• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 479
  • 140
  • 115
  • 65
  • 58
  • 56
  • 51
  • 50
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Arbetstillfredsställelse hos personal inom tvångsvård, LVM

Sandén, Malin, Jonsson, Malin January 2010 (has links)
Hög arbetstillfredsställelse är viktigt för alla anställda, men förutsättningarna för detta varierar beroende på olika faktorer. Personal inom tvångsvård, LVM arbetar nära klienterna, vilket kan påverka personalens upplevda arbetstillfredsställelse. Undersökningens syfte var att undersöka vilka faktorer som påverkar arbetstillfredsställelse hos personal inom tvångsvård. En enkätstudie gjordes med frågeformuläret QPSNordic med 81 deltagare (40 män, 41 kvinnor) samt en intervjustudie med 8 personer (2 män, 6 kvinnor). Resultatet visade att personalen på den öppna avdelningen hade en signifikant högre generell arbetstillfredsställelse än personalen på de låsta avdelningarna, vilket antagligen beror på skillnader i rollförväntningar, men kanske även större personligt utrymme på den öppna avdelningen. Viktiga faktorer som framkom i intervjuerna om upplevelse av arbetstillfredsställelse var kollegor, stöd från chef samt kontakten med klienterna, vilket kan handla om att kommunikation är viktigt då tvångsvård kräver ett nära samarbete mellan samtliga parter. Området personal inom tvångsvård är relativt outforskat och behöver studeras ytterligare.
152

Architectural Support for Protecting Memory Integrity and Confidentiality

Shi, Weidong 10 May 2006 (has links)
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes certain cryptographic and security features integrated into the general purpose processor and computing platform to protect confidentiality and integrity of digital content stored in a computing system's memory. System designers can take advantages of the availability of the proposed security model to build future security systems such as systems with strong anti-reverse engineering capability, digital content protection system, or trusted computing system with strong tamper-proof protection. The thesis explores architecture level optimizations and design trade-offs for supporting high performance tamper-resistant memory model and micro-processor architecture. It expands the research of the previous studies on tamper-resistant processor design on several fronts. It offers some new architecture and design optimization techniques to further reduce the overhead of memory protection over the previous approaches documented in the literature. Those techniques include prediction based memory decryption and efficient memory integrity verification approaches. It compares different encryption modes applicable to memory protection and evaluates their pros and cons. In addition, the thesis tries to solve some of the security issues that have been largely ignored in the prior art. It presents a detailed investigation of how to integrate confidentiality protection and integrity protection into the out-of-order processor architecture both efficiently and securely. Furthermore, the thesis also expands the coverage of protection from single processor to multi-processor.
153

Secure Electronic Lottery Protocols

Chang, Chun-liang 25 July 2006 (has links)
Due to the mature of networks and communication technologies, electronic commerce is growing up rapidly and many advanced applications in electronic commerce are developed recently, such as on-line shopping, on-line bidding, and on-line gambling. There are numerous types of gambling like typical lottery, sport lottery, and poker gambling where our research will focus on the lottery games. Because of some special characteristics of the lottery games such as fairness and anonymity, it is hard to design a perfect electronic lottery protocol. The transaction mechanism in an electronic lottery protocol is an important issue since it will affect the benefits of customers if it is not fair or secure. The generating of random winning numbers in a lottery game has been discussed in many papers, but the fairness and anonymity for purchasing tickets and claiming the prizes are only discussed in few papers where these previous results cannot completely cope with the problems of fairness and anonymity. In the thesis, we will propose two electronic lottery protocols that can achieve the fairness and perfect anonymity simultaneously.
154

Subverting Linux on-the-fly using hardware virtualization technology

Athreya, Manoj B. 13 May 2010 (has links)
In this thesis, we address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of hardware, with little or no modification to the operating system. Both Intel and AMD have contributed to x86 full-virtualization through their respective instruction set architectures. Hardware virtualization extensions can be found in almost all x86 processors these days. Hardware virtualization technologies have opened a whole new frontier for a new kind of attack. A system hacker can abuse hardware virualization technology to gain control over an operating system on-the-fly (i.e., without a system restart) by installing a thin Virtual Machine Monitor (VMM) below the native operating system. Such a VMM based malware is termed a Hardware-Assisted Virtual Machine (HVM) rootkit. We discuss the technique used by a rootkit named Blue Pill to subvert the Windows Vista operating system by exploiting the AMD-V (codenamed "Pacifica") virtualization extensions. HVM rootkits do not hook any operating system code or data regions; hence detecting the existence of such malware using conventional techniques becomes extremely difficult. This thesis discusses existing methods to detect such rootkits and their inefficiencies. In this work, we implement a proof-of-concept HVM rootkit using Intel-VT hardware virtualization technology and also discuss how such an attack can be defended against by using an autonomic architecture called SHARK, which was proposed by Vikas et al., in MICRO 2008.
155

Are American communities becoming more secure? : evaluating the secure communities program

Villagran, José Guadalupe 09 November 2012 (has links)
This thesis examines the federal government’s progression in implementing the Secure Communities program. The Secure Communities program was initiated by the Department of Homeland Security (DHS) in 2008 as a pilot program in only fourteen jurisdictions nation-wide. As of the writing of this thesis, four years following the initiation of the program, S-Comm. has been implemented in over 1700 jurisdictions nation-wide and it is set to be implemented in all local jurisdictions nationally by the end of 2013 (Immigration and Customs Enforcement, 2012). Although local law enforcement agencies had long shared the fingerprints of those they arrested with the FBI, the FBI now forwards this information to the DHS through S-Comm. who then checks the fingerprints against the Automated Biometric Identification System known as IDENT—a fingerprint database containing information on over 91 million individuals, including travelers, applicants for immigration benefits, and immigrants who have previously violated immigration laws. ICE then supposedly reviews their records to see if the person arrested is deportable. If they believe they are, or want to further interrogate them, ICE will issue a detainer. The detainer is a request to the local police to inform federal immigration authorities when the arrestee will be released from custody and to hold the individual for up to two days for transfer to ICE (The Chief Justice, 2011). This process is considered to be the most advanced form of file sharing between local authorities and federal immigration authorities yet. The focus of this endeavor is to evaluate whether this program has been effective in doing as its title maintains. If this program is one that the American people, documented or not, have to endure then it is important that we ask: has Secure Communities made American communities safer? Recent data collected on the program, reports of mass opposition to the initiative by local law enforcement officials throughout the country, and numerous personal accounts of discriminatory harassment of mostly Spanish-speaking Americans by federal immigration agents and state and local law enforcement officials participating in Secure Communities collectively demonstrate that this program has failed in making American communities more secure. / text
156

Wide-sense fingerprinting codes and honeycomb arrays

Panoui, Anastasia January 2012 (has links)
No description available.
157

Securing the just-in-time delivery for the after-market : Study at Volvo car customer service

Allgurén, Olivia, Patama, Sanna January 2015 (has links)
The thesis has been performed at Volvo Car Customer Service in Gothenburg, Sweden. The output from the study will support Volvo to secure the Just-In-Time delivery of referrals for the after-market. The scope was limited to referrals from pre-planned orders, which occurs when there is no availability in the distribution centre where the orders were placed. Volvo's main warehouse in Europe is the Central Distribution Centre, which process referrals. The warehouse had an ongoing organisational change during this study. The concern was that the change would not lead to optimal conditions for processing referrals for different markets. It was therefore important to preserve the market knowledge in order to maintain a reliable referral service. A qualitative study was used and the information was gathered primarily through semi-structured interviews. Literature was studied both initially and continuously through the study. Analyse of the literature, current situation and data collection generated ideas for possible ways of securing the referral process and improvements. Benchmarking and Workshop was also performed in order to obtain further ideas. The result of this study was an information material containing information about all concerned markets, overview of referral flow and information regarding how the Central Distribution Centre needs to print referrals. The proposals suggested for future work were explained in long- and short-term. The short-term suggestions include use of the developed material in order to preserve the knowledge along with providing correct working conditions. For long-term suggestions focus has been on how to reduce or remove the printing problem. For future work Volvo Car Customer Service should consider these proposals in order to secure and improve the referral service.
158

Tillfälliga föräldrar : - En studie om familjehemsföräldrars resonemang kring placerade barns anknytning / Temporary parents : - A study of foster parents reasoning about attachment for children in foster care

Hart, Sara, Crnoja, Monika January 2014 (has links)
Studien har syftat till att få en förståelse för familjehemsföräldrars perspektiv på anknytning och vad de menar att det finns för svårigheter och möjligheter gällande anknytning för barn som placeras i familjehem. Studien berör även hur relationen mellan barn och familjehemsförälder förändras över tid och hur samspel mellan barn och familjehemsföräldrar, barn och de biologiska föräldrarna och barnets tidigare erfarenheter kan påverka anknytningen. Studien är kvalitativ och bygger på intervjuer med sex familjehemsföräldrar. Bowlbys anknytningsteori har använts för att analysera det empiriska materialet och studien har en hermeneutiskt ansats. Familjehemsföräldrarnas upplevelser tolkas som att barn kan skapa en trygg anknytning till dem och att de kan utgöra en trygg bas för placerade barn. Familjehemsföräldrarna menar att en trygg anknytning rör både yngre och äldre barn. Samspelet mellan familjehemsföräldrar, barn och de biologiska föräldrarna påverkar anknytningen och ibland uppstår situationer som är svåra att förhålla sig till för såväl familjehemsförälder, barn som de biologiska föräldrarna. Av familjehemsföräldrarnas resonemang framkommer att såväl barn som familjehemsförälder kan drabbas av separationsångest, vilket i sin tur påverkar anknytningens kvalitet. Barnets bakgrund och tidigare erfarenheter påverkar den anknytning som barnet skapar till sin familjehemsförälder. De uppföljningar som görs enligt socialtjänstlagen (SFS 2001:453), där socialnämnden minst var sjätte månad ska överväga om vården ska fortgå, menar familjehemsföräldrarna skapar svårigheter att knyta an till barnen fullt ut. Uppföljningarna skapar en oro för att separeras för både familjehemsföräldrar och de placerade barnen. / The aim of the study is to gain an understanding of foster parent's perspective on attachment and which opportunities and difficulties there is with the attachment for children in foster care. The study is also describes the way the relationship between the child and foster parent changes over time and how interaction between children and foster parents, child and the biological parents and the child's past experiences can influence the attachment. The study has a qualitative method and is based on interviews with six foster parents. Bowlby's attachment theory has been used to analyze the empirical material and the study has a hermeneutic approach. Foster parent’s experiences give us an understanding that children can create a secure attachment to them and that they can provide a safe base for the children. Foster parents believe that the secure attachment is the same for both younger and older children. The interaction between foster parents, child and the biological parent’s affects the attachment and sometimes situations arise that are difficult to relate to for foster parent, child and birth parents. It is found that children as well as the foster parents can suffer from separation anxiety, which can affect the quality of the attachment. The child’s background and past experiences affect the attachment that the child creates to the foster parent. The study also shows that the follow-ups that are induced by the Social Services Act (SFS 2001:453), every six months for the social services committee to consider whether the treatment should be continued, create difficulties for foster parents to fully attach to the child. It creates a fear of separation for both the foster parents and the children.
159

ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks

Alsharif, Nizar 07 1900 (has links)
Vehicular Ad hoc Network (VANET) is a promising emerging technology that enables road safety, traffic management, and passengers and drivers comfort applications. Many applications require multi-hop routing; position-based routing (PBR) is a well-recognized routing paradigm that performs well in the vehicular context to enable these applications. However, there are many security challenges and various routing attacks which may prevent the deployment of PBR protocols. In this study, we propose a novel security scheme called ESPR to secure PBR protocols in VANETs. ESPR considers both digital signature and keyed Hash Message Authentication Code (HMAC) to meet the unique requirements of PBR. In ESPR, all legitimate members share a secret key. ESPR scheme applies a novel probabilistic key distribution to allow unrevoked members to update the shared secret key. Furthermore, it defines a set of plausibility checks that enables network members to detect and avoid PBR attacks autonomously. By conducting security analysis and performance evaluation, ESPR scheme demonstrated to outperform its counterparts in terms of communication overhead and delay while achieving robust and secure operation.
160

Chaos synchronization and its application to secure communication

Zhang, Hongtao January 2010 (has links)
Chaos theory is well known as one of three revolutions in physical sciences in 20th-century, as one physicist called it: Relativity eliminated the Newtonian illusion of absolute space and time; quantum theory eliminated the Newtonian dream of a controllable measurable process; and chaos eliminates the Laplacian fantasy of deterministic predictability". Specially, when chaos synchronization was found in 1991, chaos theory becomes more and more attractive. Chaos has been widely applied to many scientific disciplines: mathematics, programming, microbiology, biology, computer science, economics, engineering, finance, philosophy, physics, politics, population dynamics, psychology, and robotics. One of most important engineering applications is secure communication because of the properties of random behaviours and sensitivity to initial conditions of chaos systems. Noise-like dynamical behaviours can be used to mask the original information in symmetric cryptography. Sensitivity to initial conditions and unpredictability make chaotic systems very suitable to construct one-way function in public-key cryptography. In chaos-based secure communication schemes, information signals are masked or modulated (encrypted) by chaotic signals at the transmitter and the resulting encrypted signals are sent to the corresponding receiver across a public channel (unsafe channel). Perfect chaos synchronization is usually expected to recover the original information signals. In other words, the recovery of the information signals requires the receiver's own copy of the chaotic signals which are synchronized with the transmitter ones. Thus, chaos synchronization is the key technique throughout this whole process. Due to the difficulties of generating and synchronizing chaotic systems and the limit of digital computer precision, there exist many challenges in chaos-based secure communication. In this thesis, we try to solve chaos generation and chaos synchronization problems. Starting from designing chaotic and hyperchaotic system by first-order delay differential equation, we present a family of novel cell attractors with multiple positive Lyapunov exponents. Compared with previously reported hyperchaos systems with complex mathematic structure (more than 3 dimensions), our system is relatively simple while its dynamical behaviours are very complicated. We present a systemic parameter control method to adjust the number of positive Lyapunov exponents, which is an index of chaos degree. Furthermore, we develop a delay feedback controller and apply it to Chen system to generate multi-scroll attractors. It can be generalized to Chua system, Lorenz system, Jerk equation, etc. Since chaos synchronization is the critical technique in chaos-based secure communication, we present corresponding impulsive synchronization criteria to guarantee that the receiver can generate the same chaotic signals at the receiver when time delay and uncertainty emerge in the transmission process. Aiming at the weakness of general impulsive synchronization scheme, i.e., there always exists an upper boundary to limit impulsive intervals during the synchronization process, we design a novel synchronization scheme, intermittent impulsive synchronization scheme (IISS). IISS can not only be flexibly applied to the scenario where the control window is restricted but also improve the security of chaos-based secure communication via reducing the control window width and decreasing the redundancy of synchronization signals. Finally, we propose chaos-based public-key cryptography algorithms which can be used to encrypt synchronization signals and guarantee their security across the public channel.

Page generated in 0.0457 seconds