• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 99
  • 36
  • 22
  • 12
  • 9
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 231
  • 231
  • 95
  • 81
  • 44
  • 38
  • 37
  • 33
  • 32
  • 30
  • 29
  • 26
  • 24
  • 24
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Application Development Using Client-Server Technology

Chowdhury, Evan January 2004 (has links) (PDF)
No description available.
62

Value-based design of electronic commerce servers /

Tan, Yong, January 2000 (has links)
Thesis (Ph. D.)--University of Washington, 2000. / Vita. Includes bibliographical references (leaves 70-73).
63

Information security in the client/server environment

Botha, Reinhardt A 23 August 2012 (has links)
M.Sc. (Computer Science) / Client/Server computing is currently one of the buzzwords in the computer industry. The client/server environment can be defined as an open systems environment. This openness of the client/server environment makes it a very popular environment to operate in. As information are exceedingly accessed in a client/server manner certain security issues arise. In order to address this definite need for a secure client/server environment it is necessary to firstly define the client/server environment. This is accomplished through defining three possible ways to partition programs within the client/server environment. Security, or secure systems, have a different meaning for different people. This dissertation defines six attributes of information that should be maintained in order to have secure information. For certain environments some of these attributes may be unnecessary or of lesser importance. Different security techniques and measures are discussed and classified in terms of the client/server partitions and the security attributes that are maintained by them. This is presented in the form of a matrix and provides an easy reference to decide on security measures in the client/server environment in order to protect a specific aspect of the information. The importance of a security policy and more specifically the influence of the client/server environment on such a policy are discussed and it is demonstrated that the framework can assist in drawing up a security policy for a client/server environment. This dissertation furthermore defines an electronic document .management system as a case study. It is shown that the client/server environment is a suitable environment for such a system. The security needs and problems are identified and classified in terms of the security attributes. Solutions to the problems are discussed in order to provide a reasonably secure electronic document management system environment.
64

Peer-to-peer som företagslösning / Peer-to-peer as an enterprise solution

Waller, Michael, Salleke, Emelie January 2002 (has links)
Problemområde: Idag är användandet av peer-to-peer (P2P) - applikationer såsom KaZaa, ICQ och Seti@home utbrett bland privatpersoner. Användningen inom företag är dock ännu i sin linda. Vi kommer därför i den här uppsatsen utreda om ett eventuellt införande av P2P- teknik i ett företagsnätverk ger några fördelar jämfört med en klassisk Client/Server-lösning. Hypotes: Arbetet bygger på hypotesen: ?En P2P-lösning ger fördelar för företaget jämfört med en Client/Server-lösning? Genomförande: För jämförelsen mellan P2P och Client/Server definierades och jämfördes fem områden: Säkerhet, Användbarhet, Tillgänglighet, Bandbredd samt Utrustningskrav. Slutsats: Inom områdena Användbarhet och Tillgänglighet ger en P2P-lösning klara fördelar, däremot inom områdena Säkerhet och Bandbredd visar Client/Server- lösningen istället klara fördelar. Området Utrustningskrav är oavgjort då det inte finns någon märkbar skillnad på lösningarna. Säkerhetsproblemen är P2P-teknologins akilleshäl och det problem som är mest troligt att stoppa stora investeringar i framtiden om det inte löses. Slutsatsen av vår jämförelse blir sålunda: För ett företag som redan har ett existerande Client/Server-nätverk är det inte någon idé att helt byta system, däremot kan det vara av intresse att introducera en applikation som möjliggör skapandet av så kallade Virtuella Nätverk. För ett helt nytt företag kan skapandet av ett P2P-nätverk vara ett väl så intressant alternativ till Client/Server. Detta förutsätter dock att säkerheten inte är så viktig för företaget eller att säkerhetsproblemen lösts.
65

Computer audit concerns in the client-server environment

Streicher, Rika 13 February 2014 (has links)
M. Com. (Computer Auditing) / and peer-to-peer have taken the world by storm. Dramatic changes have taken place in the information technology of organisations that have opted to follow this trend in the quest for greater flexibility and access to all those connected. Though technology has already had far-reaching effects on business, many changes are yet to be seen. The threats associated with the continuing developments in computer technology have resulted in many traditional internal control processes changing forever. Although, according to the above, it is fairly common that the client-server technology brings with it new threats and risks with internal control processes having to change to address these threats and risks, not all areas have been addressed yet. It is therefore clear that computer audit has a role to play. The main objective of this short dissertation is to shed some light on the problem described above: How will the changes wrought by the client-server technology affect the traditional audit approach? In other words, how will the computer auditor narrow the gap that has originated between traditional established audit procedures and an audit approach that meets the new challenges of the client-server environment? This will be achieved by pinpointing the audit concerns that arise due to the fundamental differences between the traditional systems environment and the new client-server environment...
66

Mobilní aplikace typu klient-server / Mobile Client Server Application

Manďák, Roman January 2017 (has links)
This master thesis is focused on designing the client and the server part of an application for text and multimedia communication between its users. The design takes into account reusing of the components and making them easily embeddable into another application. The project consists of a detailed analysis of communication protocols used for this type of applications, a description of possibilities of the iOS platform and development on this platform. Finally, the implementation and its possible extensions are described.
67

Mobile Communication Systems for Truckage Companies

Gruhn, Volker, Hülder, Malte, Ijioui, Raschid 30 January 2019 (has links)
The future of truckage companies lies in providing a more efficient and cost effective transport service, they must respond quickly to their customers’ needs and problems emerging during transport processes. Continuous and up-to-date understanding of business processes is essential and requires a reliable and user-friendly communication system. The project „Mobile Spedition im Web (SpiW)2“ presented here, develops such a mobile communication system, which focuses on the driver/dispatcher interaction. The main goals are integration with legacy logistics software and the possible use of new telematics and communication techniques. A mobile workflow server supports the adjustment of business processes to individual needs and the component based architecture of the communication system allows the later change and extension of components, making it possible to add new features to the system as they become available.
68

IMPROVING ROUTING AND CACHING PERFORMANCE IN DHT BASED PEER-TO-PEER SYSTEMS

XU, ZHIYONG January 2003 (has links)
No description available.
69

Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense

Morrell, Christopher Frank 03 May 2016 (has links)
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer. A network-based moving target defense is a technique that obfuscates the location of a machine on the Internet by arbitrarily changing its IP address periodically. MT6D is one of these techniques that leverages the size of the IPv6 address space to make it statistically impossible for an attacker to find a specific target machine. MT6D was designed with a number of limitations that include manually generated static configurations and support for only peer to peer networks. This work presents extensions to MT6D that provide dynamically generated configurations, a secure and dynamic means of exchanging configurations, and with these new features, an ability to function as a server supporting a large number of clients. This work makes three primary contributions to the field of network-based moving target defense systems. First, it provides a means to exchange arbitrary information in a way that provides network anonymity, authentication, and security. Second, it demonstrates a technique that gives MT6D the capability to exchange configuration information by only sharing public keys. Finally, it introduces a session establishment protocol that clients can use to establish concurrent connections with an MT6D server. / Ph. D.
70

Transformation monolithischer Business-Softwaresysteme in verteilte, workflowbasierte Client-Server-Architekturen

Krellner, Björn, Reichel, Thomas, Rünger, Gudula, Ferber, Marvin, Hunold, Sascha, Rauber, Thomas, Berndt, Jürgen, Nobbers, Ingo 22 July 2010 (has links) (PDF)
Im Projekt TransBS wurden existierende, über viele Jahre gewachsene Softwaresysteme zur Realisierung von Geschäftsprozessen betrachtet, in denen Aspekte wie Verteiltheit, Anpassbarkeit an heterogene Plattformen oder Skalierbarkeit zunehmend Bedeutung erlangen. Die notwendigen Anpassungen der Systeme sind nur schwierig und mit erheblichem Aufwand zu realisieren, da sie eine vollständige Reorganisation erfordern. Deshalb wurde im Projekt eine Methodik entwickelt und prototypisch realisiert, die monolithische Legacy-Business-Softwaresysteme in eine komponentenbasierte, verteilte Client-Server-Architektur mit konfigurierbaren Workflows für heterogene Plattformen schrittweise überführt. Die entwickelten Werkzeuge zur Transformation wurden exemplarisch mit einem gegebenen Softwaresystem evaluiert und können für weitere Problemstellungen der Analyse und Transformation von Business-Software eingesetzt werden.

Page generated in 0.0651 seconds