• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 42
  • 19
  • 11
  • 5
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 98
  • 20
  • 19
  • 16
  • 16
  • 16
  • 16
  • 15
  • 14
  • 11
  • 10
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Testing the Internet state management mechanism

Tappenden, Andrew 06 1900 (has links)
This thesis presents an extensive survey of 100,000 websites as the basis for understanding the deployment of cookies across the Internet. The survey indicates cookie deployment on the Internet is approaching universal levels. The survey identifies the presence of P3P policies and dynamic web technologies as major predictors of cookie usage, and a number of significant relationships are established between the origin of the web application and cookie deployment. Large associations are identified between third-party persistent cookie usage and a countrys e-business environment. Cookie collection testing (CCT), a strategy for testing web applications, is presented. Cookies maintained in a browser are explored in light of anti random testing techniques, culminating in the definition of seeding vectors as the basis for a scalable test suite. Essentially CCT seeks to verify web application robustness against the modificationintentional or otherwiseof an application's internal state variables. Automation of CCT is outlined through the definition of test oracles and evaluation criterion. Evolutionary adaptive random (eAR) testing is proposed for application to the cookie collection testing strategy. A simulation study is undertaken to evaluate eAR against the current state-of-the-art in adaptive random testingfixed size candidate set, restricted random testing, quasi-random testing, and random testing. eAR is demonstrated to be superior to the other techniques for block pattern simulations. For fault patterns of increased complexity, eAR is shown to be comparable to the other methods. An empirical investigation of CCT is undertaken. CCT is demonstrated to reveal defects within web applications, and is found to have a substantial fault-triggering rate. Furthermore, CCT is demonstrated to interact with the underlying application, not just the technological platform upon which an application is implemented. Both seeding and generated vectors are found to be useful in triggering defects. A synergetic relationship is found to exist between the seeding and generated vectors with respect to distinct fault detection. Finally, a large significant relationship is established between structural and content similarity measures of web application responses, with a composite of the two similarity measures observed to be superior in the detection of faults. / Software Engineering and Intelligent Systems
72

Testing the Internet state management mechanism

Tappenden, Andrew Unknown Date
No description available.
73

Desenvolvimento e avaliação tecnológica de biscoito tipo cracker com incremento no teor de proteínas e de fibras pela incorporação de derivados de soja / Development and technological evaluation of cracker biscuit with increase of content proteins and fibers by incorporation of soy derivates

Gomes-Ruffi, Cristiane Rodrigues 19 August 2018 (has links)
Orientador: Fernanda Paula Collares-Queiroz / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia de Alimentos / Made available in DSpace on 2018-08-19T13:31:45Z (GMT). No. of bitstreams: 1 Gomes-Ruffi_CristianeRodrigues_M.pdf: 1964145 bytes, checksum: d20d084cd656792fb2659ae059c8f70e (MD5) Previous issue date: 2011 / Resumo: O segmento de biscoitos é um setor da panificação de extrema importância para o Brasil, que se destaca como o 2º maior produtor mundial em volume. Por ser consumido habitualmente por grande parte da população brasileira, o biscoito salgado tipo cracker, segundo tipo de biscoito mais consumido (25% em volume), revela-se como um bom veículo para a inclusão de ingredientes funcionais. A soja constitui-se em um destes ingredientes, devido à presença de compostos bioativos (isoflavonas), sendo inclusive excelente para o enriquecimento protéico, principalmente como fonte de aminoácidos essenciais, e de fibras, traduzindo-se em benefícios à saúde, além de agregar valor ao produto. O objetivo desse projeto foi avaliar o desempenho tecnológico de biscoito salgado tipo cracker obtido com a utilização de derivados da soja (isolado protéico e fibra alimentar) em substituição parcial da farinha de trigo, visando a melhoria nutricional (teor e perfil de aminoácidos) com propriedades funcionais (fibras e isoflavonas). Inicialmente, as matérias-primas (farinha de trigo, isolado protéico e fibra de soja) foram caracterizadas quanto à composição centesimal, teor de fibra alimentar (solúvel e insolúvel), composição em aminoácidos totais, teor de isoflavonas e granulometria. A farinha de trigo foi caracterizada quanto às análises reológicas (farinográficas e extensográficas), teor de glúten e falling number. Posteriormente, um delineamento experimental, aplicado à Metodologia de Superfície de Resposta, foi utilizado para avaliar a influência da adição destes dois ingredientes derivados de soja nos parâmetros de qualidade dos biscoitos. As respostas avaliadas por este planejamento experimental fatorial completo 22 com 4 pontos fatoriais, 4 pontos axiais e 4 pontos centrais, totalizando 12 ensaios, foram: o índice de expansão, o volume específico, a cor instrumental, a textura instrumental (firmeza e fraturabilidade), a atividade de água e a aceitação sensorial. Os resultados foram analisados estatisticamente (DCCR e ANOVA) e com base nos resultados de textura instrumental e aceitação sensorial obtidos, novos testes experimentais foram realizados apenas nos pontos/intervalos que apresentaram as melhores respostas em comparação com o biscoito controle (sem a adição dos derivados de soja). Além das avaliações tecnológicas, os biscoitos referentes aos ensaios selecionados e o biscoito Controle foram avaliados quanto à composição centesimal, teor de fibra alimentar (solúvel e insolúvel), composição em aminoácidos totais e teor de isoflavonas. Os resultados mostraram que a adição de isolado protéico de soja (IPS) e fibra de soja (FS) interferiram nas características de textura instrumental, com aumento da crocância, ou fraturabilidade. A análise sensorial mostrou que além do Controle, a amostra 1 (6,46% IPS e 3,88% FS) foi a que apresentou as maiores freqüências de aceitação (superiores a 80% para todos os atributos avaliados), seguida das amostras 7 (10,0% IPS e 3,0% FS) e 5 (5,0% IPS e 6,0% FS). A amostra 6 (15,0% IPS e 6,0% FS) foi rejeitada sensorialmente. Do ponto de vista nutricional, para as formulações selecionadas do delineamento, a incorporação de IPS e FS promoveu uma diminuição nos teores de carboidratos, aumento nos teores protéicos (e perfil de aminoácidos de alto valor biológico), nas fibras totais (superiores a 3 g/100 g), sendo consideradas fontes de fibra pela legislação brasileira, além da presença de isoflavonas, que conferem propriedades funcionais aos biscoitos. Portanto, a adição de IPS e FS proporcionou a obtenção de biscoitos cracker com alto valor agregado, com melhores propriedades nutricionais e potencialmente funcionais (fibras e isoflavonas) / Abstract: The biscuit segment, is a Bakery Industry sector of an extremely importance to Brazil. Which stands as the 2nd world's largest producer by volume. Because it is usually consumed by most of the population, the second most consumed type of biscuit (25% in volume), the cracker biscuit reveals itself as a good vehicle for the inclusion of functional ingredients. Soy is one of these ingredients, due the presence of bioactive compounds (isoflavones), being also excellent for protein enrichment, mainly as a source of essential aminoacids and fiber, resulting in health benefits, besides the fact that it adds value to the product. The aim of this project was to evaluate the technological performance of salty crackers obtained with the use of soy products (protein isolate and dietary fiber) in partial replacement of wheat flour, in order to improve nutritional content (content and aminoacid profile) with functional properties (fiber and isoflavones). Initially, the raw materials (wheat flour, protein isolate and soy fiber) were characterized by centesimal composition, value of nourishing fiber (soluble and insoluble), total aminoacid composition, isoflavone content and granulometry. Wheat flour was characterized based on the rheological analysis (farinographic and extensographic), gluten content and falling number. Subsequently, an experimental design, applied to the Response Surface Methodology was used to evaluate the effect of adding these two soybean derived products in the parameters of biscuits quality. The responses evaluated by this 22 full factorial design with 4 factorial points, 4 axial points and 4 central points, totaling 12 trials were: the expansion index, specific volume, instrumental color, instrumental texture (firmness and fracturability), the water activity and sensory evaluation. The results were analyzed statistically (DCCR and ANOVA) and based on the instrumental texture and sensory acceptability results obtained, new experimental tests were performed only at the points/intervals which presented the best responses compared with the control cracker (without the addition of soybean derived products). In addition to the technological evaluations, the crackers from the selected trials and the control cracker were evaluated for centesimal composition, value of nourishing fiber (soluble and insoluble), total aminoacid composition and isoflavone content. The results showed that the addition of soy protein isolate (SPI) and soy fiber (SF) affected the instrumental texture characteristics, with an increase in crispness or fracturability. The sensory evaluation showed that besides control cracker, the sample 1 (6.46% SPI and 3.88% SF) was the one with the highest acceptance (above 80% for all attributes), then the samples 7 (10.0% SPI and 3.0% SF) and 5 (5.0% SPI and 6.0% SF). Sample 6 (15.0% SPI and 6.0% SF) was rejected sensory. From a nutritional point of view, for the selected formulations, the addition of SPI and FS promoted a decrease in carbohydrate, an increase in protein content (and aminoacid profile of high biological value) and total fiber (greater than 3 g/100 g), being considered fiber sources by Brazilian law, and the presence of isoflavones, that provides the functional properties of biscuits. So, the addition of SPI and FS resulted in crackers with high added value, with improved nutritional properties and potentially functional properties (fiber and isoflavones) / Mestrado / Tecnologia de Alimentos / Mestre em Tecnologia de Alimentos
74

Det nya hotet mot användarens integritet : En studie om individanpassad reklam på Facebook / A study about personalized advertising on Facebook

Boström, Jessica, Svedlund, Beatrice January 2017 (has links)
Problem: Vid accepterandet av användarvillkor och cookies på Facebook får företag information om respektive användare och kan därmed skapa individanpassad reklam, något som kan uppfattas som integritetskränkande. Syfte: Analysera och beskriva användarens beteende och vidare kunskap om individanpassad reklam, via cookies, på Facebook. Teori: Den teoretiska referensramen omfattar bakgrundsinformation om Facebook, cookies och individanpassad reklam. Grundläggande teori baseras på hur företag använder sig av Facebook, cookies och individanpassad reklam för att marknadsföra sina produkter och tjänster. Metod: Studien har tillämpat en deduktiv ansats med en webbenkät som datainsamlingsverktyg. Enkäten sändes ut till 3318 programstudenter på Högskolan Dalarna, med svenska som undervisningsspråk. Resultat: Studiens resultat redovisas utifrån insamlad data från enkätundersökningen. Data sammanställdes i stapeldiagram, histogram och i tabeller med beskrivande statistik och medelvärde. Slutsats: Användaren besitter inte kunskap om vad de accepterar när de godkänner Facebooks användarvillkor och anser sig inte vara orolig över den personliga information Facebook tar del av i kommersiellt syfte. / Problem: Accepting the term of use for cookies and Facebook, gives companies information about each user of Facebook so they can create personalized advertising. Purpose: The purpose of the paper is to analyze and describe the user´s behavior and further knowledge of personalized advertising, through cookies, on Facebook. Theory: The theoretical frame includes information about Facebook, cookies and personalized advertisements. The theory is based on how companies use Facebook, cookies and personalized advertisements to promote their products and services. Method: The study has used a deductive approach with a web questionnaire as a data collection tool. The questionnaire was sent to 3318 students at Högskolan Dalarna, with Swedish as the language of instruction. Results: The results of the study is based on collected data from the survey. The data was compiled in bar charts, histograms and a table with descriptive statistics and mean. Conclusion: The user does not have knowledge of what they accept when they approve Facebook's Terms of Service and do not feel worried about the personal information Facebook delivers for commercial purposes.
75

Public Awareness of Data Privacy and its Effects

Sichel, Grant 04 May 2021 (has links)
No description available.
76

Webové aplikace pro autentizaci uživatelů / Web applications for user authentication

Vybíral, Petr January 2014 (has links)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
77

Digitala kakor och skräddare : En kvalitativ intervjustudie om digital natives åsikter gällande övervakning på internet. / Digital cookies and tailors : A qualitative interview study on digital natives' views regarding internet surveillance.

Nordén, Arvid, Andegras, Rasmus January 2022 (has links)
In a time when internet connection is a central part of our everyday lives and wherewe constantly communicate through digital aids, a possible threat has arisen. Surveillance by commercial companies tracks most of what we do on their websites and then stores that data so that, for example, in the future companies can market specific goods that the user has previously looked at. The data collected by a specific supplier is not always saved for that specific company’s use only. The data is also used as a commodity between different online suppliers, the trade itself turns over billions of Swedish kronor every year. The purpose of this study is to examine young adults aged 20-30 (also called digital natives) knowledge, opinions, and thoughts regarding surveillance on the internet for commercial purposes. The study wants to find out what knowledge they say they have, what opinions they have and whether they adapt to the phenomenon by, for example, using VPN services or the like. Previous research in the field has shown that young people do not possess a deep knowledge of the subject and that they rarely adapt to any great extent to the phenomenon. The theoretical framework addresses both the user's and the supplier's perspective. The framework introduces surveillance and integrity from a theoretical perspective, but also addresses the power the supplier has and the financial conditions for the supplier. The results of the study show that, like previous studies in the same field, digital natives do not possess a deep knowledge of the subject and that they rarely adapt. Opinions differ however, where some say they do not care, and some believe that the surveillance has gone too far. In the ensuing discussion, we turn back and forth on the participants' reasoning and try to create a comprehensive picture of why the participants think the way they do.
78

Improvements of User's Security and Privacy in a Web Browser

Bishop, Douglas L. January 2021 (has links)
No description available.
79

Understanding Data Practices in Private Corporations : Analysis of Privacy Policies, Cookies Statements and “Dark Patterns”

Mendes, Débora January 2022 (has links)
Introduction: We analyse the privacy policies of 15 private corporations to understand if the data handling practices – data collection, storage, and sharing –described in the policies are ethical or unethical. The data we leave behind when we use the Internet are crucial for corporations. The data provides valuable insights into our lives, thus helping corporations improve targeted marketing campaigns and increase their revenue. Method: Extensive literature review of peer-reviewed articles, written between1993 and 2021, to examine how theoretical perspectives and empirical findings evolved over time; combined with empirical research to analyse the privacy policies and “dark patterns” of 15 companies. The companies were chosen at random and belong to different sectors to give a broader understanding of the current privacy and data handling practices. Analysis: Discourse analysis of the privacy policies to evaluate the type of language used, if it is clear, easy to understand, and if the policy informs users about how their data are collected, shared, and stored. But also, a visual analysis to understand if the company is implementing “dark patterns”. Results: The results indicate that most privacy policies use misleading terms, are not fully transparent about the company’s data handling practices, and often implement “dark patterns” to try to influence the users’ decisions. Conclusion: Most companies have privacy policies available on their websites due to a clear influence from the GDPR legislation, however, there appears to be a conflicting relationship between wanting to comply with the GDPR and wanting to gather as much information as possible.
80

Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains

Alabrah, Amerah 01 January 2014 (has links)
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport's well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions. The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance. In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting. The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible. In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment. All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation.

Page generated in 0.0414 seconds