• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1237
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2380
  • 641
  • 556
  • 520
  • 508
  • 352
  • 332
  • 308
  • 299
  • 235
  • 234
  • 218
  • 210
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

An Anonymous Authentication Protocol with Chargeability and Fair Privacy for Mobile Network Environments

Huang, Shi-Ming 26 July 2006 (has links)
Mobile network equipments are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline environments, there are a lot of security threats to mobile network systems and their impact on the security is more serious than that in wireline environments owing to the feature of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified missives which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be the important issues when mobile users roam to the mobile networks. In this thesis, an anonymous authentication protocol will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else including the system. Although the users are anonymously authenticated by the system, it can still make correct bills to charge these anonymous users. Finally, our protocol also achieves the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
522

The relationship between perceptions of organizational politics and machiavellianism, the degree of democracy, and the characteristics of public and privacy organization.

Huang, Po-lin 20 July 2007 (has links)
This research goal lies in relies on Ferris et the al. (1989) model discussion to organize member's Machiavellianism advantage personality tendency and the organization ¡§the democratized degree¡¨and ¡§the male privately operated special characteristic¡¨ to organizes influence the member politics consciousness. This object of study including 13 public-operated organization 754 questionnaire, and 17 privately operated organization 859 questionnaire, total sends out 2356 questionnaire, recycles 1745, the returns-ratio reaches 74.07 ¢M, rejection invalid questionnaire 132, the effective questionnaire is 1613, effective questionnaire returns-ratio 68.46%. The investigation material uses the descriptive to count, analysis methods separately and so on letter analysis, correlation analysis, exploring factor analysis, level linear model. This findings discovered that,1.organizes member's Machiavellianism advantage personality tendency to organize member's political consciousness to have the remarkable sound.2.organization's democratized degrees to organize member's political consciousness not remarkable influence.3.organization's male privately operated special characteristics to organize member's political consciousness to have the remarkable influence.4.organization's democratized degrees to ¡§organize member's Machiavellianism advantage personality tendency to organize the member politics consciousness the influence¡¨ not to have the disturbance effect.5.Organization's male privately operated special characteristic to ¡§organizes member's Machiavellianism advantage personality tendency to organize the member politics consciousness the influence¡¨ not to have the disturbance effect.
523

The theory and practice analysis of domestic legal system of communication protection and interception

Chen, Jia-hong 21 August 2009 (has links)
Article 12 of Constitution of Republic of China, ¡§ people have the freedom of secret communication¡¨, protecting basic human rights aims to prevent people¡¦s communications from any arbitrary interference by others in the country except for evidence collection and crime investigation. For ensuring national security and maintaining social order, it is necessary to actually implement the communication interception. In order to balance the relationship between human rights of freedom and public interest, most of the democratic and advanced countries have set the rules of communication interception, which regulate the element of legal interception and punishment of illegal one to prevent the violations in rights of people from interception caused by abuse of power. July 14, 1999, the law of communication protection and interception was published and implemented to stipulate the operating procedure related to communication interception conducted by judiciary, procuratorial organ, executive bodies, building authorities, telecommunication corporations, and so on. This significantly symbolized that the execution of national communication interception was formally working forward to legal system, and finished the history of designated communication interception violating the constitution in the past decades. July 11, 2007, communication interception book was replaced with the provisions in the significant amendment issued by judge, and further created a new record of implementing the provision¡§people¡¦s freedoms of secret communication¡¨ secured by constitution, and formally connected with the trend of global democracy. It was undeniable that the design of this regulation still allowed much room of improvement and the circumstance of illegal wiretapping on the street stalls was definitely not restrained by the implementation of communication security law. Moreover, police units seldom dealt with the related reports or impeachments, and actively worked on the wiretapping cases. For most general public, it significantly pointed out that the effects of education did not come to the original expectation leading people to be aware of the importance of freedom of secret communication and privacy. This surely was the great defect and regret after the implementation of the relevant law. Based on the principles in the area of administrative law, the led five main structures (basic principles, framework, permission use, relief channel and monitoring mechanism,) in this research mainly analyzed and explored the current rules of communication protection and interception step by step, and further evaluated the potential deficiency and the matter of essential improvement through the modes of theory interpretation and practice review. The mentioned suggestions in this study were available to make the communication protection and interception mechanism with much better functions.
524

Data analytics for networked and possibly private sources

Wang, Ting 05 April 2011 (has links)
This thesis focuses on two grand challenges facing data analytical system designers and operators nowadays. First, how to fuse information from multiple autonomous, yet correlated sources and to provide consistent views of underlying phenomena? Second, how to respect externally imposed constraints (privacy concerns in particular) without compromising the efficacy of analysis? To address the first challenge, we apply a general correlation network model to capture the relationships among data sources, and propose Network-Aware Analysis (NAA), a library of novel inference models, to capture (i) how the correlation of the underlying sources is reflected as the spatial and/or temporal relevance of the collected data, and (ii) how to track causality in the data caused by the dependency of the data sources. We have also developed a set of space-time efficient algorithms to address (i) how to correlate relevant data and (ii) how to forecast future data. To address the second challenge, we further extend the concept of correlation network to encode the semantic (possibly virtual) dependencies and constraints among entities in question (e.g., medical records). We show through a set of concrete cases that correlation networks convey significant utility for intended applications, and meanwhile are often used as the steppingstone by adversaries to perform inference attacks. Using correlation networks as the pivot for analyzing privacy-utility trade-offs, we propose Privacy-Aware Analysis (PAA), a general design paradigm of constructing analytical solutions with theoretical backing for both privacy and utility.
525

När det privata blir offentligt : En kvalitativ studie om hur privatliv framställs i två kända bloggar

Öst, Emelie, Söderström, Fanny January 2010 (has links)
<p>I bloggar hittar vi mängder av personlig information som berör både blogginnehavaren och dennes anhöriga, medvetet eller omedvetet. Den här studien avser att öka förståelsen för hur privatliv och personligt relaterad information framställs i två kända personers bloggar. Studien baseras på två bloggar skrivna av offentliga, kända personer - Alex Schulman och Pernilla Wahlgren. Han är en känd medieentreprenör och skribent, hon är en folkkär artist och sångerska från en teaterfamilj. Dessa bloggare är redan kända av allmänheten, något som gör att gränsen för vad som är privat och offentlig information blir väldigt suddig.</p><p> </p><p>Genom en kvalitativ textanalys i två steg, en beskrivande samt en tolkande textanalys, kommer resultatet visa vilka ämnen som tas upp i bloggarna. I den beskrivande analysen studeras texten, och teman som är unika för bloggarna genereras ur texterna. Därefter tolkas och studeras dessa teman i den tolkande textanalysen för att få en förståelse för den information som bloggarna lämnar ut.</p><p> </p><p>Med utgångspunkt i <em>Privacy theory</em> diskuteras vilken typ av personlig information som blogginnehavarna delar med sig utav. Utifrån resultatet av analysen visar studien att de ämnen som presenteras i bloggarna är följande: privat i offentligheten, vardagsreflektioner, självgranskning, känslouttryck, familjeliv och arbete och familj.</p>
526

Privacy in the next generation Internet. Data proection in the context of European Union policy

Escudero-Pascual, Alberto January 2002 (has links)
<p>With the growth in social, political and economic importanceof the Internet, it has been recognized that the underlyingtechnology of the next generation Internet must not only meetthe many technical challenges but must also meet the socialexpectations of such a pervasive technology. As evidence ofthe strategic importance of the development of the Internet,the European Union has adopted a communication to the Counciland the European Parliament focusing on the next generationInternet and the priorities for action in migrating to the newInternet protocol IPv6 andalso a new Directive (2002/58/EC) on'processing of personal data and protection of privacy in theelectronic communication sector'. The Data Protection Directiveis part of a package of proposals for initiatives which willform the future regulatory framework for electroniccommunications networks and services. The new Directive aims toadapt and update the existing Data ProtectionTelecommunications Directive (97/66/EC) to take account oftechnological developments. However, it is not well undersoodhow this policy and the underlying Internet technology can bebrought into alignment.</p><p>This dissertation builds upon the results of my earlierlicentiate thesis by identifying three specific, timely, andimportant privacy areas in the next generation Internet: uniqueidentifiers and observability, privacy enhanced location basedservices, and legal aspects of data traffic.</p><p>Each of the three areas identified are explored in the eightpublished papers that form this dissertation. The paperspresent recommendations to technical standarization bodies andregulators concerning the next generation Internet so that thistechnology and its deployment can meet the specific legalobligations of the new European Union data protectiondirective.</p>
527

Zivilrechtlicher Schutz gegen Nachstellen : Eine Untersuchung der zivilrechtlichen Auswirkungen des [paragraph sign] 238 Abs. 1 StGB unter besonderer Berücksichtigung journalistischer Recherchen /

Kraus, Franziska. January 1900 (has links)
Thesis (doctoral)--Universität Konstanz, 2009. / Includes bibliographical references (p. [170]-176) and index.
528

Der vermögensrechtliche Zuweisungsgehalt des Persönlichkeitsrechts : Eine grundlagenorientierte Studie /

An, Pyŏng-ha. January 1900 (has links)
Thesis (doctoral)--Universität Trier, 2009. / Includes bibliographical references (p. [195]-206) and index.
529

Beurteilungsspielraum zugunsten Privater : die Übertragung der herkömmlichen Rechtsfigur auf das Verfahren regulierter Selbstregulierung im Jugendmedienschutz-Staatsvertrag (JMStV) zugunsten von Einrichtungen der freiwilligen Selbstkontrolle (EFS) /

Nell, Martin W. January 2010 (has links)
Thesis (doctoral)--Ludwig-Maximilians-Universität, München, 2009. / Includes bibliographical references (p. [407]-421) and index.
530

Protecting sensitive credential content during trust negotiation /

Jarvis, Ryan D., January 2003 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2003. / Includes bibliographical references (p. 51-54).

Page generated in 0.0343 seconds