• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 1
  • Tagged with
  • 42
  • 42
  • 42
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A trusted environment for MPI programs

Florez-Larrahondo, German, January 2002 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science. / Title from title screen. Includes bibliographical references.
32

Using Web bugs and honeytokens to investigate the source of phishing attacks

McRae, Craig Michael, January 2008 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
33

On formal specification of authorization policies and their transformations : thesis /

Bai, Yun. January 2000 (has links)
Thesis (Ph.D.)--University of Western Sydney, 2000. / "A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
34

WSACT - a model for Web Services Access Control incorporating Trust

Coetzee, Marijke. January 2006 (has links)
Thesis (D.Phil.(Computer Science))--University of Pretoria, 2006. / Includes bibliographical references.
35

Logic programming based formal representations for authorization and security protocols

Wang, Shujing. January 2008 (has links)
Thesis (Ph.D.) -- University of Western Sydney, 2008. / A thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
36

The development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration /

Mitchell, Marsha. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 102-103).
37

Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks /

Schmidt, Mark Bradley, January 2006 (has links)
Thesis (Ph. D.)--Mississippi State University. College of Business and Industry. / Includes bibliographical references.
38

A dynamic, perimeter based, community-centric access control system

Chapman, Adam Scott. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 15, 2006). Document formatted into pages; contains viii, 48 pages. Includes bibliographical references.
39

Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks

Schmidt, Mark Bradley, January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. College of Business and Industry. / Title from title screen. Includes bibliographical references. Also available in print.
40

A unified alert fusion model for intelligent analysis of sensor data in an intrusion detection environment

Siraj, Ambareen, January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.

Page generated in 0.0777 seconds