• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 824
  • 188
  • 119
  • 65
  • 55
  • 52
  • 42
  • 26
  • 18
  • 15
  • 13
  • 10
  • 9
  • 6
  • 4
  • Tagged with
  • 1681
  • 350
  • 321
  • 255
  • 206
  • 199
  • 188
  • 186
  • 158
  • 146
  • 124
  • 117
  • 112
  • 111
  • 109
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Mobile agent security

Alfalayleh, Mousa January 2009 (has links)
Research Doctorate - Doctor of Philosophy (PhD) / Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In the last several years numerous applications of mobile agents have emerged, including e-commerce. However, mobile agent paradigm introduces a number of security threats both to the agents themselves and to the servers that they visit. This thesis gives an overview of the main security issues related to the mobile agent paradigm. The first part of the thesis focuses on security of mobile agent itself. In this part, we propose a new coupling technique based on trust as a social control to work together with existing traditional security mechanisms. It relies on the “reputation” of the hosts in the itinerary and ensures that the agent succeeds in accomplishing its task with a high probability. Due to the fact that the coupling technique requires an agent’s itinerary to be known in advance, we introduce two new concepts: a “Scout mobile agent”, whose primary purpose is to determine the itinerary required for accomplishing a given task, and a “Routed mobile agent”, which operates with an itinerary known in advance. This enables the Routed agent to incorporate various security mechanisms, including our new coupling technique. Our Routed agent technique is also applicable independently of the Scout agent, whenever the itinerary and the trust values of the platforms in the itinerary are known. We also proposed a Petrol Station as an entity that would provide a service to other entities, in the form of certifying mobile agents and equipping them with safe itinerary based on trust score and applying the Routed agent. In the second part of the thesis, we shed some light on the security of mobile agent platforms as it is considered more critical than the security of agents. In particular, we consider a scenario where a platform hosts a database containing confidential individual information and allows mobile agentstoquery the data base. This mobile agent maybe behave maliciously which is similar to an intruder in the Statistical Disclosure Control(SDC), where measuring disclosure risk is still considered as a difficult and only partly solved problem[111]. We introduce a scenario that is not adequately covered by any of the previous discloser risk measures. Shannon’s entropy can be considered a satisfactory measure for the disclosure risk that is related to the exact compromise. However, in the case of approximate compromise, we argue that Shannon’s entropy does not express precisely the intruder’s knowledge about a particular confidential value. We introduce a novel disclosure risk measure that is based on Shannon’s entropy but covers both exact and approximate compromise. The main advantage of our measure over previously proposed measures that it gives careful consideration to the attribute values in addition to the probabilities with which the values occur. We use a dynamic programming algorithm to calculate the disclosure risk for various levels of approximate compromise. Importantly, our proposed measure is independent of the applied SDC technique. Finally, we show how this measure can be used to evaluate the security mechanisms for protecting privacy in statistical databases and data mining. We conduct extensive experiments and apply our proposed security measure to three different data sets protected by three different SDC techniques, namely Sampling, Query Restriction, and Noise Addition.
242

Corporate governance, auditor choice and auditor switch evidence from China /

Liu, Ming, January 2007 (has links)
Thesis (Ph.D.)--Hong Kong Baptist University, 2007. / Adviser: Zhijun Lin. Includes bibliographical references.
243

Clients' perceptions of therapist self-disclosure as a therapeutic technique.

Hanson, Jean Elizabeth, January 2004 (has links)
Thesis (M.A.)--University of Toronto, 2004. / Adviser: Margaret Schneider.
244

Patterns of self-disclosure and satisfaction in psychotherapy and in marriage

Sohn, Alice Elizabeth. January 2001 (has links) (PDF)
Thesis (Ph.D.)--Columbia University, 2001. / Includes bibliographical references.
245

Experienced and inexperienced therapists a comparison of attitude toward and use of countertransference disclosure : a project based upon an independent investigation /

Willott, Sara R. January 2007 (has links)
Thesis (M.S.W.)--Smith College School for Social Work, Northampton, Mass., 2007 / Thesis submitted in partial fulfillment for the degree of Master of Social Work. Includes bibliographical references (leaves 82-88).
246

An exercise in story repair a guided written disclosure protocol for fostering narrative completeness of traumatic memories /

Tomczyk, Daniel A. Sewell, Kenneth W., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2008. / Title from title page display. Includes bibliographical references.
247

Self-disclosure in biofeedback of hypertension /

Hendershot, Susan Christine. January 1991 (has links)
Thesis (Ph. D.)--University of Washington, 1991. / Vita. Includes bibliographical references (leaves [129]-137).
248

The effect of earnings quality on the association between information precision and the cost of equity capital

Zhu, Jia, January 2007 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2007. / Title proper from title frame. Also available in printed format.
249

A socio-cognitive model of information disclosure in human computer interaction

Lee, Doohwang. January 2008 (has links)
Thesis (Ph.D.)--Michigan State University. Media and Information Studies , 2008. / Title from PDF t.p. (viewed on July 2, 2009) Includes bibliographical references (p. 108-123). Also issued in print.
250

The joint impact of commitment to disclosure and prior forecast accuracy on managers' forecasting credibility

Venkataraman, Shankar, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.

Page generated in 0.0241 seconds