• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 163
  • 31
  • 17
  • 17
  • 12
  • 11
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 317
  • 127
  • 54
  • 47
  • 43
  • 38
  • 36
  • 34
  • 34
  • 33
  • 32
  • 31
  • 26
  • 26
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Αρχιτεκτονικές επεξεργαστών και μνημών ειδικού σκοπού για την υποστήριξη φερέγγυων (ασφαλών) δικτυακών υπηρεσιών / Processor and memory architectures for trusted computing platforms

Κεραμίδας, Γεώργιος 27 October 2008 (has links)
Η ασφάλεια των υπολογιστικών συστημάτων αποτελεί πλέον μια πολύ ενεργή περιοχή και αναμένεται να γίνει μια νέα παράμετρος σχεδίασης ισάξια μάλιστα με τις κλασσικές παραμέτρους σχεδίασης των συστημάτων, όπως είναι η απόδοση, η κατανάλωση ισχύος και το κόστος. Οι φερέγγυες υπολογιστικές πλατφόρμες έχουν προταθεί σαν μια υποσχόμενη λύση, ώστε να αυξήσουν τα επίπεδα ασφάλειας των συστημάτων και να παρέχουν προστασία από μη εξουσιοδοτημένη άδεια χρήσης των πληροφοριών που είναι αποθηκευμένες σε ένα σύστημα. Ένα φερέγγυο σύστημα θα πρέπει να διαθέτει τους κατάλληλους μηχανισμούς, ώστε να είναι ικανό να αντιστέκεται στο σύνολο, τόσο γνωστών όσο και νέων, επιθέσεων άρνησης υπηρεσίας. Οι επιθέσεις αυτές μπορεί να έχουν ως στόχο να βλάψουν το υλικό ή/και το λογισμικό του συστήματος. Ωστόσο, η μεγαλύτερη βαρύτητα στην περιοχή έχει δοθεί στην αποτροπή επιθέσεων σε επίπεδο λογισμικού. Στην παρούσα διατριβή προτείνονται έξι μεθοδολογίες σχεδίασης ικανές να θωρακίσουν ένα υπολογιστικό σύστημα από επιθέσεις άρνησης υπηρεσίας που έχουν ως στόχο να πλήξουν το υλικό του συστήματος. Η κύρια έμφαση δίνεται στο υποσύστημα της μνήμης (κρυφές μνήμες). Στις κρυφές μνήμες αφιερώνεται ένα μεγάλο μέρος της επιφάνειας του ολοκληρωμένου, είναι αυτές που καλούνται να "αποκρύψουν" τους αργούς χρόνους απόκρισης της κύριας μνήμης και ταυτόχρονα σε αυτές οφείλεται ένα μεγάλο μέρος της συνολικής κατανάλωσης ισχύος. Ως εκ τούτου, παρέχοντας βελτιστοποιήσεις στις κρυφές μνήμες καταφέρνουμε τελικά να μειώσουμε τον χρόνο εκτέλεσης του λογισμικού, να αυξήσουμε το ρυθμό μετάδοσης των ψηφιακών δεδομένων και να θωρακίσουμε το σύστημα από επιθέσεις άρνησης υπηρεσίας σε επίπεδο υλικού. / Data security concerns have recently become very important, and it can be expected that security will join performance, power and cost as a key distinguish factor in computer systems. Trusted platforms have been proposed as a promising approach to enhance the security of the modern computer system and prevent unauthorized accesses and modifications of the sensitive information stored in the system. Unfortunately, previous approaches only provide a level of security against software-based attacks and leave the system wide open to hardware attacks. This dissertation thesis proposes six design methodologies to shield a uniprocessor or a multiprocessor system against a various number of Denial of Service (DoS) attacks at the architectural and the operating system level. Specific focus is given to the memory subsystem (i.e. cache memories). The cache memories account for a large portion of the silicon area, they are greedy power consumers and they seriously determine system performance due to the even growing gap between the processor speed and main memory access latency. As a result, in this thesis we propose methodologies to optimize the functionality and lower the power consumption of the cache memories. The goal in all cases is to increase the performance of the system, the achieved packet throughput and to enhance the protection against a various number of passive and Denial of Service attacks.
302

Cyber crime: a comparative law analysis

Maat, Sandra Mariana 11 1900 (has links)
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. / Jurisprudence / L. L. M.
303

Stories of life and death: undertakers' perspectives

Nel, Elsie Petronella 25 August 2009 (has links)
Like death, the defining human reality underlying our relationships and views of life's meaning, the experiences and activities of undertakers, remains an uncommon subject for psychological research. Existential anxiety roots a society-wide denial of the fundamental nature of death. which necessitates the development of institutions to take responsibility for the dying and dead. As the image and service of the stigmatised funeral industry improves, society's experience of death should become more meaningful. The overview of the research into these topics noted the need for further studies. Within a holistic, ecosystemic epistemology, this study adopted a qualitative approach and case study method, which provided descriptions of the ecology, contexts, and relationships characteristic .of the undertaker's vocation by focussing on patterned expressions of views and attitudes. The aim was to gain insight into the undertaker's experience of the many faces of death, with a genuine interest and deep respect for their world. / Psychology / M.A. (Clinical Psychology)
304

Support to parents with children with learning disablities

Rorich, Veronica Johanna Maria 31 October 2008 (has links)
This dissertation attempts to understand what support from the school parents would most value when their child has been diagnosed with a learning disability. The method employed was qualitative in nature, using eight in-depth interviews with the mothers. The interviews confirmed that parents experience emotions similar to those when grieving. They also tend to feel isolated from their communities. Before embarking on a support program the school needs to recognize the depth of these emotions. The interviews also revealed that parents require timeous communication from the teacher. Parents concerns should be taken seriously or time goes by without the disability being attended to. The terminology used by professionals is often not fully understood by parents, and this causes them to feel unsure of how therapy is helping their child in the classroom and what its value is. Various guidelines are offered to support parents with regard to the above-mentioned aspects. / Educational Studies / M. Ed. (Guidance and Counselling)
305

Cognitive dissonance in trauma : the conflict between belief, autobiographical memory and overt behaviour

Engelbrecht, Gerhardina Cornelia 10 1900 (has links)
This research was aimed at giving a voice to three women, who are constructed as having had a traumatic event recalled from their autobiographical memory. To achieve this objective an epistemological framework of social constructionism was used to investigate autobiographical memory recall of trauma. Three in-depth interviews were conducted with participants who constructed themselves as having had a traumatic event. A case study approach was used to gain access to the information and to compare themes. The research explored the way in which dissociation, voluntary thought suppression, minimisation and outright denial enabled the three participants to alter unbearable memories through the use of recurring themes. To interpret these stories the content of the themes was analysed using thematic content analysis. The participants represented different cultures, languages and religions. In sharing their symptoms this did not necessarily mean they attached the same meaning to a specific theme, as individual meaning-making corresponded to the individual‟s background and history and their perception of the trauma. The stories related by the three participants revealed a shattered worldview that brought them into opposition with community norms and standards, which the narrators experienced as silencing and judgemental. In this regard the researcher‟s aim was to generate information from the participants themselves. This inquiry into the personal trauma stories and meanings suited a qualitative research approach, a form of methodology that allowed personal insight into the meanings the three participants attributed to their trauma and the autobiographical recall of trauma. At the same time it allowed a co-constructed reality to take shape between the researcher‟s reality and the participant‟s reality, always acknowledging the importance of their being the expert of their own individual trauma memory. This is in contrast to a quantitative approach which focuses on numbers to quantify the results; a qualitative approach on the other hand is a personal, rich information-gathering tool that takes into account the emotions and meaning-making of each individual story without any intention to generalise the information gathered to a larger population It is hoped that through this research there is a realisation that although trauma victims share symptoms, the meaning-making of the individual attached to this trauma is influenced by their society and history within their respective environments. / Psychology / M.A. (Psychology)
306

E-crimes and e-authentication - a legal perspective

Njotini, Mzukisi Niven 27 October 2016 (has links)
E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because information is one of the indispensable assets of an information society. Given the fact that information can be the object of property, its position in the law of theft is investigated. This study is followed by an examination of the conventional risks that ICTs generate. For example, a risk exists that ICTs may be used as the object of e-crimes. Furthermore, there is a risk that ICTs may become a tool in order to appropriate information unlawfully. Accordingly, the scale and impact of e-crimes is more than those of the offline crimes, for example theft or fraud. The severe challenges that ICTs pose to an information society are likely to continue if clarity is not sought regarding: whether ICTs can be regulated or not, if ICTs can be regulated, how should an ICT regulatory framework be structured? A study of the law and regulation for regulatory purposes reveals that ICTs are spheres where regulations apply or should apply. However, better regulations are appropriate in dealing with the dynamics of these technologies. Smart-regulations, meta-regulations or reflexive regulations, self-regulations and co-regulations are concepts that support better regulations. Better regulations enjoin the regulatory industries, for example the state, businesses and computer users to be involved in establishing ICT regulations. These ICT regulations should specifically be in keeping with the existing e-authentication measures. Furthermore, the codes-based theory, the Danger or Artificial Immune Systems (the AIS) theory, the Systems theory and the Good Regulator Theorem ought to inform ICT regulations. The basis for all this should be to establish a holistic approach to e-authentication. This approach must conform to the Precautionary Approach to E-Authentication or PAEA. PAEA accepts the importance of legal rules in the ICT regulatory agenda. However, it argues that flexible regulations could provide a suitable framework within which ICTs and the ICT risks are controlled. In addition, PAEA submit that a state should not be the single role-player in ICT regulations. Social norms, the market and nature or architecture of the technology to be regulated are also fundamental to the ICT regulatory agenda. / Jurisprudence / LL. D.
307

A teoria crítica de H. Marcuse: fundamentação filosófica de um novo princípio de realidade / Critical theory of H. Marcuse: philosophical grounding of a new reality principle

Leonhardt, Cleberson Odair 20 August 2013 (has links)
Made available in DSpace on 2017-07-10T18:26:05Z (GMT). No. of bitstreams: 1 Cleberson Odair Leonhardt.pdf: 911242 bytes, checksum: e19b00e1b61421b6c4a81fdbad45110e (MD5) Previous issue date: 2013-08-20 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / The aim objective of this master thesis is to stimulate a reading on the Herbert Marcuse s work that rises an innovative comprehension of the established capitalist society, in order to foster possibilities for social change guided by primarily qualitative dimensions. For this purpose we sought, first, to situate Marcuse in the context of the Frankfurt School and critical theory, as well as demonstrate the development of the specificities of the critical theory improved by him. When Marcuse appropriated of the Marx and Freud s ideas, he has raised a possibility of conceptual expansion, enabling, for instance, the idea of an extension of the social place of denial and the historical contextualization of the reality principle. By pointing out these conceptual extensions and the historicity of the reality principle, also specifying the surplus- repression and performance principle, Marcuse overcomes Freud supported by Marx and expands Marx thematic horizon supported by Freud. It became possible to perform a reading that identifies, even in the biological and natural base, potential changes in human social relations with this theoretical-critical construction. These, especially guided for structural modifications in view of a new sensibility and a new solidarity. The theoretical perspectives thus conquered legitimize the possibility of certain groups and social movements being considered new locals of social place of denial. These have developed and / or preserved the ability of providing subsidies for the modification of the reality principle and, therefore, boost the qualitative change of the whole society. In this perspective it becomes possible to determine parameters for identifying (and fostering) emancipatory capacities of certain social groups in a broad and fruitful way. The possibilities of engagement and change, thus, expanded, diversified and strengthened. / O objetivo almejado nesta dissertação é estimular uma leitura da obra de Herbert Marcuse que suscite uma compreensão inovadora da sociedade capitalista estabelecida, de maneira a fomentar possibilidades de uma modificação social orientada por dimensões prioritariamente qualitativas. Para tal intento buscou-se, primeiramente, situar Marcuse no contexto da Escola de Frankfurt e da teoria crítica, bem como, demonstrar o desenvolvimento das especificidades da teoria crítica aperfeiçoada por ele. Marcuse ao apropriar-se das ideias de Marx e Freud fez surgir uma possibilidade de ampliação conceitual, viabilizando, por exemplo, a ideia de uma ampliação do lugar social de negação e da contextualização histórica do princípio de realidade. Ao apontar estas ampliações conceituais e a historicidade do princípio de realidade, especificando também a mais-repressão e o princípio de desempenho, Marcuse supera Freud apoiado em Marx e amplia o horizonte temático de Marx apoiado em Freud. Com esta construção teórica-crítica tornou-se possível realizar uma leitura que identifica, inclusive já na base biológica e natural, potencialidades de modificação nas relações sociais humanas. Estas, pautadas, de modo especial, por modificações estruturais em vista de uma nova sensibilidade e de uma nova solidariedade. As perspectivas teóricas assim conquistadas legitimam a possibilidade de certos grupos e movimentos sociais serem considerados novos locais de negação social. Estes teriam desenvolvido e/ou preservado a capacidade de fornecer subsídios para a modificação do princípio de realidade e, portanto, de impulsionar a mudança qualitativa de toda a sociedade. Em tal perspectiva torna-se possível a determinação de parâmetros para a identificação (e fomentação) de capacidades emancipatórias de certos grupos sociais de um modo amplo e fecundo. As possibilidades de engajamento e de mudança, dessa maneira, se ampliam, diversificam e fortalecem.
308

Pohledávky věřitelů v insolvenčním řízení / Creditors’ claims in Insolvency proceeding

Metzová, Nika January 2011 (has links)
This diploma thesis with the titled Creditors' claims in Insolvency proceeding deals with the possibility of setting up the claims of creditors in case that the court declared the debtor insolvent and was therefore initiated insolvency proceeding according to the Act no. 182/2006 Col., on Insolvency and Its Resolution (Insolvency Act). The introduction of the thesis also pays attention to other possibilities of enforcing and lodging the claims whether in extrajudicial proceedings or in proceedings before the court by filing an action against the debtor or in proceedings before the court or arbitration and subsequent recovery options of enforceable claims. The main aim of this thesis is to present a detailed analysis of the process of submission of claims in insolvency proceedings from the moment of initiation of the proceeding through submission of the claims to the insolvency court to their reviewing and their possible denial (together with adversary disputes) or their finding and final satisfaction. The chapter that describes the different types of claims is also closely related to the process of submitting, reviewing and satisfaction of claims as the type of the claim may determine whole process of its submission and satisfaction in the insolvency proceeding. Last chapters describe the satisfaction of admitted claims depending to the chosen method of the insolvency resolution and the destiny of unsatisfied of claims when the insolvency proceeding is over. At the end of the thesis is a practical example that should illustrate the procedure of filling the Claim submission form, including all elements of formal and content requirements.
309

Jüdische Geschichte digital im russischsprachigen Raum: Am Beispiel des Holocaust

Friedman, Alexander 08 August 2019 (has links)
No description available.
310

Using network resources to mitigate volumetric DDoS / Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques

Fabre, Pierre-Edouard 13 December 2018 (has links)
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation efficace des interconnections entre les équipements réseaux, ou l’absorption de l’attaque par les ressources disponibles. Dans cette thèse, nous proposons un mécanisme de contrôle de dommages. Basé sur une nouvelle signature d’attaque et les fonctions réseaux du standard Multiprotocol Label Switching (MPLS), nous isolons le trafic malicieux du trafic légitime et appliquons des contraintes sur la transmission du trafic malicieux. Le but est de rejeter suffisamment de trafic d’attaque pour maintenir la stabilité du réseau tout en préservant le trafic légitime. La solution prend en compte des informations sur l’attaque, mais aussi les ressources réseaux. Considérant que les opérateurs réseaux n’ont pas une même visibilité sur leur réseau, nous étudions l’impact de contraintes opérationnelles sur l’efficacité d’une contre mesure régulièrement recommandée, le filtrage par liste noire. Les critères d’évaluation sont le niveau d’information sur l’attaque ainsi que sur le trafic réseau. Nous formulons des scénarios auxquels chaque opérateur peut s’identifier. Nous démontrons que la l’algorithme de génération des listes noires doit être choisi avec précaution afin de maximiser l’efficacité du filtrage / Massive Denial of Service attacks represent a genuine threat for Internet service, but also significantly impact network service providers and even threat the Internet stability. There is a pressing need to control damages caused by such attacks. Numerous works have been carried out, but were unable to combine the need for mitigation, the obligation to provide continuity of service and network constraints. Proposed countermeasures focus on authenticating legitimate traffic, filtering malicious traffic, making better use of interconnection between network equipment or absorbing attack with the help of available resources. In this thesis, we propose a damage control mechanism against volumetric Denial of Services. Based on a novel attack signature and with the help of Multiprotocol Label Switching (MPLS) network functions, we isolate malicious from legitimate traffic. We apply a constraint-based forwarding to malicious traffic. The goal is to discard enough attack traffic to sustain network stability while preserving legitimate traffic. It is not only aware of attack details but also network resource, especially available bandwidth. Following that network operators do not have equal visibility on their network, we also study the impact of operational constraints on the efficiency of a commonly recommended countermeasure, namely blacklist filtering. The operational criteria are the level of information about the attack and about the traffic inside the network. We then formulate scenario which operators can identify with. We demonstrate that the blacklist generation algorithm should be carefully chosen to fit the operator context while maximizing the filtering efficiency

Page generated in 0.0331 seconds