• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 163
  • 31
  • 17
  • 17
  • 12
  • 11
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 317
  • 127
  • 54
  • 47
  • 43
  • 38
  • 36
  • 34
  • 34
  • 33
  • 32
  • 31
  • 26
  • 26
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Denial of service : prevention, modelling and detection

Smith, Jason January 2007 (has links)
This research investigates the denial of service problem, in the context of services provided over a network, and contributes to improved techniques for modelling, detecting, and preventing denial of service attacks against these services. While the majority of currently employed denial of service attacks aim to pre-emptively consume the network bandwidth of victims, a significant amount of research effort is already being directed at this problem. This research is instead concerned with addressing the inevitable migration of denial of service attacks up the protocol stack to the application layer. Of particular interest is the denial of service resistance of key establishment protocols (security protocols that enable an initiator and responder to mutually authenticate and establish cryptographic keys for establishing a secure communications channel), which owing to the computationally intensive activities they perform, are particularly vulnerable to attack. Given the preponderance of wireless networking technologies this research hasalso investigated denial of service and its detection in IEEE 802.11 standards based networks. Specific outcomes of this research include: - investigation of the modelling and application of techniques to improve the denial of service resistance of key establishment protocols; - a proposal for enhancements to an existing modelling framework to accommodate coordinated attackers; - design of a new denial of service resistant key establishment protocol for securing signalling messages in next generation, mobile IPv6 networks; - a comprehensive survey of denial of service attacks in IEEE 802.11 wireless networks; discovery of a significant denial of service vulnerability in the clear channel assessment procedure implemented by the medium access control layer of IEEE 802.11 compliant devices; and - design of a novel, specification-based intrusion detection system for detecting denial of service attacks in IEEE 802.11 wireless networks.
222

Chased by the dragon the experience of relapse in cocaine and heroin users /

Bain, Katherine Alison. January 2004 (has links)
Thesis (MA(Clinical Psychology))--University of Pretoria, 2004. / Includes bibliographical references.
223

A humanities approach to the study of the Holocaust a curriculum for grades 7-12 /

Witt, Joyce Arlene. McBride, Lawrence W., January 2000 (has links)
Thesis (D.A.)--Illinois State University, 2000. / Title from title page screen, viewed May 2, 2006. Dissertation Committee: Lawrence McBride (chair), Donald E. Davis, Niles Holt, Alvin Goldfarb. Includes bibliographical references (leaves 291-296) and abstract. Also available in print.
224

Trust-based application grouping for cloud datacenters : improving security in shared infrastructures / Agrupamento de aplicações baseado em relações de confiança para datacenters de nuvens : aumentando a segurança em infraestruturas compartilhadas

Marcon, Daniel Stefani January 2013 (has links)
A computação em nuvem é um paradigma que tem atraído uma grande quantidade de clientes por meio do oferecimento de recursos computacionais através de um modelo de pagamento pelo uso. Entretanto, o compartilhamento da rede interna da nuvem por todos os locatários possibilita que usuários utilizem de forma egoísta ou maliciosa os recursos da rede, ocasionando ataques contra a privacidade e a integridade dos dados e a disponibilidade dos recursos. Os algoritmos de alocação atuais não impedem que a disponibilidade dos recursos de rede seja afetada por ataques ou resultam em subutilização de recursos. Nessa dissertação, é proposta uma estratégia para a alocação de recursos que aumenta a segurança no compartilhamento da rede da nuvem entre as aplicações de locatários. Esse objetivo é alcançado por meio do agrupamento de aplicações provenientes de usuários mutuamente confiáveis em domínios logicamente isolados, compostos por um conjunto de máquinas virtuais interconectadas por uma rede virtual (infraestruturas virtuais – VIs), além de considerar-se a quantidade de tráfego gerada pela comunicação entre VMs da mesma aplicação. Devido à complexidade do problema de alocação de recursos em nuvens computacionais, a estratégia é decomposta em duas etapas. Na primeira, dado um conjunto pre-estabelecido de VIs, alocam-se as mesmas no substrato físico, enquanto a segunda distribui e mapeia as aplicações no conjunto de infraestruturas virtuais. O uso de VIs provê um maior nível de isolamento entre locatários e, consequentemente, maior segurança. Contudo, o agrupamento pode resultar em fragmentação e afetar negativamente o grau de utilização dos recursos. Dessa forma, estuda-se esse compromisso e a factibilidade da abordagem proposta. Os resultados mostram os benefícios da estratégia de alocação proposta, que oferece maior proteção aos recursos de rede com baixo custo extra. Em particular, a segurança aumenta logaritmicamente de acordo com o número de VIs, enquanto a fragmentação de recursos cresce linearmente de acordo com o aumento do número de VIs oferecidas pelo provedor. / Cloud computing can offer virtually unlimited resources without any upfront capital investment through a pay-per-use pricing model. However, the shared nature of multi-tenant cloud datacenter networks enables unfair or malicious use of the intra-cloud network by tenants, allowing attacks against the privacy and integrity of data and the availability of resources. Recent research has proposed resource allocation algorithms that cannot protect tenants against attacks in the network or result in underutilization of resources. In this thesis, we introduce a resource allocation strategy that increases the security of network resource sharing among tenant applications. This is achieved by grouping applications from mutually trusting users into logically isolated domains composed of a set of virtual machines as well as the virtual network interconnecting them (virtual infrastructures - VIs), while considering the amount of traffic generated by the communication between VMs from the same application. Due to the hardness of the cloud resource allocation problem, we decompose the strategy in two steps. The first one allocates a given set of VIs onto the physical substrate, while the second distributes and maps applications into the set of virtual infrastructures. The use of VIs provides some level of isolation and higher security. However, groups may lead to fragmentation and negatively affect resource utilization. Therefore, we study the associated trade-off and feasibility of the proposed approach. Evaluation results show the benefits of our strategy, which is able to offer better network resource protection against attacks with low additional cost. In particular, the security can be logarithmically increased according to the number of VIs, while internal resource fragmentation linearly grows as the number of VIs offered by the provider increases.
225

The alcoholic family : pastoral conversations with adult children unravelling the web of identity

Botha, Dawn Eileen 30 November 2005 (has links)
This participatory research journey looked at the lives of adult children of alcoholics, with particular reference to how identity is affected by growing up in a home where one or both parents are struggling with alcohol abuse, and how this struggle with identity carries through into adulthood. A study was made of the particular discourses which impacted negatively upon the child from this home and the manner in which the discourses had a negative impact later on as an adult. Through narrative pastoral conversations the possibilities for healing, as well as the barriers for healing were explored. Through this exploration alternative stories were created. A vital part of the study was focused upon the witnessing of the stories of the participants` lives and the acknowledgement of some of the events from their childhood that formed their identity and contributed to who they are today. / Philosophy, Practical and Systematic Theology / M.Th. (Practical Theology)
226

Perversão e filiação : o desejo do analista em questão / Perversion et filiation : le désir de l'analyste en jeu / Perversion and filiation : the desire of the analyst in question

Rosa Júnior, Norton Cezar Dal Follo da January 2013 (has links)
Cette recherche porte sur le thème de la perversion dans ses relations avec la filiation et le désir de l’analyste. Son importance se justifie du regard de la clinique et de sa pertinence sociale. Mais, il s’agit aussi d’une question d’ordre éthique, une fois que le domaine des perversions, fréquemment, se trouve imprégné de moralisme, des préjugés et d’idéaux de bonne forme. Les positionnements ne sont pas rares dans le milieu psi que les pervers ne cherchent pas l’analyse, étant donné qu’ils ne souffrent pas, qu’ils ne font que jouir par la souffrance de leurs victimes. Celle-ci n’est pas notre position. Au contraire, à partir du désir de l’analyste et de l’éthique qui fonde sa práxis, nous soutiendrons la thèse qu’il est possible qu’une clinique psychanalytique s’opère avec la perversion. Notre investigation est basée dans l’oeuvre de Sigmund Freud et l’enseignement de Jacques Lacan, suivie d’auteurs contemporains. Face à la complexité de cette thématique, nous avons pris la compagnie de cinq ouvrages: La philosophie dans le boudoir, écrite par le Marquis de Sade (1795), À la recherche du temps perdu, de Marcel Proust (1913), Lavoura arcaica, de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), et Le balcon, de Jean Genet (1955). Notre proposition dans l’articulation de la psychanalyse et la littérature cherche à accueillir ce que les textes permettent d’accéder aux différents registres de la perversion dans la structure du sujet. A partir de ces références nous allons soutenir que l’impératif de jouissance du pervers impliquera dans le refus à la filiation. Ceci soulèvera des difficultés dans ses conditions d’aimer, de reconnaître la dette envers l’autre et de tolérer la différence. Cependant, Freud et Lacan, en reconnaissant l’aspect constituant de la perversion, ont inauguré les possibilités d’écoute de cette particulière position subjective par rapport à la castration. Donc, si d’une part Freud a montré la logique fétichiste de reconnaître et de refuser, à la fois, le manque du corps maternel; d’autre part, Lacan a observé le refus pervers à la place destinée au père dans le discours du sujet. Celles-ci seront des questions centrales dans le drame pervers, surtout, quand le père n’achemine pas le désir en tant qu’insigne du manque, et la mère prend l’enfant comme objet de jouissance. A partir de cela, à travers des notes cliniques nous fondamentorons la discussion dans trois aspects: les difficultés en établir un diagnostique de perversion; le maniement d’un transfert qui se maintient dans le défis constant à la place du psychanaliste; et les voies de direction du traitement. Ceci nous fait comprendre que pour que cette pratique se fasse, il est essentiel de reconnaître la souffrance, condition nécessaire pour déclencher le désir de l’analyste de réaliser la lecture d’un scénario marqué par un modèle strict et répétitif de récompense sexuelle. Dans ce sens, il sera à partir des effets réunis dans son analyse que le psychanalyste pourra affronter l’angoisse, le mépris, et la fascination implicite dans le transfert pervers. Donc, en “faisant face à la situation”, il ira établir les différences de places, en rendant possible au sujet, le droit à la parole, en viabilisant ainsi, la chute des images et mises en scène qui saisissent ses modalités de jouissance. / Essa pesquisa aborda o tema da perversão em suas relações com a filiação e o desejo do analista. Sua relevância se justifica do ponto de vista da clínica e de sua pertinência social. Mas, além disso, trata-se de uma questão de ordem ética, pois o campo das perversões, frequentemente, se encontra impregnado de moralismos, preconceitos e ideais de boa forma. Não são raros os posicionamentos no meio psi de que perversos não buscam análise, pois não sofrem, apenas gozam em função dos sofrimentos infligidos às suas vítimas. Esta, não é a nossa posição. Pelo contrário, a partir do desejo do analista e da ética que fundamenta sua práxis, sustentaremos a tese de que é possível uma clínica psicanalítica se operar com a perversão. Essa investigação é embasada na obra de Sigmund Freud e no ensino de Jacques Lacan, seguida de autores contemporâneos. Diante da complexidade da temática em questão, tomamos em companhia cinco obras: A filosofia na alcova, escrita pelo Marquês de Sade (1795), Em busca do tempo perdido, de Marcel Proust (1913), Lavoura arcaica, de autoria de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), e O balcão, de Jean Genet (1955). Nossa proposta na articulação entre psicanálise e literatura visa a acolher aquilo que esses textos permitem aceder a diferentes registros da perversão na estrutura do sujeito. A partir dessas referências vamos sustentar que o imperativo de gozo do perverso implicará a recusa à filiação. Isto situará impasses em suas condições de amar, de reconhecer dívida com o outro e de suportar a diferença. Entretanto, Freud e Lacan, ao reconhecerem o aspecto constituinte da perversão, inauguraram as possibilidades de escuta dessa singular posição subjetiva em relação à castração. Então, se de um lado Freud apontou a lógica fetichista de reconhecer e recusar, simultaneamente, a falta no corpo materno; de outro, Lacan observou a recusa perversa ao lugar atribuído ao pai no discurso do sujeito. Estas serão questões centrais no drama perverso, sobretudo, quando o pai não vetoriza o desejo enquanto insígnia da falta, e a mãe toma o filho enquanto objeto de gozo. Diante disso, através de recortes clínicos, fundamentaremos a discussão em três aspectos: as dificuldades de se estabelecer um diagnóstico de perversão, o manejo de uma transferência que se mantém no constante desafio ao lugar do psicanalista e as vias de direção do tratamento. Isto nos fez compreender que para essa prática se dar, faz-se imprescindível reconhecer o sofrimento, condição necessária para acionar o desejo do analista de realizar a leitura de um enredo marcado por um padrão fixo, rígido e repetitivo de gratificação sexual. Nesse sentido, será a partir dos efeitos colhidos em sua análise que o psicanalista poderá lidar com a angústia, o repúdio, e o fascínio implícito na transferência perversa. Portanto, ao “fazer face à situação”, ele irá situar diferenças de lugares, possibilitando ao sujeito, o direito à palavra, viabilizando assim, a queda das imagens e atuações que capturam suas modalidades de gozo. / This research addresses the issue of perversion and its associations with filiation and the desire of the analyst. It is a relevant study from the perspective of clinical practice and also in the realm of society. In addition, such issue is an ethical one, because the field of perversions is often infused with moral judgement, prejudice and ideals of good morals. Not infrequently, an assumption among psychoanalysts is that perverse people do not seek pshycoanalysis because they do not suffer, but rather, only take pleasure in the pain they inflict upon their victims. This is not our point of view. On the contrary, based on the desire of the analyst and the ethical principles underpinning his praxis, we will discuss the premise that psychoanalytic clinical practice can actually be applied to perversion. Our research is grounded in the work of Sigmund Freud and the teachings of Jacques Lacan, followed by contemporary authors. Given the complexity of the subject in question, we draw on five particular works and their respective authors: Philosophy in the Bedroom, written by the Marquis de Sade (1795); In Search of Lost Time, by Marcel Proust (1913); Ancient Tillage, written by Raduan Nassar (1979) Finnegans Wake, by James Joyce (1939); and The Balcony, by Jean Genet (1955). By combining psychoanalysis and literature, we seek to embrace the contributions that such works can give towards clarifying the notion of perversion within the structure of the subject. Based on these references, we argue that denial of filiation is a prerequisite for the enjoyment of perversion. This will hinder the perverse patient’s ability to love, to recognize his debt to others and to tolerate differences. However, when Freud and Lacan recognized the constituent of perversion, they enabled this unique subjective perspective on castration to be attended to. So while Freud pointed out the fetishistic logic of recognizing and denying, at once, the lack of a penis in the mother’s body, Lacan observed the perverse denial of the place given to the father in the discourse of the subject. These are central issues in the perverse drama, especially when the father does not express desire as a sign of such lack, and the mother takes the child as an object of enjoyment. Thus, by means clinical observations, our discussion will focus on three aspects: the difficult task of giving a diagnosis of perversion, coping with transference that remains a constant challenge to the position of the psychoanalyst, and options for the direction of treatment. This enabled our understanding that, for this practice to take place, it is imperative to recognize pain, a necessary condition to trigger the desire of the analyst to interpret a scenario marked by a fixed, rigid and repetitive pattern of sexual gratification. In this sense, the analyst will use the results obtained from that analysis to deal with pain, rejection, and the implicit fascination with perverse transference. Therefore, when "dealing with the situation," the analyst will identify differences in locations, giving the subject the right to speech, thus enabling the eradication of images and acts that illustrate the patient’s modes of enjoyment.
227

Bristande tillgänglighet som en form av diskriminering : Har lagändringen i diskrimineringslagen gjort någon skillnad sedan 2015?

Gradwohl, Csilla January 2018 (has links)
Den här uppsatsen utforskar de nya reglerna om bristande tillgänglighet som blev en form av diskriminering i den svenska diskrimineringslagen 2015. Studien undersöker den praktiska erfarenheten av att tillämpa de nya reglerna, genom att analysera avgöranden i svenska domstolar. Uppsatsen söker svar på huruvida diskrimineringslagens regler om bristande tillgänglighet kan uppfylla de krav i praktiken som ställs om tillgänglighet i FN:s konvention om rättigheter för personer med funktionsnedsättning (CRPD). Uppsatsen tillämpar den rättsdogmatiska metoden och den rättsanalytiska metoden. Materialen för analysen består av diskrimineringslagen och dess förarbeten, CRPD, domar gällande bristande tillgänglighet och juridisk doktrin. Analysen av rättstillämpningen sker utifrån ett funktionshinderperspektiv som ger uppsatsen sitt teoretiska ramverk. Uppsatsen hävdar att diskrimineringslagens regler om bristande tillgänglighet är otillräckliga för att öka tillgängligheten i samhället för att personer med funktionsnedsättning ska kunna vara delaktiga på lika villkor som andra. Enligt uppsatsens förslag bör det övervägas huruvida diskrimineringslagens förbud mot diskriminering i form av bristande tillgänglighet ska utvidgas till alla samhällsområden; vidare behövs det att domstolarna tillämpar den fördragskonforma tolkningen konsekvent eller att CRPD inkorporeras för att de krav som ställs i konventionen om tillgänglighet ska få större genomslag i det svenska rättssystemet. / The present thesis explores the rules concerning denial of reasonable accommodation that became a new form of discrimination in the Swedish Discrimination Act in 2015. The thesis examines the practical experiences of applying the new rules, by analyzing judgments of Swedish courts. The thesis seeks to answer whether the new rules concerning denial of reasonable accommodation can meet the requirements for accessibility set in the UN Convention on the Rights of Persons with Disabilities (CRPD). The thesis is carried out by employing both the legal dogmatic method and the legal analytical method. The thesis is based on the Swedish Discrimination Act, the CRPD, judgements regarding denial of reasonable accommodation as well as legal doctrine. The analysis of the judgements is based on a disability perspective that provides a theoretical framework for this thesis. It is argued that the rules concerning denial of reasonable accommodation in the Swedish Discrimination Act are insufficient to increase accessibility for persons with disabilities to be able to participate in society on equal terms with others. This thesis argues that the prohibition of discrimination in the form of denial of reasonable accommodation should be extended to all areas of society. Furthermore, it is argued that the courts shall apply the treaty-based interpretation consistently, alternatively the CRPD shall be incorporated in order to better ensure that the requirements on accessibility set in the CRPD are met by the Swedish legal system.
228

Trust-based application grouping for cloud datacenters : improving security in shared infrastructures / Agrupamento de aplicações baseado em relações de confiança para datacenters de nuvens : aumentando a segurança em infraestruturas compartilhadas

Marcon, Daniel Stefani January 2013 (has links)
A computação em nuvem é um paradigma que tem atraído uma grande quantidade de clientes por meio do oferecimento de recursos computacionais através de um modelo de pagamento pelo uso. Entretanto, o compartilhamento da rede interna da nuvem por todos os locatários possibilita que usuários utilizem de forma egoísta ou maliciosa os recursos da rede, ocasionando ataques contra a privacidade e a integridade dos dados e a disponibilidade dos recursos. Os algoritmos de alocação atuais não impedem que a disponibilidade dos recursos de rede seja afetada por ataques ou resultam em subutilização de recursos. Nessa dissertação, é proposta uma estratégia para a alocação de recursos que aumenta a segurança no compartilhamento da rede da nuvem entre as aplicações de locatários. Esse objetivo é alcançado por meio do agrupamento de aplicações provenientes de usuários mutuamente confiáveis em domínios logicamente isolados, compostos por um conjunto de máquinas virtuais interconectadas por uma rede virtual (infraestruturas virtuais – VIs), além de considerar-se a quantidade de tráfego gerada pela comunicação entre VMs da mesma aplicação. Devido à complexidade do problema de alocação de recursos em nuvens computacionais, a estratégia é decomposta em duas etapas. Na primeira, dado um conjunto pre-estabelecido de VIs, alocam-se as mesmas no substrato físico, enquanto a segunda distribui e mapeia as aplicações no conjunto de infraestruturas virtuais. O uso de VIs provê um maior nível de isolamento entre locatários e, consequentemente, maior segurança. Contudo, o agrupamento pode resultar em fragmentação e afetar negativamente o grau de utilização dos recursos. Dessa forma, estuda-se esse compromisso e a factibilidade da abordagem proposta. Os resultados mostram os benefícios da estratégia de alocação proposta, que oferece maior proteção aos recursos de rede com baixo custo extra. Em particular, a segurança aumenta logaritmicamente de acordo com o número de VIs, enquanto a fragmentação de recursos cresce linearmente de acordo com o aumento do número de VIs oferecidas pelo provedor. / Cloud computing can offer virtually unlimited resources without any upfront capital investment through a pay-per-use pricing model. However, the shared nature of multi-tenant cloud datacenter networks enables unfair or malicious use of the intra-cloud network by tenants, allowing attacks against the privacy and integrity of data and the availability of resources. Recent research has proposed resource allocation algorithms that cannot protect tenants against attacks in the network or result in underutilization of resources. In this thesis, we introduce a resource allocation strategy that increases the security of network resource sharing among tenant applications. This is achieved by grouping applications from mutually trusting users into logically isolated domains composed of a set of virtual machines as well as the virtual network interconnecting them (virtual infrastructures - VIs), while considering the amount of traffic generated by the communication between VMs from the same application. Due to the hardness of the cloud resource allocation problem, we decompose the strategy in two steps. The first one allocates a given set of VIs onto the physical substrate, while the second distributes and maps applications into the set of virtual infrastructures. The use of VIs provides some level of isolation and higher security. However, groups may lead to fragmentation and negatively affect resource utilization. Therefore, we study the associated trade-off and feasibility of the proposed approach. Evaluation results show the benefits of our strategy, which is able to offer better network resource protection against attacks with low additional cost. In particular, the security can be logarithmically increased according to the number of VIs, while internal resource fragmentation linearly grows as the number of VIs offered by the provider increases.
229

Perversão e filiação : o desejo do analista em questão / Perversion et filiation : le désir de l'analyste en jeu / Perversion and filiation : the desire of the analyst in question

Rosa Júnior, Norton Cezar Dal Follo da January 2013 (has links)
Cette recherche porte sur le thème de la perversion dans ses relations avec la filiation et le désir de l’analyste. Son importance se justifie du regard de la clinique et de sa pertinence sociale. Mais, il s’agit aussi d’une question d’ordre éthique, une fois que le domaine des perversions, fréquemment, se trouve imprégné de moralisme, des préjugés et d’idéaux de bonne forme. Les positionnements ne sont pas rares dans le milieu psi que les pervers ne cherchent pas l’analyse, étant donné qu’ils ne souffrent pas, qu’ils ne font que jouir par la souffrance de leurs victimes. Celle-ci n’est pas notre position. Au contraire, à partir du désir de l’analyste et de l’éthique qui fonde sa práxis, nous soutiendrons la thèse qu’il est possible qu’une clinique psychanalytique s’opère avec la perversion. Notre investigation est basée dans l’oeuvre de Sigmund Freud et l’enseignement de Jacques Lacan, suivie d’auteurs contemporains. Face à la complexité de cette thématique, nous avons pris la compagnie de cinq ouvrages: La philosophie dans le boudoir, écrite par le Marquis de Sade (1795), À la recherche du temps perdu, de Marcel Proust (1913), Lavoura arcaica, de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), et Le balcon, de Jean Genet (1955). Notre proposition dans l’articulation de la psychanalyse et la littérature cherche à accueillir ce que les textes permettent d’accéder aux différents registres de la perversion dans la structure du sujet. A partir de ces références nous allons soutenir que l’impératif de jouissance du pervers impliquera dans le refus à la filiation. Ceci soulèvera des difficultés dans ses conditions d’aimer, de reconnaître la dette envers l’autre et de tolérer la différence. Cependant, Freud et Lacan, en reconnaissant l’aspect constituant de la perversion, ont inauguré les possibilités d’écoute de cette particulière position subjective par rapport à la castration. Donc, si d’une part Freud a montré la logique fétichiste de reconnaître et de refuser, à la fois, le manque du corps maternel; d’autre part, Lacan a observé le refus pervers à la place destinée au père dans le discours du sujet. Celles-ci seront des questions centrales dans le drame pervers, surtout, quand le père n’achemine pas le désir en tant qu’insigne du manque, et la mère prend l’enfant comme objet de jouissance. A partir de cela, à travers des notes cliniques nous fondamentorons la discussion dans trois aspects: les difficultés en établir un diagnostique de perversion; le maniement d’un transfert qui se maintient dans le défis constant à la place du psychanaliste; et les voies de direction du traitement. Ceci nous fait comprendre que pour que cette pratique se fasse, il est essentiel de reconnaître la souffrance, condition nécessaire pour déclencher le désir de l’analyste de réaliser la lecture d’un scénario marqué par un modèle strict et répétitif de récompense sexuelle. Dans ce sens, il sera à partir des effets réunis dans son analyse que le psychanalyste pourra affronter l’angoisse, le mépris, et la fascination implicite dans le transfert pervers. Donc, en “faisant face à la situation”, il ira établir les différences de places, en rendant possible au sujet, le droit à la parole, en viabilisant ainsi, la chute des images et mises en scène qui saisissent ses modalités de jouissance. / Essa pesquisa aborda o tema da perversão em suas relações com a filiação e o desejo do analista. Sua relevância se justifica do ponto de vista da clínica e de sua pertinência social. Mas, além disso, trata-se de uma questão de ordem ética, pois o campo das perversões, frequentemente, se encontra impregnado de moralismos, preconceitos e ideais de boa forma. Não são raros os posicionamentos no meio psi de que perversos não buscam análise, pois não sofrem, apenas gozam em função dos sofrimentos infligidos às suas vítimas. Esta, não é a nossa posição. Pelo contrário, a partir do desejo do analista e da ética que fundamenta sua práxis, sustentaremos a tese de que é possível uma clínica psicanalítica se operar com a perversão. Essa investigação é embasada na obra de Sigmund Freud e no ensino de Jacques Lacan, seguida de autores contemporâneos. Diante da complexidade da temática em questão, tomamos em companhia cinco obras: A filosofia na alcova, escrita pelo Marquês de Sade (1795), Em busca do tempo perdido, de Marcel Proust (1913), Lavoura arcaica, de autoria de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), e O balcão, de Jean Genet (1955). Nossa proposta na articulação entre psicanálise e literatura visa a acolher aquilo que esses textos permitem aceder a diferentes registros da perversão na estrutura do sujeito. A partir dessas referências vamos sustentar que o imperativo de gozo do perverso implicará a recusa à filiação. Isto situará impasses em suas condições de amar, de reconhecer dívida com o outro e de suportar a diferença. Entretanto, Freud e Lacan, ao reconhecerem o aspecto constituinte da perversão, inauguraram as possibilidades de escuta dessa singular posição subjetiva em relação à castração. Então, se de um lado Freud apontou a lógica fetichista de reconhecer e recusar, simultaneamente, a falta no corpo materno; de outro, Lacan observou a recusa perversa ao lugar atribuído ao pai no discurso do sujeito. Estas serão questões centrais no drama perverso, sobretudo, quando o pai não vetoriza o desejo enquanto insígnia da falta, e a mãe toma o filho enquanto objeto de gozo. Diante disso, através de recortes clínicos, fundamentaremos a discussão em três aspectos: as dificuldades de se estabelecer um diagnóstico de perversão, o manejo de uma transferência que se mantém no constante desafio ao lugar do psicanalista e as vias de direção do tratamento. Isto nos fez compreender que para essa prática se dar, faz-se imprescindível reconhecer o sofrimento, condição necessária para acionar o desejo do analista de realizar a leitura de um enredo marcado por um padrão fixo, rígido e repetitivo de gratificação sexual. Nesse sentido, será a partir dos efeitos colhidos em sua análise que o psicanalista poderá lidar com a angústia, o repúdio, e o fascínio implícito na transferência perversa. Portanto, ao “fazer face à situação”, ele irá situar diferenças de lugares, possibilitando ao sujeito, o direito à palavra, viabilizando assim, a queda das imagens e atuações que capturam suas modalidades de gozo. / This research addresses the issue of perversion and its associations with filiation and the desire of the analyst. It is a relevant study from the perspective of clinical practice and also in the realm of society. In addition, such issue is an ethical one, because the field of perversions is often infused with moral judgement, prejudice and ideals of good morals. Not infrequently, an assumption among psychoanalysts is that perverse people do not seek pshycoanalysis because they do not suffer, but rather, only take pleasure in the pain they inflict upon their victims. This is not our point of view. On the contrary, based on the desire of the analyst and the ethical principles underpinning his praxis, we will discuss the premise that psychoanalytic clinical practice can actually be applied to perversion. Our research is grounded in the work of Sigmund Freud and the teachings of Jacques Lacan, followed by contemporary authors. Given the complexity of the subject in question, we draw on five particular works and their respective authors: Philosophy in the Bedroom, written by the Marquis de Sade (1795); In Search of Lost Time, by Marcel Proust (1913); Ancient Tillage, written by Raduan Nassar (1979) Finnegans Wake, by James Joyce (1939); and The Balcony, by Jean Genet (1955). By combining psychoanalysis and literature, we seek to embrace the contributions that such works can give towards clarifying the notion of perversion within the structure of the subject. Based on these references, we argue that denial of filiation is a prerequisite for the enjoyment of perversion. This will hinder the perverse patient’s ability to love, to recognize his debt to others and to tolerate differences. However, when Freud and Lacan recognized the constituent of perversion, they enabled this unique subjective perspective on castration to be attended to. So while Freud pointed out the fetishistic logic of recognizing and denying, at once, the lack of a penis in the mother’s body, Lacan observed the perverse denial of the place given to the father in the discourse of the subject. These are central issues in the perverse drama, especially when the father does not express desire as a sign of such lack, and the mother takes the child as an object of enjoyment. Thus, by means clinical observations, our discussion will focus on three aspects: the difficult task of giving a diagnosis of perversion, coping with transference that remains a constant challenge to the position of the psychoanalyst, and options for the direction of treatment. This enabled our understanding that, for this practice to take place, it is imperative to recognize pain, a necessary condition to trigger the desire of the analyst to interpret a scenario marked by a fixed, rigid and repetitive pattern of sexual gratification. In this sense, the analyst will use the results obtained from that analysis to deal with pain, rejection, and the implicit fascination with perverse transference. Therefore, when "dealing with the situation," the analyst will identify differences in locations, giving the subject the right to speech, thus enabling the eradication of images and acts that illustrate the patient’s modes of enjoyment.
230

Modèles et mécanismes pour la protection contre les attaques par déni de service dans les réseaux de capteurs sans fil / Mechanisms and modeling tools for protection against denial of service attacks in wireless sensor networks

Monnet, Quentin 17 July 2015 (has links)
Composés d'appareils fortement limités en ressources (puissance de calcul, mémoire et énergie disponible) et qui communiquent par voie hertzienne, les réseaux de capteurs sans fil composent avec leurs faibles capacités pour déployer une architecture de communication de manière autonome, collecter des données sur leur environnement et les faire remonter jusqu'à l'utilisateur. Des « transports intelligents » à la surveillance du taux de pollution environnemental, en passant par la détection d'incendies ou encore l'« Internet des objets », ces réseaux sont aujourd'hui utilisés dans une multitude d'applications. Certaines d'entre elles, de nature médicale ou militaire par exemple, ont de fortes exigences en matière de sécurité. Les travaux de cette thèse se concentrent sur la protection contre les attaques dites par « déni de service », qui visent à perturber le fonctionnement normal du réseau. Ils sont basés sur l'utilisation de capteurs de surveillance, qui sont périodiquement renouvelés pour répartir la consommation en énergie. De nouveaux mécanismes sont introduits pour établir un processus de sélection efficace de ces capteurs, en optimisant la simplicité de déploiement (sélection aléatoire), la répartition de la charge énergétique (sélection selon l'énergie résiduelle) ou encore la sécurité du réseau (élection démocratique basée sur un score de réputation). Sont également fournis différents outils pour modéliser les systèmes obtenus sous forme de chaines de Markov à temps continu, de réseaux de Petri stochastiques (réutilisables pour des opérations de model checking) ou encore de jeux quantitatifs / Memory and little energy available), communicating through electromagnetic transmissions. In spite of these limitations, sensors are able to self-deploy and to auto-organize into a network collecting, gathering and forwarding data about their environment to the user. Today those networks are used for many purposes: “intelligent transportation”, monitoring pollution level in the environment, detecting fires, or the “Internet of things” are some example applications involving sensors. Some of them, such as applications from medical or military domains, have strong security requirements. The work of this thesis focuses on protection against “denial of service” attacks which are meant to harm the good functioning of the network. It relies on the use of monitoring sensors: these sentinels are periodically renewed so as to better balance the energy consumption. New mechanisms are introduced so as to establish an efficient selection process for those sensors: the first one favors the ease of deployment (random selection), while the second one promotes load balancing (selection based on residual energy) and the last one is about better security (democratic election based on reputation scores). Furthermore, some tools are provided to model the system as continuous-time Markov chains, as stochastic Petri networks (which are reusable for model checking operations) or even as quantitative games

Page generated in 0.0285 seconds