• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • Tagged with
  • 6
  • 6
  • 6
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Delaying-type responses for use by software decoys /

Julian, Donald P. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Neil C. Rowe, J. Bret Michael. Includes bibliographical references (p. 55-57). Also available online.
2

A framework for dynamic subversion /

Rogers, David T. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
3

Scalable role & organization based access control and its administration

Zhang, Zhixiong. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
4

Distributed password cracking

Crumpacker, John R. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Dinolt, George. Second Reader: Eagle, Chris. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Distributed password cracking, Berkeley Open Infrastructure for Network Computing (BOINC), and John the Ripper. Includes bibliographical references (p. 63-64). Also available in print.
5

Security models for authorization, delegation and accountability

Lui, W. C. January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
6

Flexible authorizations in workflow management systems

Lui, W. C. January 2002 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2003. / Includes bibliographical references (leaves 162-168) Also available in print.

Page generated in 0.1012 seconds