犯之情況下發布一個包含個人資料之數據庫,而此數據庫仍包含有用的信息以供研究或其他數據分析之用。 / 本論文著重於隱私保護數據發布之隱私模型及算法。我們首先提出一個預期收益模型,以確認發布一個數據庫會否侵犯個人隱私。預期收益模型符合我們在本論文中提出的六個關於量化私人信息之公理,而第六條公理還會以社會心理學之角度考慮人為因素。而且,這模型考慮敵意信息收集人在發布數據庫之中所得到的好處。所以這模型切實反映出敵意信息收集人利用這些好處而獲得利益,而其他隱私模型並沒有考慮這點。然後,我們還提出了一個算法來生成符合預期收益模型之發布數據庫。我們亦進行了一些包含現實數據庫之實驗來表示出這算法是現實可行的。在那之後,我們提出了一個敏感值抑制算法,使發布數據庫能對負向關聯免疫,而負向關聯是前景/背景知識攻擊之一種。我們亦進行了一些實驗來表示出我們只需要抑制平均數個百份比之敏感值就可以令一個發佈數據庫對負向關聯免疫。最後,我們探討在分散環境之下之隱私保護數據發布,這代表有兩個或以上的數據庫持有人分別生成不同但有關之發布數據庫。我們提出一個在分散環境下可用的相異L多樣性的隱私模型和一個算法來生成符合此模型之發布數據庫。我們亦進行了一些實驗來表示出這算法是現實可行的。 / Privacy preserving is an important issue in many applications, especially for the applications that involve human. In privacy preserving data publishing (PPDP), we study how to publish a database, which contains data records of some individuals, so that the privacy of the individuals is preserved while the published database still contains useful information for research or data analysis. / This thesis focuses on privacy models and algorithms in PPDP. We first propose an expected gain model to define whether privacy is preserved for publishing a database. The expected gain model satisfies the six axioms in quantifying private information proposed in this thesis, where the sixth axiom considers human factors in the view of social psychology. In addition, it considers the amount of advantage gained by an adversary by exploiting the private information deduced from a published database. Hence, the model reflects the reality that the adversary uses such an advantage to earn a profit, which is not conisidered by other existing privacy models. Then, we propose an algorithm to generate published databases that satisfy the expected gain model. Experiments on real datasets are conducted to show that the proposed algorithm is feasible to real applications. After that, we propose a value suppression framework to make the published databases immune to negative association, which is a kind of background / foreground knowledge attacks. Experiments are conducted to show that negative association immunity can be achieved by suppressing only a few percent of sensitive values on average. Finally, we investigate PPDP in a non-centralized environment, in which two or more data holders generate their own different but related published databases. We propose a non-centralized distinct l-diversity requirement as the privacy model and an algorithm to generate published databases for this requirement. Experiments are conducted to show that the proposed algorithm is feasible to real applications. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Cheong, Chi Hong. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 186-193). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Thesis Contributions and Organization --- p.2 / Chapter 1.3 --- Other Related Areas --- p.5 / Chapter 1.3.1 --- Privacy Preserving Data Mining --- p.5 / Chapter 1.3.2 --- Partition-Based Approach vs. Differential Privacy Approach --- p.5 / Chapter 2 --- Expected Gain Model --- p.7 / Chapter 2.1 --- Introduction --- p.8 / Chapter 2.1.1 --- Background and Motivation --- p.8 / Chapter 2.1.2 --- Contributions --- p.11 / Chapter 2.2 --- Table Models --- p.12 / Chapter 2.2.1 --- Private Table --- p.12 / Chapter 2.2.2 --- Published Table --- p.13 / Chapter 2.3 --- Private Information Model --- p.14 / Chapter 2.3.1 --- Proposition --- p.14 / Chapter 2.3.2 --- Private Information and Private Probability --- p.15 / Chapter 2.3.3 --- Public Information and Public Probability --- p.18 / Chapter 2.3.4 --- Axioms in Quantifying Private Information --- p.20 / Chapter 2.4 --- Quantifying Private Information --- p.34 / Chapter 2.4.1 --- Expected Gain of a Fair Guessing Game --- p.34 / Chapter 2.4.2 --- Analysis --- p.41 / Chapter 2.5 --- Tuning the Importance of Opposite Information --- p.48 / Chapter 2.6 --- Conclusions --- p.53 / Chapter 3 --- Generalized Expected Gain Model --- p.56 / Chapter 3.1 --- Introduction --- p.58 / Chapter 3.2 --- Table Models --- p.60 / Chapter 3.2.1 --- Private Table --- p.62 / Chapter 3.2.2 --- Published Table --- p.62 / Chapter 3.3 --- Expected Gain Model --- p.63 / Chapter 3.3.1 --- Random Variable and Probability Distribution --- p.64 / Chapter 3.3.2 --- Public Information --- p.64 / Chapter 3.3.3 --- Private Information --- p.65 / Chapter 3.3.4 --- Expected Gain Model --- p.66 / Chapter 3.4 --- Generalization Algorithm --- p.75 / Chapter 3.4.1 --- Generalization Property and Subset Property --- p.75 / Chapter 3.4.2 --- Modified Version of Incognito --- p.78 / Chapter 3.5 --- Related Work --- p.80 / Chapter 3.5.1 --- k-Anonymity --- p.80 / Chapter 3.5.2 --- l-Diversity --- p.81 / Chapter 3.5.3 --- Confidence Bounding --- p.83 / Chapter 3.5.4 --- t-Closeness --- p.84 / Chapter 3.6 --- Experiments --- p.85 / Chapter 3.6.1 --- Experiment Set 1: Average/Max/Min Expected Gain --- p.85 / Chapter 3.6.2 --- Experiment Set 2: Expected Gain Distribution --- p.90 / Chapter 3.6.3 --- Experiment Set 3: Modified Version of Incognito --- p.95 / Chapter 3.7 --- Conclusions --- p.99 / Chapter 4 --- Negative Association Immunity --- p.100 / Chapter 4.1 --- Introduction --- p.100 / Chapter 4.2 --- Related Work --- p.104 / Chapter 4.3 --- Negative Association Immunity and Value Suppression --- p.107 / Chapter 4.3.1 --- Negative Association --- p.108 / Chapter 4.3.2 --- Negative Association Immunity --- p.111 / Chapter 4.3.3 --- Achieving Negative Association Immunity by Value Suppression --- p.114 / Chapter 4.4 --- Local Search Algorithm --- p.123 / Chapter 4.5 --- Experiments --- p.125 / Chapter 4.5.1 --- Settings --- p.125 / Chapter 4.5.2 --- Results and Discussions --- p.128 / Chapter 4.6 --- Conclusions --- p.129 / Chapter 5 --- Non-Centralized Distinct l-Diversity --- p.130 / Chapter 5.1 --- Introduction --- p.130 / Chapter 5.2 --- Related Work --- p.138 / Chapter 5.3 --- Table Models --- p.140 / Chapter 5.3.1 --- Private Tables --- p.140 / Chapter 5.3.2 --- Published Tables --- p.141 / Chapter 5.4 --- Private Information Deduced from Multiple Published Tables --- p.143 / Chapter 5.4.1 --- Private Information Deduced by Simple Counting on Each Published Tables --- p.143 / Chapter 5.4.2 --- Private Information Deduced from Multiple Published Tables --- p.145 / Chapter 5.4.3 --- Probabilistic Table --- p.156 / Chapter 5.5 --- Non-Centralized Distinct l-Diversity and Algorithm --- p.158 / Chapter 5.5.1 --- Non-centralized Distinct l-diversity --- p.159 / Chapter 5.5.2 --- Algorithm --- p.165 / Chapter 5.5.3 --- Theorems --- p.171 / Chapter 5.6 --- Experiments --- p.174 / Chapter 5.6.1 --- Settings --- p.174 / Chapter 5.6.2 --- Metrics --- p.176 / Chapter 5.6.3 --- Results and Discussions --- p.179 / Chapter 5.7 --- Conclusions --- p.181 / Chapter 6 --- Conclusions --- p.183 / Bibliography --- p.186
82

A framework to enforce privacy in business processes

Li, Yin Hua, Computer Science & Engineering, Faculty of Engineering, UNSW January 2008 (has links)
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular paradigm to develop distributed applications. Nowadays, more and more organizations shift their core business to the Web services platform within which various interactions between the autonomous services occur. One of the widely accepted standards in the Web services platform is Business Process Execution Lan- guage for Web Services (BPEL4WS, or BPEL for short). BPEL defines a language to integrate Web services by creating composite Web services in the form of business processes following the service orchestration paradigm, and it enables organizations to focus on core competence and mission-critical operations while outsource every- thing else to reduce costs and time to market. However BPEL is deficient in privacy issues. The facts are: (1) service requestors?? personal information is fundamental to enable business processes (e.g., the mortgage approval business process); (2) privacy concerns have become one of the most important issues in Information Technology and has received increasing at- tention from organizations, consumers and legislators; (3) most organizations have recognized that dealing correctly and honestly with customers?? privacy concerns can have beneficial returns for their businesses, not only in terms of being compliant with laws and regulations but also in terms of reputation and potential business op- portunities. If not addressed properly, privacy concerns may become an impediment to the widespread adoption of BPEL. Privacy issues have many aspects, the privacy concerns of potential service re- questor (i.e., client) and the privacy concerns of service provider (i.e., organization) are two of them. Service requestor specifies his/her privacy concerns as privacy preference, while service provider defines and publishes its privacy policy to specify its privacy promises. Before requestor accesses certain service, he/she likes to know whether the service provider will respect his/her privacy preference. Otherwise, the requestor may seek the desired service from somewhere else. On the other hand,even though most organizations publish their privacy promises, it will be more convincing if customers are assured that such privacy promises are actually kept within the organizations. In this thesis, we propose a privacy enforcement framework for business processes. In particular, we focus on those that are automated using BPEL. The framework consists of two parts. One focuses on the service requestors?? perspective of privacy, the other concentrates on the privacy concerns of the business process owner (i.e., the service provider). More specifically, the first part of the framework is based on description logic, and allows to represent privacy concepts and perform some rea- soning about these concepts. The reasoning engine will check requestor??s privacy preference against the service provider??s published privacy promises before the re- questor accesses the desired service. The second part of the framework facilitates the service provider to enforce its privacy policy within all its business processes throughout the life cycle of personal data. The privacy enforcement can be achieved step by step: privacy inspection, privacy verification and privacy obligation man- agement. The first step, privacy inspection, aims to identify which activity needs the involvement of what personal data. The second step, privacy verification, is to verify the correctness of designed BPEL business processes in terms of privacy. The third step is to enforce the privacy by managing the fulfillment of the obligation during the execution of business process. The privacy enforcement framework presented in the thesis has been implemented. The first part of the framework is implemented in the Privacy Match Engine prototype. For the second part of the framework, as different parts of the privacy policy need to be enforced at different stages of the life cycle of business processes, the implementation consists of a privacy verification tool and a privacy obligation management system.
83

Developmental history of European beachgrass (Ammophila arenaria (L.) Link) plantings on the Oregon coastal sand dunes /

Green, Diantha Louise. January 1965 (has links)
Thesis (M.S.)--Oregon State University, 1965. / Typescript. Includes bibliographical references (leaves 47-50). Also available on the World Wide Web.
84

Performance analysis of the MULTISAFE protection enforcement processes /

Deaver, Mason C. January 1983 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1983. / "Supported, in part, by the National Science Foundation under Grant Number MCS-7903936."--Leaf iii. Vita. Abstract. Includes bibliographical references (leaves 143-145). Also available via the Internet.
85

The characteristics of user-generated passwords /

Sawyer, Darren A. January 1990 (has links) (PDF)
Thesis (M.S. in Information Systems)--Naval Postgraduate School, March 1990. / Thesis Advisor(s): Zviran, Moshe ; Haga, William J. "March 1990." Description based on signature page as viewed on October 21, 2009. DTIC identifier(s): Access control, passwords, computer security, identification verification. Author(s) subject terms: Passwords, computer security, user-generated passwords, informaiton system security. Includes bibliographical references (p. 98-99). Also available online.
86

The effects of the in duplum rule and clause 103(5) of the National Credit Bill 2005 on interest /

Vessio, Monica L. January 2005 (has links)
Thesis, LLM--University of Pretoria, 2005. / Includes bibliographical references. Available on the Internet via the World Wide Web.
87

Développement et formulations de produits solaires conditionnés sous forme d'aérosol

Durand, Laurence 25 May 2010 (has links)
L’exposition au soleil, et donc aux rayons ultraviolets, est de plus en plus fréquente chez l’homme dans les pays occidentaux. En effet, les modes de vie ont fortement changé ces dernières années, avec pour résultat une augmentation non négligeable des loisirs en extérieur. Ceci a pour conséquence une augmentation de l’apparition des cancers cutanés, dont le pronostic de survie est souvent mauvais et l’issue fatale. De plus, les traitements associés à ces maladies sont lourds et n’agissent pas toujours de façon efficace. Les campagnes d’information et de prévention face aux dangers du soleil restent donc les principales mesures efficaces pour lutter contre le cancer cutané lié à une surexposition au soleil. La recherche de nouveaux produits permettant de protéger de manière efficace la peau des effets néfastes des rayons UV reste donc un défi permanent et primordial pour la recherche dans l’industrie cosmétique. Dans un premier temps, le travail a consisté à développer des nouvelles formulations de produits solaires contenant des concentrations élevées en filtres UV, conditionnées sous forme d’aérosol, celles-ci valables pour le marché européen. Une émulsion E/H et une émulsion E/Si ont donc été réalisées. Elles contenaient au final 27% de filtres UV pour l’émulsion E/H et 16,5% de filtres UV pour l’émulsion E/Si, dont 4% de filtres inorganiques pour les deux types d’émulsion. Leur viscosité était de 6800 mPa.s pour l’émulsion E/H et de 2800 mPa.s pour l’émulsion E/Si. Ces formulations étaient stables lorsqu’elles étaient conservées pendant 2 mois à 40°C et également lorsqu’elles subissaient 5 cycles de température entre 5°C et 40°C. La mise en aérosol de ces émulsions a nécessité l’utilisation de 22% de gaz propulseur (mélange : butane, propane, isobutane). La taille des gouttelettes étant un paramètre important de la caractérisation des aérosols pour le choix des matériaux à utiliser ainsi que pour sécurité afin d’éviter toute inhalation pulmonaire, l’influence de différents éléments sur celle-ci a été étudiée. Nous avons ainsi montré que la concentration en gaz, la viscosité, la présence ou non de filtres inorganiques ainsi que le choix des valves et diffuseurs utilisés jouent un rôle dans la taille des gouttelettes émises, celle-ci ne pouvant pas être inférieure à 30 µm de diamètre. La taille des gouttelettes émises était supérieure à 50 µm avec pas plus de 0.1% ayant une taille inférieure à 10 µm et maximum 25% des gouttelettes ayant une taille comprise entre 10 et 30 µm. Les produits formulés contenaient de grandes quantités en filtres solaires, organiques et inorganiques (27% pour l’émulsion E/H et 16,6% pour l’émulsion E/Si), il était donc important de vérifier qu’aucun des filtres présents dans les émulsions ne passaient à travers la peau lors de l’application des produits solaires. En effet, ceux-ci doivent rester à la surface de l’épiderme afin de maintenir l’efficacité des produits solaires et d’éviter des effets néfastes systémiques éventuels en pénétrant la peau. Une étude in vitro utilisant de la peau humaine excisée et des cellules de diffusion de Franz nous a permis de constater que les filtres inorganiques présents dans les formulations restaient en surface de la peau, et seulement deux des filtres organiques (l’EMC et MBBT) présentaient un potentiel de pénétration cutanée négligeable et non nocif pour la santé humaine (maximum 1,21 µg/ml/cm2 pour EMC et maximum 0,14 µg/ml/cm2 pour MBBT). De plus, après 24 h d’expérience, plus de 50% des filtres restaient à la surface de la peau, ce qui permettait de maintenir l’efficacité des produits solaires. Afin de mener à bien cette étude, des méthodes analytiques pour l’analyse simultanée des filtres solaires organiques d’une part, par CLHP (Chromatographie Liquide Haute Performance), et inorganiques d’autre part, par ICP-OES (Inductively Coupled Plasma - Optical Emission Spectrometry), ont été mises au point et validées. Une étude in vivo non invasive, basée sur le prélèvement des couches successives du stratum corneum, a été réalisée par la suite. Cette dernière a été effectuée par la méthode du « tape stripping », qui utilise des disques adhésifs rigides, et sur 9 volontaires pendant une période de 8 h. Elle a permis de confirmer les résultats obtenus avec la méthode in vitro. Une bonne corrélation entre ces deux types d’étude a été observée. Enfin, la dernière partie du travail a porté sur l’EMC, un des filtres organiques utilisé dans la plupart des produits solaires mis sur le marché et dans les émulsions E/H et E/Si formulées. Ce filtre présente une sensibilité à la lumière et aux rayons UV. L’encapsulation lipidique de celui-ci a donc été envisagée afin de produire des nanoparticules dont la matrice lipidique a pour but de protéger l’EMC contre une dégradation causée par les rayons UV. Trois lipides différents ont été investigués et ont montré des résultats positifs de protection vis-à-vis des rayonnements UV. En effet, après 2 h d’irradiation par les UV, une perte d’efficacité de 30% de l’EMC pur a été observée contre 10% à 21% pour l’EMC encapsulé par les différents lipides. De plus, les nanoparticules n’ont pas montré de potentiel d’augmentation de pénétration cutanée de l’EMC.
88

A Spatial Analysis of the Impact of Development on Wetland Habitat in Mount Pleasant, South Carolina

Medlin, Jenna 01 April 2004 (has links)
In response to growing concerns over wetland habitat loss and the associated impact on water resources, federal and state legislation has been enacted to protect vulnerable wetland habitats from the impacts of humans. In order to examine the efficacy of current coastal resource policy and its implementation, a study was conducted in Mount Pleasant, South Carolina, a coastal city of the Atlantic, focusing on the quantification of wetland habitat change over time within a specific area of interest. The study incorporated an assessment of the effects of escalating population pressures and subsequent urban development on local wetland habitats due to the inherent threat of habitat degradation resulting from negligent development practices. The research methodology included a series of stakeholder interviews conducted within the Mount Pleasant community in order to define the key players who shape coastal resource policy formation, implementation, and enforcement. Further, a spatial analysis examined land use change over time. A historical record of regional land use derived from remotely sensed satellite imagery enabled the measurement of land use change over time. The results of a change detection analysis indicate an acceleration of wetland habitat loss in the second decade chosen for analysis in spite of strengthened coastal resource regulations enacted within the same time period. These results support a need for improved regulatory enforcement strategies and utilization of conservation-driven development practices.
89

Water Quality Assessment in Cypress Creek Nature Preserve

Flora, Jason 01 May 2003 (has links)
Swamps are unique ecological communities that provide many valuable ecosystem services. In Kentucky, however, many swamps were altered by cypress removal and land development in their watersheds. Cypress Creek Swamp, which lies near Paducah in western Kentucky, is a good example of a swamp whose ecological integrity may be threatened by past and current nearby land use practices. This study was conducted to assess the water quality and macro- and microinvertebrate communities in the swamp. Three sites were monitored for temperature, dissolved oxygen, pH, specific conductivity, depth, phosphorus measured as orthophosphate, nitrite (NO2") and nitrate (NO3", NOx collectively), and ammonia nitrogen (NH3). The temperature, dissolved oxygen, NH3 and NOx concentrations changed with the growing season, but pH demonstrated little variability among the sites. The specific conductivity and phosphorus levels were highly variable. Principal component analysis (PCA) indicated no significant difference in microinvertebrate taxa identified among locations or through time. A oneway analysis of variance (ANOVA) indicated no significant difference in macroinvertebrate population total densities between locations (P = 0.847), and a oneway analysis of variance (ANOVA) showed no significant difference in microinvertebrate population total densities among locations (P = 0.153) or through time (P = 0.294). As development continues in the watershed, this work provides an important baseline for future water quality monitoring in the preserve.
90

The Progression of Recycling in Bowling Green, Kentucky

Marklin, Susan 01 December 2001 (has links)
Recycling is an important issue when dealing with solid waste. It keeps many tons of garbage out of our landfills and prolongs landfill life. Although many people in the Bowling Green area participate in the mandatory recycling program, there are still many who do not. The number of people who participate in the program has steadily grown over the past five years; however, there are still many people who need to get involved. This research argues that much effort has been put into recycling in recent years at the global, national, and local level. However, it also argues that even more remains to be done, especially at the local level. I have conducted a sixty-day field study of both commercial and residential sites in the Bowling Green area. This field study shows that everyday there are many recyclables as well as other items placed into the trash that need not go into our garbage. This field study will also show that there are some very wasteful industries in Bowling Green. They are throwing food items away that could be used to help hungry people in the Bowling Green vicinity. It will also show that some industries, such as Houchens Markets, throw recyclables such as cardboard into their dumpster even though they have a cardboard bailer on the premises. This research will also offer reasons for people choosing not to use the recycling program. I have conducted a survey of one hundred people who live in the Bowling Green area. This survey shows that one reason some people do not use the recycling program is that they feel they are forced to do it. A few people went so far as to say that they feel the recycling program is a form of communism, and they will not use the program for that reason. I have also included entire matrices from both the residential and commercial study areas. These matrices list every item that I found during this field study. I have also included some recommendations for increased participation in the recycling program, as well as some suggestions for the industries as to how they could dispose of their unwanted food items and help the general public at the same time. I wish people could see the Earth the way that I see it. If they could, they wouldn't even think about recycling: it would become a part of their everyday routine.

Page generated in 0.0603 seconds