• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 146
  • 37
  • 25
  • 24
  • 23
  • 12
  • 8
  • 8
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 350
  • 55
  • 42
  • 32
  • 27
  • 26
  • 23
  • 22
  • 22
  • 22
  • 19
  • 19
  • 18
  • 18
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Evaluating a publish/subscribe proxy for HTTP

Zhang, Yuanhui January 2013 (has links)
With the increasingly high speed of the Internet and its wide spread usage, the current Internet architecture exhibits some problems. The publish/subscribe paradigm has been developed to support one of the most common patterns of communication. It makes “information” the center of communication and removes the “location-identity split” (i.e., that objects are at specific locations to which you must communicate with to access the object). In this thesis project a publish/subscribe network is built and then used in the design, implementation, and evaluation of a publish/subscribe proxy for today’s HTTP based communication. By using this proxy users are able to use their existing web browser to send both HTTP requests and Publish/Subscribe Internet Routing Paradigm (PSIRP) requests. A publish/subscribe overlay is responsible for maintaining PSIRP contents. The proxy enables web browser clients to benefit from the publish/subscribe network, without requiring them to change their behavior or even be aware of the fact that the content that they want to access is being provided via the publish/subscribe overlay. The use of the overlay enables a user’s request to be satisfied by any copy of the content, potentially decreasing latency, reducing backbone network traffic, and reducing the load on the original content server. One of the aims of this thesis is to make more PSIRP content available, this is done by introducing a proxy who handles both HTTP and PSIRP requests, but having received content as a result of an HTTP response it publishes this data as PSIRP accessible content. The purpose is to foster the introduction and spread of content based access. / Med allt högre Internetshastighet och dess utbredda användning, uppvisar den aktuella Internet-arkitekturen vissa problem. Publicera / prenumerera paradigm har utvecklats för att stödja en av de vanligaste mönstren för kommunikation. Det gör att "information" blir centrum av kommunikation och tar bort "plats-identitet split" (dvs att objekten är på specifika platser som du måste kommunicera med för att komma åt objektet). i detta examensarbete byggs ett publicera / prenumerera nätverk och sedan används i utformningen, genomförandet, och utvärdering av en publicera / prenumerera proxy för dagens HTTP-baserad kommunikation. Genom att använda denna proxy kan användare kan använda sin befintliga webbläsare för att skicka både HTTP-förfrågningar och publicera / Prenumerera Internet Routing Paradigm (PSIRP) begäran. En publicera / prenumerera överlagring är ansvarig för att upprätthålla innehåll av PSIRP. Fullmakten gör det möjligt för klienter av webbläsare att dra nytta av publicera / prenumerera nätverket, utan att kräva dem att ändra sitt beteende eller ens vara medvetna om det faktum att det innehållet som de vill komma åt tillhandahålls via publicera / prenumerera överlägg. Användningen av överlägget kan en användare begäran som skall uppfyllas av en kopia av innehållet, eventuellt minskande latens, vilket minskar trafiken stamnät, och minska belastningen på det ursprungliga innehållet servern. Ett av syftena med denna uppsats är att göra mer PSIRP innehåll tillgängligt och detta görs genom att införa en proxy som hanterar både HTTP och PSIRP förfrågningar, men har fått innehåll som en följd av en HTTP-svar offentliggörs denna data som PSIRP tillgängligt innehåll. Syftet är att främja införandet och innehållbaserade åtkomsten.
32

Virtually@Home

Lindberg, Magnus, Nilsson, Anders January 2009 (has links)
With today's rapid development of technology and IT systems the demand for security and accessibility by both companies and individuals has increased. More and more people want access to their private files and services even when they are not at home. Geographical limitations can be a problem, and some such limitations have been deliberately added to a number of new services on the Internet, such as IPTV and other media services. Today it is neither safe nor appropriate to send sensitive information over public connections, such as the Internet. Because of this, several solutions including IPsec, SSL / TLS, and several other technologies have been developed and implemented. With these, you can create encrypted connections between two endpoints over an internet protocol. This implies in turn that you can access files and services just as you would have done if you actually been at home – you are “Virtually@home”. The report shows a solution to the problem of how to be virtually at home in a simple, cost-effective and safe manner by using a proxy server and a VPN. We review how each of the relevant technologies work and why we believe that this solution is an optimal solution to this problem. / Med dagens snabba utveckling av teknik och informationsteknologiska system har krav ställts på säkerhet och tillgänglighet hos både företag och privatpersoner. Fler och fler vill ha tillgång till sina privata filer och tjänster även när de inte är hemma. Geografiska begränsningar kan vara ett problem, och har medvetet lagts till på ett flertal nya tjänster på internet. såsom IPTV och andra mediaprodukter. Idag är det varken säkert eller lämpligt att skicka känslig information över publika anslutningar, såsom Internet. På grund av detta har ett flertal lösningar såsom IPsec, SSL/TLS, med flera andra tekniker utvecklas och implementerats. Med hjälp av dessa kan man skapa krypterade anslutningar mellan två ändpunkter genom att använda TCP/IP protokollet. Detta går sedan i sin tur att utnyttja för att komma åt filer och tjänster som man skulle gjort om man faktiskt varit hemma – du är Virtually@home. Rapporten visar hur man skapar en lösning till detta problem på ett enkelt, kostnadseffektivt och säkert sätt med hjälp av en proxy och ett VPN. Vi går igenom hur olika tekniker fungerar och varför vi anser att denna lösning är optimal för vårt syfte.
33

Identifying User Actions from Network Traffic

Rizothanasis, Georgios January 2015 (has links)
Identification of a user’s actions while browsing the Internet is mostly achieved by instrumentation of the user’s browser or by obtaining server logs. In both cases this requires installation of software on multiple clients and/or servers in order to obtain sufficient data. However, by using network traffic, access to user generated traffic from multiple clients to multiple servers is possible. In this project a proxy server is used for recording network traffic and a user-action identification algorithm is proposed. The proposed algorithm includes various policies of analyzing network traffic in order to identify user actions. This project also presents an evaluation framework for the proposed policies, based on which the tradeoff of the various policies is revealed. Proxy servers are widely deployed by numerous organizations and often used for web mining, so with the work of this project user action recognition can be a new tool when considering web traffic evaluation.
34

Munchausen by proxy syndrome : a comparative case study

Fallis, Mitchell Kent. January 2000 (has links)
No description available.
35

Ancient Maya Reservoirs and their Role in the Abandonment of Tikal, Guatemala: A Multi-Proxy Investigation of Solid Sediment Cores.

Tamberino, Anthony T. 18 October 2013 (has links)
No description available.
36

Improving the Performance of the world Wide Web over Wireless Networks

Fleming, Todd B. 04 November 1996 (has links)
The World Wide Web (WWW) has become the largest source of Internet traffic, but it was not designed for wireless networks. Documents with large inline images take a long time to fetch over low-bandwidth wireless networks. Radio signal dropouts cause file transfers to abort; users have to restart file transfers from the beginning. Dropouts also prevent access to documents that have not yet been visited by the user. All of these problems create user frustration and limit the utility of the WWW and wireless networks. In this work, a new Wireless World Wide Web (WWWW) proxy server and protocol were developed that address these problems. A client based on NCSA Mosaic connects to the proxy server using the new protocol, Multiple Hypertext Stream Protocol (MHSP). The proxy prefetches documents to the client, including inline images. The proxy also reduces the resolution of large bitmaps to improve performance over slow links. MHSP provides the ability to resume file transfers when the link has been broken then reestablished. The WWWW system was tested and evaluated by running script-controlled clients on different emulated network environments. This new system decreased document load time an average of 32 to 37 percent, depending on network configuration. / Master of Science
37

Characterizing Web Response Time

Liu, Binzhang M.S. 07 May 1998 (has links)
It is critical to understand WWW latency in order to design better HTTP protocols. In this study we characterize Web response time and examine the effects of proxy caching, network bandwidth, traffic load, persistent connections for a page, and periodicity. Based on studies with four workloads, we show that at least a quarter of the total elapsed time is spent on establishing TCP connections with HTTP/1.0. The distributions of connection time and elapsed time can be modeled using Pearson, Weibul, or Log-logistic distributions. We also characterize the effect of a user's network bandwidth on response time. Average connection time from a client via a 33.6 K modem is two times longer than that from a client via switched Ethernet. We estimate the elapsed time savings from using persistent connections for a page to vary from about a quarter to a half. Response times display strong daily and weekly patterns. This study finds that a proxy caching server is sensitive to traffic loads. Contrary to the typical thought about Web proxy caching, this study also finds that a single stand-alone squid proxy cache does not always reduce response time for our workloads. Implications of these results to future versions of the HTTP protocol and to Web application design also are discussed. / Master of Science
38

Proxy voting : Framtidens bolagsstyrning?

Fennö-Sandberg, Joakim, Andersson, Juha January 2008 (has links)
<p>Syfte: Studien har två huvudsakliga syften. Det första är att beskriva hur proxy voting sker i Sverige och i hur pass stor omfattning proxy voting förekommer. Det andra är att analysera proxy voting utifrån den teoretiska bild som finns om bolagsstyrning och ägande.</p><p>Metod: Vi intervjuade nyckelpersoner i proxy voting-processen och genomförde en enkätundersökning med företag på large cap-listan.</p><p>Slutsatser: Svensk bolagsstyrning är i förändring, ägare som visar upp ett nytt beteende. Det ställs krav på bättre informationssystem hos företag för att hantera proxy voting. Delade meningar om proxy voting som metod.</p>
39

Sertifikatų sistema GRID tinkle / Certificates system in GRID network

Vilijošius, Donatas 13 August 2010 (has links)
Tiek atskiro žmogaus, tiek ir šalies gyvenime saugumas – pamatinė vertybė, kuri yra neatsiejama bei labai svarbi ir šių dienų informacinių technologijų pasaulyje. Todėl, natūralu, kad informacijos saugumas tampa vis aktualesne problema. Organizacijose vykstančių procesų saugumui užtikrinti kuriami įvairūs saugumo įrankiai, kurie turi užtikrinti vartotojų ar paslaugų identiškumą (autentifikaciją), apsaugoti bendravimo vientisumą, privatumą, apibrėžti kam yra leidžiama kokius veiksmus vykdyti ir informacijos išteklius naudoti (autorizacija) ir kita. GRID sistemos suteikia galimybę naudotis WS (interneto paslaugų) pagrindu ir ne WS pagrindu paremta autentifikacija ir autorizacija GSI (GRID saugumo infrastuktūrai) užtikrinti. Abu metodai yra pagrįsti tokia pačia baze, t.y. paremti X.509 galinės esybės ir proxy sertifikatų standartu, kuris yra naudojamas identifikuojant pastovias esybes, tokias kaip vartotojai ir paslaugos, be to, leidžia priskirti laikinas privilegijas kitoms esybėms. Darbo tikslas – ištirti sertifikatų sistemą, šios sitemos komponentus, kurie yra diegiami į GRID sistemas bei pasiūlyti savo metodus ar modelius, kaip būtų galima pašalinti esamų sistemų saugumo trūkumus. Uždaviniai: 1. Išanalizuoti GRID saugumo infrastruktūros elementus ir suformuluoti egzistuojančias saugumo problemas. 2. Išanalizuoti suformuluotų problemų sprendimo būdus. 3. Remiantis problemų sprendimo būdais, suprojektuoti sertifikatų centro modelį ir proxy sertifikatų valdymo mechanizmą. 4... [toliau žr. visą tekstą] / Both in the persons and in the country's life security - the underlying value, which in these days is an integral and very important in information technology world. It is therefore natural that information security is becoming increasingly urgent problem. To ensure the safety of organizations processes the various security tools are being developed. They should ensure the identity of users or services (authentication), to protect communication integrity, privacy, to define who is allowed to carry out all activities and information resources to use (authorization) and the other. GRID system provides ability to use the WAS (Web Services) and non-WS based authentication and authorization to ensure the GSI (GRID Security infrastructure). Both methods are based on the same basis - X.509 end entity certificates and proxy certificates standard, which is used to identify end entities such as users and services, in addition, allows to assign privileges to other temporary end entities. The aim of the work – investigate a system of certificates, components of these system, which is introduced into GRID systems and to offer the methods or models how to eliminate security weaknesses in existing systems. The tasks: 1. To analyze the GRID security infrastructure elements and to formulate the existing safety problems. 2. To analyze formulated problem-solving techniques. 3. On the basis of problem-solving techniques to design certificate center model and proxy certificates management... [to full text]
40

Corporate Proxies

Anderson, Lyle A. 15 April 1961 (has links)
In this paper, I shall discuss the requirements of obtaining valid proxies under the various state laws and the regulations of the Securities and Exchange Commission. Because of the many state jurisdictions involved, it is not possible to define exactly the requirements of each. However, I shall follow the general practice and attempt to point out the significant variations therefrom. I shall also point out how several recent proxy contests were waged and make some recommendations for changes in SEC regulations and state laws to secure a greater voice for the independant stockholder.

Page generated in 0.1293 seconds