• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 22
  • 9
  • 8
  • 6
  • 6
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Implementation and Evaluation of an Emulated Permission System for VS Code Extensions using Abstract Syntax Trees / Implementation och Utvärdering av ett Emulerat Behörighetssystem för Extensions i VS Code med hjälp av Abstrakta Syntaxträd

David, Åström January 2021 (has links)
Permission systems are a common security feature in browser extensions and mobile applications to limit their access to resources outside their own process. IDEs such as Visual Studio Code, however, have no such features implemented, and therefore leave extensions with full user permissions. This thesis explores how VS Code extensions access external resources and presents a proof-of-concept tool that emulates a permission system for extensions. This is done through static analysis of extension source code using abstract syntax trees, scanning for usage of Extension API methods and Node.js dependencies. The tool is evaluated and used on 56 popular VS Code extensions to evaluate what resources are most prevalently accessed and how. The study concludes that most extensions use minimal APIs, but often rely on Node.js libraries rather than the API for external functionality. This leads to the conclusion the inclusion of Node.js dependencies and npm packages is the largest hurdle to implementing a permission system for VS Code.
12

Verification de programmes avec pointeurs a l'aide de regions et de permissions.

Bardou, Romain 14 October 2011 (has links) (PDF)
La vérification déductive de programmes consiste à annoter des programmes par une spécification, c'est-à-dire un ensemble de formules logiques décrivant le comportement du programme, et à prouver que les programmes vérifient bien leur spécification. Des outils tels que la plate-forme Why prennent en entrée un programme et sa spécification et calculent des formules logiques telles que, si elles sont prouvées, le programme vérifie sa spécification. Ces formules logiques peuvent être prouvées automatiquement ou à l'aide d'assistants de preuve.Lorsqu'un programme est écrit dans un langage supportant les alias de pointeurs, c'est-à-dire si plusieurs variables peuvent désigner la même case mémoire, alors le raisonnement sur le programme devient particulièrement ardu. Il est nécessaire de spécifier quels pointeurs peuvent être égaux ou non. Les invariants des structures de données, en particulier, sont plus difficiles à vérifier.Cette thèse propose un système de type permettant de structurer la mémoire de façon modulaire afin de contrôler les alias de pointeurs et les invariants de données. Il est basé sur les notions de région et de permission. Les programmes sont ensuite interprétés vers Why de telle façon que les pointeurs soient séparés au mieux, facilitant ainsi le raisonnement. Cette thèse propose aussi un mécanisme d'inférence permettant d'alléger le travail d'annotation des opérations de régions introduites par le langage. Un modèle est introduit pour décrire la sémantique du langage et prouver sa sûreté. En particulier, il est prouvé que si le type d'un pointeur affirme que celui-ci vérifie son invariant, alors cet invariant est effectivement vérifié dans le modèle. Cette thèse a fait l'objet d'une implémentation sous la forme d'un outil nommé Capucine. Plusieurs exemples ont été écrits pour illustrer le langage, et ont été vérifié à l'aide de Capucine.
13

Analýza zaměstnávání cizinců v České republice / Analysis of Employing the Foreigners in the Czech Republic

Popová, Lenka January 2010 (has links)
The Master’s Thesis analyses the employing of the foreigners in the Czech republic. It focuses on the interposition of the job opportunities for the incoming foreign students at Brno University of Technology. It tries to find out the attitude of the foreigners to this theme and upon the analysis of the current situation it brings the suggestions for the extensions of the activities of the International Students Club with the view of improving the relationship between BUT and the foreign students.
14

Caractérisation et étude de l’impact des permissions dans les applications mobiles

Dbouba, Selsabil 12 1900 (has links)
No description available.
15

O equilíbrio econômico-financeiro dos contratos de concessão na Lei nº8.987/95

Godoy, Daniel Gabrilli de 18 November 2015 (has links)
Made available in DSpace on 2016-04-26T20:24:00Z (GMT). No. of bitstreams: 1 Daniel Gabrilli de Godoy.pdf: 1190229 bytes, checksum: dbead7a82bd3e9940ca7f9e4cd38f950 (MD5) Previous issue date: 2015-11-18 / The 1988 s Constitution reinvigorated the public services provision through private companies grants as a manner of improving the quality of service offered with no budget investment. As a consequence of this rising, Concession and Permission (law 8.987/95), the Public-Private Partnership (law 11.079/04) and the specific laws for certain areas, imposing relevant strategic points as conciliating the best service quality with the suitable tariff, assuring the proper profit to the concessionaire and public services contracts financial-economic protection. For all these important reasons, this study refers to the financial-economic equilibrium of concession contracts and its main factors like changes of public administrations services, economic and tributary alterations as well as the necessary evolution for long-term contractions and its non-balance compensation / A Constituição de 1988 revigorou o modelo de prestação de serviços públicos através de outorga às empresas privadas como forma de melhoria da qualidade em sua prestação sem a necessidade de investimentos orçamentários. Como resposta para a promoção destes serviços, a concessão e permissão (Lei nº8.987/95), a parceria público-privada (Lei nº11.079/04) e as leis específicas para determinados setores, impõem questões de importância estratégica, tais como, conciliar a melhor qualidade da prestação com a modicidade tarifária, garantir a remuneração adequada ao concessionário e a proteção da equação econômico-financeira dos contratos de serviço público. Diante desta importância, o presente estudo se dirige ao estudo do equilíbrio econômico-financeiro dos contratos de concessão comuns e seus principais elementos, entre elas, as mudanças na forma de prestação pela administração pública, as alterações no campo econômico e tributário, bem como a evolução necessária nas contratações de longo prazo e as formas pelas quais serão compensados os desequilíbrios decorrentes
16

Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen

Dahlberg, Daniel, Irmel, Tim, Forsström, Jacob January 2018 (has links)
The Android OS is ever growing on the global market, reaching more and more people. This have led to the distribution of millions of applications, that the Android user can interact with. However, the usage of Android apps is not risk free and there are various methods deployed by Google Play to protect the privacy of the Android owner. One of these protective measures are permissions. However, as permissions are controlled by the user, there is a need of comprehending the user behaviour and attitude to the permissions. Lack of understanding the importance, and of the permission itself, could present a real danger of privacy trespassing to the user. In this paper we evaluate the rate of attitude and behaviour by questionnaire and empirical quality-driven interviews. We compare and scrutinize our data with older studies. We identify factors contributing the failure to comply with permission warnings. Also, we find that there are connections between factors such as gender and age, for how the user behaviour and attitude conclude with permissions. In the end we present an exhaustive analysis and discussion to our results, ending with a conclusion that there are differences to be found from older studies and that there are connections in gender and age with how the user acts by permissions.
17

Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse / Does Application Permissions Matter? : A Quantitative Survey of Android Users Behaviour and Awareness

Jamil, Eva, Shirazi, Mazdak January 2017 (has links)
Problem - Android är det ledande operativsystemet på marknaden, samtidigt har tidigare forskning påvisat att skadlig kod och mobila attacker främst har riktats mot Androidenheter. Attacker utförs genom att applikationer som innehar skadlig kod, får den åtkomst på enheten som de begär genom att applikationsbehörigheter godkänns av användaren före installation av en applikation. Ett stort problem är att användarna i dagsläget väljer att ignorera behörigheterna före installation samt inte förstår dess betydelse. Frågeställning och syfte - Studien syftar till att undersöka tre frågeställningar. Den första forskningsfrågan behandlar hypoteser kring hur pass medvetna Androidanvändarna är om riskerna som finns hos tio applikationsbehörigheter vilket ofta förekommer bland skadliga applikationer. Vidare var målet med studien att undersöka om det finns ett samband mellan användarnas medvetenhet och nedladdningsbeteende. Den sista frågeställningen undersöker om användarna läser igenom applikationsbehörigheter före installation av en applikation och vilka bakgrundsorsaker det finns ifall de inte gör det. Metod - Kvantitativa metoder har använts i form av att det empiriska materialet inhämtats med hjälp av en enkätundersökning. I studien deltog 116 respondenter och resultatet togs fram med hjälp av stapeldiagram, korstabeller, Chi2-tester och frekvenstabeller. Resultat och slutsats - Målet har uppfyllts till hög grad, dock hade det varit gynnsamt att ha ett större urval för att möjligen kunna säkerställa samt stärka signifikansen i Chi2-testerna. Resultatet visade att en hög grad av användarna inte är medvetna om riskerna hos de undersökta behörigheterna. Vidare visade fynden att det finns ett visst samband mellan användarnas medvetenhet och nedladdningsbeteende då sex av tio hypoteser bekräftats. Resultatet visade även att 62 procent av användarna aldrig alternativt sällan läser igenom behörigheterna före installation, samt att orsaken till detta är att de inte förstår behörigheternas beskrivning alternativt inte lägger märke till behörigheterna. Slutligen påpekade respondenterna att de inte förstår behörigheternas beskrivning på grund av att de är för korta samt innehåller för många tekniska termer. Originalitet - Studiens resultat nyttjar främst Androidanvändarna för att öka deras kunskap vilket skyddar dem mot de risker som finns. Resultatet ger dock även nytta för vidare utveckling av applikationsbehörigheterna för att mer effektivt fungera som en varningsmetod vid nedladdning. Det som är nytt och värdefullt i studien är att vi baserat på problemen som påvisats hos tidigare forskning, valt att ytterligare fördjupa oss inom ämnet. Studien har undersökt om det finns ett samband mellan användarnas medvetenhet och nedladdningsbeteende, samt vilka bakgrundsorsaker det finns som medfört att användarna inte läser igenom samt inte förstår sig på applikationsbehörigheterna. Originalitet finns även i studien då vi avgränsat oss till att specifikt undersöka medvetenheten kring tio behörigheter som ofta förekommer bland skadliga applikationer, men som även uppkommer hos vanliga applikationer på Google Play. / Problem – Android is the leading operative system on the market, while previous studies have shown that malware and attacks have mostly been targeted at Android units. Attacks are executed when applications that consist malware gets access of the permissions they demand of the unit. This is by the approval of the user before an installation of an application. A problem is that many users ignores or don’t understand the permission they give applications access to. Purpose - The study aims to examine three issues. The first research question contains hypotheses about how aware Android users are of the risks which ten application permissions contain. These permissions often occurs among malicious applications but are also included among safe applications at Google Play. Furthermore, the objective of this study is to investigate whether there is a connection between the user awareness and their downloading behavior. The last issue examines whether users read through the application permissions before installing an application, and what possible reasons that causes them to not read the permissions. Methodology - Quantitative methods have been used by gathering the empirical material through a questionnaire. The study involved 116 respondents and the results were created by using bar graphs, crosstabs, Chi-square tests and frequency tables. Results and Conclusion - The goal has been met to a large extent, however, it would have been beneficial to have a larger selection to possibly be able to ensure and strengthen the significance of the Chi-square tests. The result showed that a high degree of users are not aware of the risks of the investigated permissions. Further findings showed that there is some connection between the user’s awareness and download behavior, since six out of ten hypotheses got confirmed. The results also showed that 62 percent of the users never alternatively rarely read permissions before installation. The reason for this is that they don’t understand the permissions associated description, alternatively don’t notice the permissions at all. Finally, the respondents indicated that they do not understand the description of the permissions because they are too short and have too many technical terms. Originality - The results of the study mainly benefits the Android users since it increases their knowledge which protects them against the risks. The result, however, also benefit the further development of the application permissions, to make them work more effectively as a warning method. What’s new and valuable in the study is that it’s based on the problems that was identified in previous research and we decided to further immerse ourselves in the subject. The study has investigated whether there is a connection between the user awareness and downloading behavior, as well as the background causes which makes the users ignore and don’t understand the permissions. Originality is also found in the study since we limited ourselves to specifically investigate ten permissions that often occur among malicious applications. The study is written in Swedish.
18

Procesní postupy v rámci územního a stavebního řízení / Process procedures in area management and construction management

Křivánková, Jana January 2008 (has links)
This diploma thesis is focused on issues of positioning, licensing and fruition of civil engineering projects. The aim of this work is to analyze these matters and create subsequently single consecutions facilitating orientation in the construction law for the employers. First the elemental terms of procedure modelling and methodology are introduced to reader to be used further in the text for illustration of the processes. Furthermore particular types of construction positioning, planning permissions and fruition of constructions are analyzed to demonstrate the progression and essential inputs for gaining the authorization within the required moves. In the final part particular procedures giving instructions for the employers which steps to make for realization of their construction plan are elaborated. All the procedures are derived from the types of positioning, permissions and fruition of constructions as in the text described. Short presentation as an operative manual for employers assigning constructions to particular procedures is added.
19

Návrh a nasazení systému řízení bezpečnosti informací ve výukovém středisku / Design and Deployment of Information Security Management System in Educational Center

Křížová, Romana January 2014 (has links)
This Master´s thesis is focused on the security of Educational center running a research aimed at chemical industry. In the first part the theoretical basis followed in the field are defined. The practical part is based on the security of a property considering the technical aspects as well as the suggestions of the trainings of managers and employees and sets respective permissions. A guide price calculation is also essential this project. The practical part evolves the existing analysis of the property.
20

Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download

Hopkins, Ashley R. 20 September 2019 (has links)
No description available.

Page generated in 0.0551 seconds