• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 143
  • 37
  • 25
  • 24
  • 23
  • 12
  • 8
  • 8
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 347
  • 55
  • 41
  • 31
  • 27
  • 26
  • 23
  • 22
  • 22
  • 22
  • 19
  • 19
  • 18
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Virtually@Home

Lindberg, Magnus, Nilsson, Anders January 2009 (has links)
With today's rapid development of technology and IT systems the demand for security and accessibility by both companies and individuals has increased. More and more people want access to their private files and services even when they are not at home. Geographical limitations can be a problem, and some such limitations have been deliberately added to a number of new services on the Internet, such as IPTV and other media services. Today it is neither safe nor appropriate to send sensitive information over public connections, such as the Internet. Because of this, several solutions including IPsec, SSL / TLS, and several other technologies have been developed and implemented. With these, you can create encrypted connections between two endpoints over an internet protocol. This implies in turn that you can access files and services just as you would have done if you actually been at home – you are “Virtually@home”. The report shows a solution to the problem of how to be virtually at home in a simple, cost-effective and safe manner by using a proxy server and a VPN. We review how each of the relevant technologies work and why we believe that this solution is an optimal solution to this problem. / Med dagens snabba utveckling av teknik och informationsteknologiska system har krav ställts på säkerhet och tillgänglighet hos både företag och privatpersoner. Fler och fler vill ha tillgång till sina privata filer och tjänster även när de inte är hemma. Geografiska begränsningar kan vara ett problem, och har medvetet lagts till på ett flertal nya tjänster på internet. såsom IPTV och andra mediaprodukter. Idag är det varken säkert eller lämpligt att skicka känslig information över publika anslutningar, såsom Internet. På grund av detta har ett flertal lösningar såsom IPsec, SSL/TLS, med flera andra tekniker utvecklas och implementerats. Med hjälp av dessa kan man skapa krypterade anslutningar mellan två ändpunkter genom att använda TCP/IP protokollet. Detta går sedan i sin tur att utnyttja för att komma åt filer och tjänster som man skulle gjort om man faktiskt varit hemma – du är Virtually@home. Rapporten visar hur man skapar en lösning till detta problem på ett enkelt, kostnadseffektivt och säkert sätt med hjälp av en proxy och ett VPN. Vi går igenom hur olika tekniker fungerar och varför vi anser att denna lösning är optimal för vårt syfte.
32

Identifying User Actions from Network Traffic

Rizothanasis, Georgios January 2015 (has links)
Identification of a user’s actions while browsing the Internet is mostly achieved by instrumentation of the user’s browser or by obtaining server logs. In both cases this requires installation of software on multiple clients and/or servers in order to obtain sufficient data. However, by using network traffic, access to user generated traffic from multiple clients to multiple servers is possible. In this project a proxy server is used for recording network traffic and a user-action identification algorithm is proposed. The proposed algorithm includes various policies of analyzing network traffic in order to identify user actions. This project also presents an evaluation framework for the proposed policies, based on which the tradeoff of the various policies is revealed. Proxy servers are widely deployed by numerous organizations and often used for web mining, so with the work of this project user action recognition can be a new tool when considering web traffic evaluation.
33

Munchausen by proxy syndrome : a comparative case study

Fallis, Mitchell Kent. January 2000 (has links)
No description available.
34

Ancient Maya Reservoirs and their Role in the Abandonment of Tikal, Guatemala: A Multi-Proxy Investigation of Solid Sediment Cores.

Tamberino, Anthony T. 18 October 2013 (has links)
No description available.
35

Improving the Performance of the world Wide Web over Wireless Networks

Fleming, Todd B. 04 November 1996 (has links)
The World Wide Web (WWW) has become the largest source of Internet traffic, but it was not designed for wireless networks. Documents with large inline images take a long time to fetch over low-bandwidth wireless networks. Radio signal dropouts cause file transfers to abort; users have to restart file transfers from the beginning. Dropouts also prevent access to documents that have not yet been visited by the user. All of these problems create user frustration and limit the utility of the WWW and wireless networks. In this work, a new Wireless World Wide Web (WWWW) proxy server and protocol were developed that address these problems. A client based on NCSA Mosaic connects to the proxy server using the new protocol, Multiple Hypertext Stream Protocol (MHSP). The proxy prefetches documents to the client, including inline images. The proxy also reduces the resolution of large bitmaps to improve performance over slow links. MHSP provides the ability to resume file transfers when the link has been broken then reestablished. The WWWW system was tested and evaluated by running script-controlled clients on different emulated network environments. This new system decreased document load time an average of 32 to 37 percent, depending on network configuration. / Master of Science
36

Characterizing Web Response Time

Liu, Binzhang M.S. 07 May 1998 (has links)
It is critical to understand WWW latency in order to design better HTTP protocols. In this study we characterize Web response time and examine the effects of proxy caching, network bandwidth, traffic load, persistent connections for a page, and periodicity. Based on studies with four workloads, we show that at least a quarter of the total elapsed time is spent on establishing TCP connections with HTTP/1.0. The distributions of connection time and elapsed time can be modeled using Pearson, Weibul, or Log-logistic distributions. We also characterize the effect of a user's network bandwidth on response time. Average connection time from a client via a 33.6 K modem is two times longer than that from a client via switched Ethernet. We estimate the elapsed time savings from using persistent connections for a page to vary from about a quarter to a half. Response times display strong daily and weekly patterns. This study finds that a proxy caching server is sensitive to traffic loads. Contrary to the typical thought about Web proxy caching, this study also finds that a single stand-alone squid proxy cache does not always reduce response time for our workloads. Implications of these results to future versions of the HTTP protocol and to Web application design also are discussed. / Master of Science
37

Proxy voting : Framtidens bolagsstyrning?

Fennö-Sandberg, Joakim, Andersson, Juha January 2008 (has links)
<p>Syfte: Studien har två huvudsakliga syften. Det första är att beskriva hur proxy voting sker i Sverige och i hur pass stor omfattning proxy voting förekommer. Det andra är att analysera proxy voting utifrån den teoretiska bild som finns om bolagsstyrning och ägande.</p><p>Metod: Vi intervjuade nyckelpersoner i proxy voting-processen och genomförde en enkätundersökning med företag på large cap-listan.</p><p>Slutsatser: Svensk bolagsstyrning är i förändring, ägare som visar upp ett nytt beteende. Det ställs krav på bättre informationssystem hos företag för att hantera proxy voting. Delade meningar om proxy voting som metod.</p>
38

Sertifikatų sistema GRID tinkle / Certificates system in GRID network

Vilijošius, Donatas 13 August 2010 (has links)
Tiek atskiro žmogaus, tiek ir šalies gyvenime saugumas – pamatinė vertybė, kuri yra neatsiejama bei labai svarbi ir šių dienų informacinių technologijų pasaulyje. Todėl, natūralu, kad informacijos saugumas tampa vis aktualesne problema. Organizacijose vykstančių procesų saugumui užtikrinti kuriami įvairūs saugumo įrankiai, kurie turi užtikrinti vartotojų ar paslaugų identiškumą (autentifikaciją), apsaugoti bendravimo vientisumą, privatumą, apibrėžti kam yra leidžiama kokius veiksmus vykdyti ir informacijos išteklius naudoti (autorizacija) ir kita. GRID sistemos suteikia galimybę naudotis WS (interneto paslaugų) pagrindu ir ne WS pagrindu paremta autentifikacija ir autorizacija GSI (GRID saugumo infrastuktūrai) užtikrinti. Abu metodai yra pagrįsti tokia pačia baze, t.y. paremti X.509 galinės esybės ir proxy sertifikatų standartu, kuris yra naudojamas identifikuojant pastovias esybes, tokias kaip vartotojai ir paslaugos, be to, leidžia priskirti laikinas privilegijas kitoms esybėms. Darbo tikslas – ištirti sertifikatų sistemą, šios sitemos komponentus, kurie yra diegiami į GRID sistemas bei pasiūlyti savo metodus ar modelius, kaip būtų galima pašalinti esamų sistemų saugumo trūkumus. Uždaviniai: 1. Išanalizuoti GRID saugumo infrastruktūros elementus ir suformuluoti egzistuojančias saugumo problemas. 2. Išanalizuoti suformuluotų problemų sprendimo būdus. 3. Remiantis problemų sprendimo būdais, suprojektuoti sertifikatų centro modelį ir proxy sertifikatų valdymo mechanizmą. 4... [toliau žr. visą tekstą] / Both in the persons and in the country's life security - the underlying value, which in these days is an integral and very important in information technology world. It is therefore natural that information security is becoming increasingly urgent problem. To ensure the safety of organizations processes the various security tools are being developed. They should ensure the identity of users or services (authentication), to protect communication integrity, privacy, to define who is allowed to carry out all activities and information resources to use (authorization) and the other. GRID system provides ability to use the WAS (Web Services) and non-WS based authentication and authorization to ensure the GSI (GRID Security infrastructure). Both methods are based on the same basis - X.509 end entity certificates and proxy certificates standard, which is used to identify end entities such as users and services, in addition, allows to assign privileges to other temporary end entities. The aim of the work – investigate a system of certificates, components of these system, which is introduced into GRID systems and to offer the methods or models how to eliminate security weaknesses in existing systems. The tasks: 1. To analyze the GRID security infrastructure elements and to formulate the existing safety problems. 2. To analyze formulated problem-solving techniques. 3. On the basis of problem-solving techniques to design certificate center model and proxy certificates management... [to full text]
39

Corporate Proxies

Anderson, Lyle A. 15 April 1961 (has links)
In this paper, I shall discuss the requirements of obtaining valid proxies under the various state laws and the regulations of the Securities and Exchange Commission. Because of the many state jurisdictions involved, it is not possible to define exactly the requirements of each. However, I shall follow the general practice and attempt to point out the significant variations therefrom. I shall also point out how several recent proxy contests were waged and make some recommendations for changes in SEC regulations and state laws to secure a greater voice for the independant stockholder.
40

Proposta de desenvolvimento de um agente Proxy SNMP para gerenciamento de redes LonWorks. / Proposal for development an agent Proxy SNMP for LonWorks network management.

Chermont, Marlon Gripp 29 March 2007 (has links)
Com o crescimento da utilização das redes de computadores e também o aumento da utilização das redes de dispositivos para a automação, torna-se cada vez mais atrativo se pensar em uma solução que integre essas tecnologias. Em cada uma das áreas se observa um aumento da utilização da tecnologia LonWorks em redes distribuídas de dispositivos, e a consolidação do Simple Network Management Protocol (SNMP) como um protocolo padrão para o gerenciamento das redes de computadores. Neste trabalho foi desenvolvido um agente proxy SNMP, capaz de auxiliar no gerenciamento de uma rede de automação baseada na tecnologia LonWorks através do uso de ferramentas já disponíveis no mercado para a realização do gerenciamento das redes de computadores. Esse tipo de solução possibilita que uma mesma equipe possa gerenciar as duas estruturas de rede, através de um mesmo sistema, facilitando a interação entre os dispositivos e reduzindo o custo atrelado à manutenção das equipes. O agente foi desenvolvido através da utilização de uma Application Programming Interface (API), que implementa toda a estrutura de comunicação SNMP; e para realizar o gerenciamento foi criada uma Management Information Base (MIB), com algumas informações de diagnóstico do dispositivo. / With the growth of the computer networks use and also the increase of devices network for the automation use, becomes each more attractive think about a solution that integrates these technologies. In each one of those areas it observes, an increase of the LonWorks technology use in distributed networks of devices, and the consolidation of the Simple Network Management Protocol (SNMP) as a protocol standard for the management of the computer networks. In this work was developed a proxy agent SNMP, capable to assist the management of control network, based on the LonWorks technology, through the available tools use already in the market for the accomplishment of the computer networks management. This solution type makes possible that same team can manage two network structures, through the same system, facilitating the interaction between the devices and reducing maintenance teams cost. The agent was developed through of an Application Programming Interface (API) use, that implements all the communication structure SNMP; and to achieve the management was created a Management Information Base (MIB), with some information of devices diagnosis.

Page generated in 0.0329 seconds