• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1244
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2395
  • 646
  • 560
  • 523
  • 511
  • 352
  • 333
  • 308
  • 299
  • 238
  • 235
  • 218
  • 211
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
681

Analysis of key security and privacy concerns and viable solutions in Cloud computing

Ali, Ayaz January 2019 (has links)
Cloud Security and Privacy is the most concerned area in the development of newly advance technological domains like cloud computing, the cloud of things, the Internet of Things. However, with the growing popularity and diverse nature of these technologies, security and privacy are becoming intricate matters and affect the adoption of cloud computing. Many small and large enterprises are in conflict while migrating towards cloud technology and this is because of no proper cloud adoption policy guideline, generic solutions for system migration issues, systematic models to analyze security and privacy performance provided by different cloud models. Our proposed literature review focuses on the problems and identifies solutions in the category of security and privacy. A comprehensive analysis of various identified techniques published during 2010 – 2018 has been presented. We have reviewed 51 studies including research papers and systematic literature reviews on the factors of security and privacy. After analyzing, the papers have been classified into 5 major categories to get an appropriate solution for our required objectives of this study. This work will facilitate the researchers and as well the companies to select appropriate guideline while adopting cloud services.
682

Privacy Protection and Mobility Enhancement in Internet

Zhang, Ping 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The Internet has substantially embraced mobility since last decade. Cellular data network carries majority of Internet mobile access traffic and become the de facto solution of accessing Internet in mobile fashion, while many clean-slate Internet mobility solutions were proposed but none of them has been largely deployed. Internet mobile users increasingly concern more about their privacy as both researches and real-world incidents show leaking of communication and location privacy could lead to serious consequences. Just the communication itself between mobile user and their peer users or websites could leak considerable privacy of mobile user, such as location history, to other parties. Additionally, comparing to ordinary Internet access, connecting through cellular network yet provides equivalent connection stability or longevity. In this research we proposed a novelty paradigm that leverages concurrent far-side proxies to maximize network location privacy protection and minimize interruption and performance penalty brought by mobility.To avoid the deployment feasibility hurdle we also investigated the root causes impeding popularity of existing Internet mobility proposals and proposed guidelines on how to create an economical feasible solution for this goal. Based on these findings we designed a mobility support system offered as a value-added service by mobility service providers and built on elastic infrastructure that leverages various cloud aided designs, to satisfy economic feasibility and explore the architectural trade-offs among service QoS, economic viability, security and privacy.
683

Modeling and Quantification of Profile Matching Risk in Online Social Networks

Halimi, Anisa 01 September 2021 (has links)
No description available.
684

Machine Learning Models for Categorizing Privacy Policy Text

Aryasomayajula, Naga Srinivasa Baradwaj January 2018 (has links)
No description available.
685

Mitigating Security Issues While Improving Usability

Kulkarni, Rucha January 2018 (has links)
No description available.
686

ACTIVE-LEARNING SIMULATION-BASED APPROACH TO DIGITAL PRIVACY AWARENESS AND SECURITY IN SOCIAL-MEDIA (DIGITAL-PASS)

Messner, Kenneth Tyler 12 November 2019 (has links)
No description available.
687

Privacy Preserving Kin Genomic Data Publishing

Shang, Hui 16 July 2020 (has links)
No description available.
688

Design and Implementation of a Credible Blockchain-based E-health Records Platform

Xu, Lingyu January 2020 (has links)
Masters of Science / With the development of information and network technologies, Electronic Health Records (EHRs) management system has gained wide spread application in managing medical records. One of the major challenges of EHRs is the independent nature of medical institutions. This non-collaborative nature puts a significant barrier between patients, doctors, medical researchers and medical data. Moreover, unlike the unique and strong anti-tampering nature of traditional paper-based records, electronic health records stored in centralization database are vulnerable to risks from network attacks, forgery and tampering. In view of the data sharing difficulties and information security problems commonly found in existing EHRs, this dissertation designs and develops a credible Blockchain-based electronic health records (CB-EHRs) management system. To improve security, the proposed system combines digital signature (using MD5 and RSA) with Role-Based Access Control (RBAC). The advantages of these are strong anti-tampering, high stability, high security, low cost, and easy implementation. To test the efficacy of the system, implementation was done using Java web programming technology. Tests were carried out to determine the efficiency of the Delegated Byzantine Fault Tolerance (dBFT) consensus algorithm, functionality of the RBAC mechanism and the various system modules. Results obtained show that the system can manage and share EHRs safely and effectively. The expectation of the author is that the output of this research would foster the development and adaptation of EHRs management system.
689

"I'm Spoon-feeding him my Trauma": An Analysis of Sexual Assault Survivors' Privacy Management in Romantic Relationships

Unruh, Margret 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Survivors of sexual assault make difficult privacy management decisions regarding their experiences, particularly in romantic relationships where physical intimacy makes these sensitive disclosures even more complex. As fever is an indicator of illness and a part of healing from the illness, disclosure can be an indicator of underlying disturbance and a part of the restorative process. Additionally, communication privacy management (CPM) theory considers ownership, control, and turbulence to illustrate how private information is regulated. Through qualitative, semi-structured interviews (n=19) and a phronetic iterative approach to data analysis, I examined the ways survivors of sexual assault managed their private information regarding their experiences in a romantic relationship and if disclosure relieved any psychological distress of the survivor. Results of this study offer insight into the ways participants controlled their personal information through the privacy management process; the establishment of boundaries surrounding ongoing disclosures; and the emotional effect of various privacy management strategies on participants, their partners, and the relationship. Reaching across theoretical concepts, this research offers a comprehensive understanding of the factors salient when managing private information regarding sexual assault. This research also provides practical applications for considering the influence of various privacy management approaches and their influence on the physical and psychological health of the survivor and the health of the relationship.
690

Smart locks: User perception on security vs convenience

Brunzell, Hampus, Berglöf, Oliver January 2023 (has links)
This thesis aims to find out trade-offs between security, privacy and convenience when it comes to smart locks. If users know about security and privacy risks associated with smart locks and how they perceive the trade-offs, if they think that the security and privacy risks are worth it for some added convenience. In this project both a literature review and online survey was used to gather information. The results are that there are conveniences with smart locks but that they come with potential security and privacy risks. That overall users seems to know that there are potential security and privacy risks and users seem to think that any potential security and privacy risks are worth taking for the sake of convince.

Page generated in 0.1247 seconds