• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 4
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

INSERTION OF PRIVACY SERVICES IN PRIVACY ARCHITECTURE FOR WEB SERVICES (PAWS)

Bryn, Ajith Winston 20 March 2014 (has links)
Huge growth of the Internet is due to the large number of websites and web services through which information is easily accessible. E-commerce and e-services obtain much private data from users for various reasons such as advertising, marketing, etc. Collection, storage, and usage of private data are subject to various standards, privacy laws, and regulations. To adhere to these legal requirements, many privacy services, such as secure data transmission, authentication, notice, and consent, are required. Inclusion of these required privacy services early in the life cycle of the software development is preferred and advocated, but not fully adhered to. Inclusion of privacy services in legacy software and currently developed software is required. We describe software architecture and a system for automatic inclusion of privacy services, under the supervision of privacy expert, into web pages after the development phase of the Software Development Life Cycle. This will help organizations to adhere to standards, privacy laws, and regulations when collecting private data online from its clients. We also describe a prototype that we have developed as a proof-of-concept to demonstrate the feasibility of our approach.
2

Způsoby využívání anonymizační sítě Tor / Ways of using Tor anonymous network

Schamberger, Pavel January 2017 (has links)
This diploma thesis deals with ways of using Tor anonymization network both from the point of view of the use in the positive sense and the use in the negative sense, the abuse. The aim of this work is to identify different ways of using the network and to quantify network abuse based on analyzed abuse reports. First, the basic concepts are defined and the development of the Internet and identification technologies in its environment are briefly described. Then, the concept of Onion routing, based on which the Tor network works, together with more technical details about the functioning of the network, is introduced. Last but not least, the Tor Browser is described as the most common tool for using the Tor network along with the types of users who use it. The last chapter of the theoretical part introduces the problem of network abuse. The practical part is primarily solved in the form of a quantitative analysis of abuse, due to their volume of almost 3 million. Quantitative analysis is done using the statistical language R and basic mining data, text mining and statistical methods. The analyzed data are related to several large nodes of the Tor network and contains several years of history. Although the total number of complaints increases almost exponentially over time, complaints about malicious...
3

Privacidade de localização geográfica em consultas a serviços públicos Web de localização: uma abordagem baseada em médias aleatórias

Vieira, Rick Ardo Debiazze Nunes 18 August 2010 (has links)
Made available in DSpace on 2016-12-23T14:33:42Z (GMT). No. of bitstreams: 1 Dissertacao de Rickardo Bebiazze N Vieira.pdf: 1392353 bytes, checksum: 366b2c9211d12eb4c61b77094f0d2ecd (MD5) Previous issue date: 2010-08-18 / The increasing demand for Location-Based Services (LBSs) has increased the need for solutions that consider the privacy of queries in public LBSs. The currently proposed approaches rely mainly on the construction of an anonymizing spatial region (ASR) based on a rectangle containing a user consultant and at least other K−1 users, thereby setting a K level of anonymity for the query performed. In parallel, P2P infrastructures have been designed to bear the burden of mobility that has characterized much of LBSs users, given the remarkable technological advance that provided the availability of modern resources (such as processing of the GPS signal) on portable devices, such as smartphones. However, the answers obtained from LBSs, considering the context of research conducted, is limited to the indication of points of interest near the consultant user s location, not being able to indicate a route to the destination indicated. This paper aims at presenting the proposal AnoniMobi, whose main objective is to provide routes to points of interest in response to anonymous queries made to public LBSs, ensuring the privacy level requested by the consultant user. The approach separates itself from traditional proposals for formation of spatial region anonymization (ASR) when considering the use of points (random means) that allow you to group coordinates in a non-deterministic way. Additionally, an infrastructure based on CAN P2P architecture is designed to support self-organization needed for structuring and grouping users of the system / A crescente demanda por Serviços Baseados em Localização (SBLs) tem despertado a necessidade de soluções que considerem a privacidade das consultas efetuadas a SBLs públicos. As abordagens atualmente propostas apoiam-se, principalmente, na construção de uma região espacial de anonimização (ASR) baseada em um retângulo que contenha o usuário consultante e, pelo menos, outros K −1 usuários, estabelecendo, assim, um nível K de anonimidade para a consulta realizada. Paralelamente, infraestruturas P2P têm sido elaboradas para suportar a carga de mobilidade que vem caracterizando boa parte dos usuários de SBLs, haja vista o notável avançado tecnológico que proporcionou a disponibilização de modernos recursos (como capacidade de processamento do sinal GPS) em aparelhos portáteis, tais como os smartphones. Contudo, as respostas obtidas dos SBLs, considerado o contexto das pesquisas realizadas, limitam-se à indicação dos pontos de interesse mais próximos da localização do usuário consultante, não sendo capazes de indicar uma rota para o destino apontado. O presente trabalho visa apresentar a proposta AnoniMobi, cujo objetivo principal é fornecer rotas para pontos de interesse como resposta a consultas anônimas efetuadas a SBLs públicos, garantindo o nível de privacidade requerido pelo usuário consultante. A abordagem desenvolvida desvincula-se de propostas tradicionais para formação de região espacial de anonimização (ASR) ao considerar o uso de pontos (médias aleatórias) que permitem agrupar coordenadas de modo não-determinístico. Adicionalmente, uma infraestrutura P2P baseada na arquitetura CAN é elaborada como suporte à auto-organização necessária para estruturar e agrupar os usuários do sistema
4

The Shifting Web of Trust : Exploring the Transformative Journey of Certificate Chains in Prominent Domains / Förtroendets Föränderliga Väv : Att Utforska den Transformativa Resan av Certifikatkedjor av Populära Domäner

Döberl, Marcus, Freiherr von Wangenheim, York January 2023 (has links)
The security and integrity of TLS certificates are essential for ensuring secure transmission over the internet and protecting millions of people from man-in-the-middle attacks. Certificate Authorities (CA) play a crucial role in issuing and managing thesecertificates. This bachelor thesis presents a longitudinal analysis of certificate chains forpopular domains, examining their evolution over time and across different categories. Using publicly available certificate data from sources such as crt.sh and censys.io, we createda longitudinal dataset of certificate chains for domains from the Top 1-M list of Tranco.We categorized the certificates based on their type, and the particular service categories.We analyzed a selected set of domains over time and identified the patterns and trendsthat emerged in their certificate chains. Our analysis revealed several noteworthy trends,including an increase in the use of new CAs and a shift of which types of certificates areused, we also found a trend in shorter certificate chains and fewer paths from domain toroot certificate. This implies a more streamlined and simplified certificate process overtime until today. Our findings have implications for the broader cybersecurity communityand demonstrate the importance of ongoing monitoring and analysis of certificate chainsfor popular domains.

Page generated in 0.1128 seconds