Spelling suggestions: "subject:"secure"" "subject:"recure""
431 |
Die belangrikheid van die gesin in gemeentelike bedieningStrydom, Zagarias Richard Andries 01 January 2002 (has links)
Text in Afrikaans / Skrywers oar die gesin kom al hoe meer tot die slotsom dat die gesin onvervangbaar is in die sosialiseringsproses van die mens. Die gesin is noodsaaklik vir die modeme mens se soeke na vastigheid, geborgenheid en identiteit. Die oorspronklike verhouding tussen ouer en kind binne die kerngesin is onvervangbaar. Die vraag wat in die studie aan die orde kom is of die modeme gesin wel so 'n belangrike plek inneem in die huidige samelewing. Is die gevolg van al die probleme waarmee die moderne gesin le kampe het en die wisselvallige wereld waarin ons lewe nie juis dat die gesin se plek as veilige hawe al hoe meer bedreig word nie? Daar
moet altyd in die bediening aan die gesin onthou word dat die gesin 'n ontwikkelende sisteem is. Daar moet veral by die behoeftes in die verskillende lewensfases aangesluit word. ln God se handeling met. die mens vind ons dat daar 'n baie noue verband is tussen die gesin en die
verbond. Soos tewens die hele gemeente, is die gesin ook "'n koninklike priesterdom . .. . . . die eiendomsvolk van God". (1 Pet. 2:9)
Die kerk staan voor die wonderlike uitdaging om in die tyd waar daar 'n besondere behoefte aan sosiale verhoudings bestaan, die behoefte te vul met iets wat God self gee, iets wat veel grater as sosiale vriendskap is... . . . koinonia! Des te meer die kerk se invloedsfeer in die
samelewing krimp en mense nie meer aktief by die instituut inskakel nie, des te belangriker word die gesin. In die gesekulariseerde samelewing word die gesin die konkrete kontakpunt waarmee die kerk op die plaaslike vlak sy invloedsfeer binne mense se daaglikse leefmilieu kan laat geld.
Die studie vra vir 'n andersoortige bediening waarin die behoeftes van die gesin aangespreek word en waar die gesin primer die fokus is. Dit moet 'n bediening aan die gesin en 'n bediening deur die gesin wees. Die gemeente moet gesinne leer en aan hulle demonstreer wat God se doe! met die gesin is.
Die kerk is by uitstek in die posisie om die wye verskeidenheid van gesinstipes in die samelewing te kan bedien. Die kerk kan ook gesinne help om aanpassings te maak in 'n veranderende samelewing. 'n Gesinsbediening kan 'n uitstekende nuwe fokus word vir die missie van die kerk. / Researches on the family came to the conclusion that the family is irreplaceable in the socialising process of a person. The family is necessary for the modern persons need for stability, security and identity. The original relationship between a parent and child in the family is irreplaceable. The question which arises in this study is whether the modern family is so important in the current society. Is the result of all the problems which the family faces and the changeable world not that the family as secure harbour is in danger? In the ministry it must always be borne in mind that the family is a developing system. Special attention must be paid so that all the different phases of life are included. In God's involvement with man, we find that there is a very close relationship between the family and the sacrament. As is the entire church, so is the family " ...... priests of the King, ..... God's own people" (1 Pet. 2:19).
In a time where there is an exceptional need for social relationships, the church is faced with a great challenge to fill this need with something that is from God, something far more fulfilling than social friendships .... Kononia. The further the churche's influence declines in a society and people withdraw from involvement within the institution, the more important the family becomes. In a secularized society the family becomes the concrete point of contact through which the church can, at local level, use its influence within peoples daily life environment.
This study calls for another type of ministry in wt)ich the needs of the family can be addressed and where the family becomes the primary focus.· It must b~ a ministry to the family and through the family. The congregation must educate families as well as demonstrate God's purpose with the family.
The church is pre-eminently in a position to serve the various types of families in society. The church is also able to help families to make adjustments in a changing society. A family ministry can become an excellent new point of focus for the mission of the church. / Philosophy, Practical and Systematic Theology / D.Th. (Practical Theolgy)
|
432 |
Parental guidelines regarding the emotional needs of primary school children diagnosed with ADHDCoetzee, Jacoba Martina 30 November 2006 (has links)
The aim of this study was to create awareness of the emotional needs of children diagnosed with ADHD. In order to reach the aim of this study, an initial literature study was executed to describe ADHD and the emotional needs of children. Semi-structured interviews and two projective techniques were used to conduct the empirical study. Valuable data was also collected from the biographical questionnaires completed by the parents. Based on the data collected and analysed, findings were made which were verified by means of a second literature study. This was followed by conclusions which served as the basis for recommendations that were made in the form of guidelines to the parents, with the aim to make the parents aware of the emotional needs of their children diagnosed with ADHD. These guidelines will be made available to the parents at a seminar that will be held on acceptance of this research. / Social Work / M.Diac. (Play Therapy)
|
433 |
M-CODE: um modelo para medição de confidencialidade e desempenho para aplicações móveis seguras / M-CODE: A model for measurement of confidentiality and reliable performance for mobile applicationsCarvalho, Aglaíse Frota Moura January 2008 (has links)
CARVALHO, Aglaíse Frota Moura. M-CODE: um modelo para medição de confidencialidade e desempenho para aplicações móveis seguras. 2008. 93 f. : Dissertação (mestrado) - Universidade Federal do Ceará, Centro de Ciências, Departamento de Computação, Fortaleza-CE, 2008. / Submitted by guaracy araujo (guaraa3355@gmail.com) on 2016-05-19T18:22:47Z
No. of bitstreams: 1
2008_dis_afmcarvalho.pdf: 2003286 bytes, checksum: f365e03fcaf252f6fbc64b60e12f01cc (MD5) / Approved for entry into archive by guaracy araujo (guaraa3355@gmail.com) on 2016-05-19T18:23:52Z (GMT) No. of bitstreams: 1
2008_dis_afmcarvalho.pdf: 2003286 bytes, checksum: f365e03fcaf252f6fbc64b60e12f01cc (MD5) / Made available in DSpace on 2016-05-19T18:23:52Z (GMT). No. of bitstreams: 1
2008_dis_afmcarvalho.pdf: 2003286 bytes, checksum: f365e03fcaf252f6fbc64b60e12f01cc (MD5)
Previous issue date: 2008 / Mobile devices have resource restrictions that constrain the use of security mechanisms in applications, such as e-commerce, which demand, for example, confidentiality issues. There is then a need for a mechanism to help developers to choose the appropriate solution that provides security for a specific mobile device application, taking in consideration the limitation of performance, memory and battery, among others. Thus, this work proposes a security measurement model focused on confidentiality and performance for mobile applications. This model is defined in conformance with the cryptographic algorithm and/or protocol more adequate to the mobile application. Confidentiality and performance degrees are calculated according to the proposed model measurements and weights defined by the secure mobile application developer. . The following measurement approaches are used to specify the proposal: Goal-Question-Metric (GQM) and Goal-Driven Software Measurement (GDSM), variations of these approaches, and the Security Measurement (SM) framework. As a case study, a mobile application already existent is used for the analysis and calculation of the confidentiality and performance degrees of chosen algorithms and protocols / Os dispositivos móveis têm limitações de recursos que restringem o uso de mecanismos de segurança em aplicações, tais como comércio eletrônico, as quais exigem, por exemplo, o requisito de confidencialidade. Como é indispensável a implementação de mecanismos de segurança nesse tipo de aplicações, é fundamental auxiliar os desenvolvedores na escolha de um mecanismo que respeite limitações, por exemplo, de desempenho, memória e bateria, dos dispositivos móveis. Esta dissertação propõe então um modelo para medir o grau de confidencialidade e de desempenho necessários para determinadas aplicações que irão executar em dispositivos móveis. A fim de escolher o algoritmo criptográfico e/ou o protocolo mais adequado a uma aplicação móvel específica, os cálculos da confidencialidade e desempenho são realizados através de medidas já definidas no modelo e de pesos definidos pelo desenvolvedor, de acordo com a relevância de cada medida para aplicação. Para especificar a proposta, as abordagens de Goal-Question-Metric (GQM), Goal-Driven Software Measurement (GDSM), variações destas abordagens e o Security Measurement (SM) framework são utilizados. Em seguida, para validar o modelo, é utilizada uma aplicação móvel segura já existente como estudo de caso, sendo feita a análise e cálculo dos graus de confidencialidade e desempenho de algoritmos e protocolos
|
434 |
Modélisation de la sécurisation d’accès aux réseaux par la technique de cryptographie asymétrique en utilisant la reconnaissance de l’iris et la technologie des agents / Modeling security for network access through asymmetric cryptography using iris recognition and agent technologyEl Khoury, Franjieh 18 December 2009 (has links)
La croissance exponentielle dans l’utilisation du réseau Internet ainsi que l’apparition de nouveaux types d’applications ont augmenté les contraintes du réseau en termes de sécurité. Depuis quelques années, les techniques biométriques ont prouvé une grande précision et fiabilité et ont été utilisées dans plusieurs domaines afin de sécuriser l’accès à différentes ressources. Des solutions intégrant des agents et des systèmes multi-agents (SMA) ont aussi prouvé leur efficacité pour la résolution de nombreux problèmes dans les réeaux. Nous proposons un modèle « IrisCrptoAgentSystem » (ICAS) basé sur la méthode biométrique pour l’authentification utilisant l’iris de l’œil et la méthode de cryptographie asymétrique utilisant l’algorithme « Rivest-Shamir-Adleman » (RSA), et en intégrant des agents. Ce modèle doit assurer un accès sécurisé aux informations et garantir la protection des informations confidentielles. Notre travail porte sur la mise en place de nouvelles méthodes dans le modèle d’authentification biométrique afin de donner plus d’efficacité à notre modèle ICAS. Nous introduisons des aspects prétopologiques dans l’élaboration de la hiérarchie indexée pour classer les gabarits DHVA. Notre approche consiste à améliorer les méthodes relatives à la localisation des contours externe et interne de l’iris. / The exponential growth in the use of the Internet as well as the emergence of new types of applications has increased the network’s constraints in terms f security. Fort the last several years, biometric techniques have proven their applicability and reliability in providing secure access to shared resources in different domains. Furthermore, software agents and multi-agent systems (MAS) have evidently been efficient in resolving several problems in network. Therefore, the aim of this research is to propose a model “IrisCryptoAgentSystem” (ICAS) that is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using “Rivest-Shamir-Adleman” (RSA) in an agent-based architecture. This model should provide secure access to information and ensure the protection of confidential information. Therefore, our work focuses on the development of new methods in biometric autheitcation in order to provide greater efficiency in the ICAS model. We introduce pretopological aspects in the development of the indexed hierarchy to classify DHVA templates. Our approach aims to improve the existing methods for the localization of the external and the internal edges of the iris.
|
435 |
Vers un environnement logiciel générique et ouvert pour le développement d'applications NFC sécurisées / Towards a generic and open software environment for the development of Secure NFC applicationsLesas, Anne-Marie 14 September 2017 (has links)
Dans le domaine des transactions et du paiement électronique avec une carte à puce, le standard de communication en champ proche « Near Field Communication » (NFC) s’est imposé comme la technologie des transactions sans contact mobiles sécurisées pour le paiement, le contrôle d’accès, ou l’authentification. Les services sans contact mobiles sécurisés sont basés sur le mode émulation de carte du standard NFC qui implique une composante matérielle à accès restreint de type carte à puce appelée « Secure Element » (SE) dans laquelle sont stockées les données confidentielles et les fonctions sensibles. Malgré les efforts de standardisation de l'écosystème, les modèles proposés pour la mise en œuvre du SE sont complexes et souffrent du manque de généricité, à la fois pour offrir des mécanismes d’abstraction, pour le développement d’applications de haut niveau, et pour la mise en œuvre et la vérification des contraintes de sécurité des applications.L’objectif de la thèse est de concevoir et réaliser un environnement logiciel basé sur un modèle générique compatible avec les standards établis et peu sensible aux évolutions technologiques. Cet environnement devrait permettre à des non-experts de développer des applications multiplateformes, multimodes, multi-facteurs de forme, qui s’interfacent avec le SE dans un smartphone NFC. / In the field of electronic transactions and payment with a smart card, the Near Field Communication (NFC) standard has stood out against other candidate technologies for secure mobile contactless transactions for payment, access control, or authentication. Secure mobile contactless services are based on the card emulation mode of the NFC standard which involves a smart card type component with restricted access called "Secure Element" (SE) in which sensitive data and sensitive functions are securely stored and run. Despite considerable standardization efforts around the SE ecosystem, the proposed models for the implementation of SE are complex and suffer from the lack of genericity, both to offer abstraction mechanisms, for the development of high-level applications, and for the implementation and verification of applications security constraints.The objective of the thesis is to design and realize a software environment based on a generic model that complies with established standards and which is not very sensitive to technological evolutions. This environment should enable non-experts to develop multi-platform, multi-mode, multi-factor SE-based applications running into the NFC smartphone.
|
436 |
Mitteilungen des URZ 2/1998Huebner, U., Grunewald,, Heide,, Huettmann,, Trapp, 05 August 1998 (has links)
Perspektiven im Netzbereich
C.A.N. - Chemnitzer AbsolventenNetz
Grafische Benutzeroberfl¨achen im Netz (VNC)
PGP 5.x und GNUPG
Neuigkeiten bei der Secure Shell (SSH)
Vim 5.x
Richtlinien zur Sicherheit im Campusnetz
Ein Jahr Einsatz von Windows NT im URZ
|
437 |
Conception d’un crypto-système reconfigurable pour la radio logicielle sécuriséeGrand, Michaël 02 December 2011 (has links)
Les travaux de recherche détaillés dans ce document portent sur la conception et l’implantation d’un composant matériel jouant le rôle du sous-système cryptographique d’une radio logicielle sécurisée.A partir du début des années 90, les systèmes radios ont peu à peu évolué de la radio classique vers la radio logicielle. Le développement de la radio logicielle a permis l’intégration d’un nombre toujours plus grand de standards de communication sur une même plateforme matérielle. La réalisation concrète d’une radio logicielle sécurisée amène son concepteur à faire face à de nombreuses problématiques qui peuvent se résumer par la question suivante : Comment implanter un maximum de standards de communication sur une même plateforme matérielle et logicielle ? Ce document s’intéresse plus particulièrement à l’implantation des standards cryptographiques destinés à protéger les radiocommunications.Idéalement, la solution apportée à ce problème repose exclusivement sur l’utilisation de processeurs numériques. Cependant, les algorithmes cryptographiques nécessitent le plus souvent une puissance de calcul telle que leur implantation sous forme logicielle n’est pas envisageable. Il s’ensuit qu’une radio logicielle doit parfois intégrer des composants matériels dédiés dont l'utilisation entre en conflit avec la propriété de flexibilité propre aux radios logicielles.Or depuis quelques années, le développement de la technologie FPGA a changé la donne. En effet, les derniers FPGA embarquent un nombre de ressources logiques suffisant à l’implantation des fonctions numériques complexes utilisées par la radio logicielle. Plus précisément, la possibilité offerte par les FPGA d'être reconfiguré dans leur totalité (voir même partiellement pour les derniers d’entre eux) fait d’eux des candidats idéaux à l’implantation de composants matériels flexibles et évolutifs dans le temps. À la suite de ces constatations, des travaux de recherche ont été menés au sein de l’équipe Conception des Systèmes Numériques du Laboratoire IMS. Ces travaux ont d’abord débouché sur la publication d’une architecture de sous-système cryptographique pour la radio logicielle sécurisée telle qu’elle est définie par la Software Communication Architecture. Puis, ils se sont poursuivis par la conception et l’implantation d’un cryptoprocesseur multi-cœur dynamiquement reconfigurable sur FPGA. / The research detailed in this document deal with the design and implementation of a hardware integrated circuit intended to be used as a cryptographic sub-system in secure software defined radios.Since the early 90’s, radio systems have gradually evolved from traditional radio to software defined radio. Improvement of the software defined radio has enabled the integration of an increasing number of communication standards on a single radio device. The designer of a software defined radio faces many problems that can be summarized by the following question: How to implement a maximum of communication standards into a single radio device? Specifically, this work focuses on the implementation of cryptographic standards aimed to protect radio communications.Ideally, the solution to this problem is based exclusively on the use of digital processors. However, cryptographic algorithms usually require a large amount of computing power which makes their software implementation inefficient. Therefore, a secure software defined radio needs to incorporate dedicated hardware even if this usage is conflicting with the property of flexibility specific to software defined radios.Yet, in recent years, the improvement of FPGA circuits has changed the deal. Indeed, the latest FPGAs embed a number of logic gates which is sufficient to meet the needs of the complex digital functions used by software defined radios. The possibility offered by FPGAs to be reconfigured in their entirety (or even partially for the last of them) makes them ideal candidates for implementation of hardware components which have to be flexible and scalable over time.Following these observations, research was conducted within the Conception des Systèmes Numériques team of the IMS laboratory. These works led first to the publication of an architecture of cryptographic subsystem compliant with the security supplement of the Software Communication Architecture. Then, they continued with the design and implementation of a partially reconfigurable multi-core cryptoprocessor intended to be used in the latest FPGAs.
|
438 |
Constructing Provably Secure Identity-Based Signature SchemesChethan Kamath, H January 2013 (has links) (PDF)
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying certificate management. An identity-based signature(IBS) is the identity-based counter part of a digital signature.
In the first (and primary) part of the work, we take a closer look at an IBS due to Galindo and Garcia–GG-IBS, for short. GG-IBS is derived through a simple and elegant concatenation of two Schnorr signatures and, importantly, does not rely on pairing. The security is established through two algorithms (both of) which use the Multiple-Forking(MF) Algorithm to reduce the problem of computing the discrete logarithm to breaking the IBS. Our focus is on the security argument : It turns out that the argument is flawed and, as a remedy, we sketch a new security argument. However, the resulting security bound is still quite loose, chiefly due to the usage of the MF Algorithm. We explore possible avenues for improving this bound and , to this end, introduce two notions pertaining to random oracles termed dependency and independency. Incorporating (in) dependency allows us to launch the nested replay attack far more effectively than in the MF Algorithm leading to a cleaner,(significantly) tighter security argument for GG-IBS, completing the final piece of the GG-IBS jigsaw.
The second part of the work pertains to the notion of selective-identity (sID) for IBCs. The focus is on the problem of constructing a fully-secure IBS given an sID-secure IBS without using random oracles and with reasonable security degradation.
|
439 |
Druhy civilního procesu / Types of civil procedureBeroušková, Monika January 2017 (has links)
The attempt of this diploma thesis is to introduce the reader various types of civil procedure. The civil procedure is one of the types of justice besides criminal, administrative and institutional justice. The civil procedure represents the united process, which is internally differentiated. This differentiation is the result of historical development, when the original function of the civil procedure access additional features. The purpose of the civil procedure is not only to provide protection to endangered rights. Another function is to protect the rights against threat. Finally, there is the function of execution and reinsurance. The purpose of this thesis is to provide a comprehensive overview of the various types of civil procedure, their characteristics, common features and differences. The content of this thesis are various types of civil procedure and it is divided into three parts. The first part deals with the civil procedure in general and it's history. The second part, as the main part of the diploma thesis, focuses on characteristics of each types of civil procedure. First there is described civil trial proceedings, which is divided into contentious and non-contentious proceedings. The purpose of civil trial proceedings is to protect the violated or threatened rights or regulation...
|
440 |
Risk Assessment / Risk AssessmentHrdová, Edita January 2012 (has links)
This diploma thesis is focused on companies risk evaluation before endorsement of Loan deriving from business relationships. The aim of this thesis is not only to describe individual steps of risk assessment, but also perfom analysis of particular companies based on available data, i.e. Balance sheet, Profit and Loss statement and external rating and after that propose solution for each company. My analysis will be based on theoretical knowledge, further on experience related to my job role as credit analyst. The aim will be to perform objective analysis of real companies and determine financial health of each of them together with their risk evaluation.
|
Page generated in 0.0445 seconds