• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 479
  • 140
  • 115
  • 65
  • 58
  • 56
  • 51
  • 50
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
471

A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents

Giansiracusa, Michelangelo Antonio January 2005 (has links)
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to drive global electronic services (i.e.any Internet-driven-and-delivered service, not solely e-commerce related activities), their up take on the Internet has been very limited. Chief among the reasons for the paradigm's practical under-achievement is there is no ubiquitous frame work for using Internet mobile agents, and non-trivial security concerns abound for the two major stake holders (mobile agent users and mobile agent platform owners). While both stake holders have security concerns with the dangers of the mobile agent processing model, most investigators in the field are of the opinion that protecting mobile agents from malicious agent platforms is more problematic than protecting agent platforms from malicious mobile agents. Traditional cryptographic mechanisms are not well-suited to counter the bulk of the threats associated with the mobile agent paradigm due to the untrusted hosting of an agent and its intended autonomous, flexible movement and processing. In our investigation, we identified that the large majority of the research undertaken on mobile agent security to date has taken a micro-level perspective. By this we mean research focused solely on either of the two major stakeholders, and even then often only on improving measures to address one security issue dear to the stake holder - for example mobile agent privacy (for agent users) or access control to platform resources (for mobile agent platform owners). We decided to take a more encompassing, higher-level approach in tackling mobile agent security issues. In this endeavour, we developed the beginnings of an infrastructural-approach to not only reduce the security concerns of both major stakeholders, but bring them transparently to a working relationship. Strategic utilisation of both existing distributed system trusted-third parties (TTPs) and novel mobile agent paradigm-specific TTPs are fundamental in the infrastructural framework we have devised. Besides designing an application and language independent frame work for supporting a large-scale Internet mobile agent network, our Mobile Agent Secure Hub Infrastructure (MASHIn) proposal encompasses support for flexible access control to agent platform resources. A reliable means to track the location and processing times of autonomous Internet mobile agents is discussed, withfault-tolerant handling support to work around unexpected processing delays. Secure,highly-effective (incomparison to existing mechanisms) strategies for providing mobile agent privacy, execution integrity, and stake holder confidence scores were devised - all which fit comfortably within the MASHIn framework. We have deliberately considered the interests - withoutbias -of both stake holders when designing our solutions. In relation to mobile agent execution integrity, we devised a new criteria for assessing the robustness of existing execution integrity schemes. Whilst none of the existing schemes analysed met a large number of our desired properties for a robust scheme, we identified that the objectives of Hohl's reference states scheme were most admirable - particularly real - time in - mission execution integrity checking. Subsequently, we revised Hohl's reference states protocols to fit in the MASHIn framework, and were able to overcome not only the two major limitations identified in his scheme, but also meet all of our desired properties for a robust execution integrity scheme (given an acceptable decrease in processing effiency). The MASHIn offers a promising new perspective for future mobile agent security research and indeed a new frame work for enabling safe and autonomous Internet mobile agents. Just as an economy cannot thrive without diligent care given to micro and macro-level issues, we do not see the security prospects of mobile agents (and ultimately the prospects of the mobile agent paradigm) advancing without diligent research on both levels.
472

Hodnocení zabezpečení obchodních informací / Rating of Security Business Informations

Veselý, Martin January 2009 (has links)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
473

Vzdělávání dětí z dětského domova / Educating children from a Children's Home

Krátká, Jana January 2021 (has links)
Dissertation is focused on the issue of institutional care in the Czech Republic. The main focus of this work are children's homes, education and socialization of children placed in this type of residential care. The aim of the theoretical part is to describe the characteristics of subjects of institutional care in the Czech Republic. Furthermore, to compare institutional care with selected countries and describe the child's socialization in the family and at school. A historical overview of institutional care in the Czech Republic is also described, and in conclusion the author deals with a specific description of the social inclusion of pupils with special educational needs in the teaching process at primary school. The empirical part reports on the research and its results obtained by qualitative methodology using case study design. The main goal of the research was to find out how children from a children's home are integrated into the teaching process at primary school. Furthermore, the author set several partial goals. The first partial goal was to find out how children from a children's home are integrated by children growing up in biological families into the class group at primary school. The second partial goal was to find out how children from a children's home are involved in the...
474

Invloed van ʼn pendelhuwelik op die jong kind in die gesin / The influence of a commuter marriage on the young child in the family

De Villiers, Heilletje Maria Margaretha 10 1900 (has links)
Text in Afrikaans / Pendelhuwelike is aan die toeneem en het verskeie invloede op die jong kind in die gesin. Die primêre doel van die studie was om emosionele en sosiale intelligensie as basis te gebruik om die invloed van ʼn pendelhuwelik op ʼn jong kind tussen 7 en 11 jaar te bepaal. ʼn Gemengde navorsingsontwerp is as empiriese ondersoek gedoen. Vyf deelnemers het deelgeneem in drie sessies elk. Die data-insamelingsinstrumente was: waarneming en veldnotas; projeksiemedia; ʼn vraelys, en ʼn semi-gestruktureerde onderhoud met elk van die betrokke moeders. Die meting van emosionele en sosiale ontwikkeling met behulp van die vraelys toon dat, ongeag van die afwesigheid van die deelnemers se vaders, en die konflikte, vrese en behoeftes wat hulle ervaar volgens die projeksiemedia, die deelnemers se emosionele en sosiale ontwikkeling oorwegend gemiddeld tot hoog is. Die uitkomste bied hopelik ʼn insiggewende bydrae hoe pendelhuwelike vyf jong kinders se emosionele en sosiale ontwikkeling beïnvloed het. / Commuter marriages are increasing and have various influences on the young child in the family. The primary aim of this study was to determine the influences of a commuter marriage on a young child between 7 and 11 years, using emotional and social intelligence as a basis. A mixed method empirical research design was used. Three sessions were conducted with five participants individually to obtain data through: observations and field notes, projection media, a questionnaire, and a semi-structured interview with each mother. The measurement of emotional and social development through the use of the questionnaire shows that, despite the absence of the participants’ fathers, and the conflicts, fears and needs they experienced according to the projection media, the participants’ emotional and social development are predominantly average to high. The study hopefully provides a significant contribution to the understanding of how commuter marriages influenced five young children’s emotional and social development. / Psychology of Education / M. Ed. (Voorligting)
475

Invloed van ʼn pendelhuwelik op die jong kind in die gesin / The influence of a commuter marriage on the young child in the family

De Villiers, Heilletje Maria Margaretha 10 1900 (has links)
Text in Afrikaans / Pendelhuwelike is aan die toeneem en het verskeie invloede op die jong kind in die gesin. Die primêre doel van die studie was om emosionele en sosiale intelligensie as basis te gebruik om die invloed van ʼn pendelhuwelik op ʼn jong kind tussen 7 en 11 jaar te bepaal. ʼn Gemengde navorsingsontwerp is as empiriese ondersoek gedoen. Vyf deelnemers het deelgeneem in drie sessies elk. Die data-insamelingsinstrumente was: waarneming en veldnotas; projeksiemedia; ʼn vraelys, en ʼn semi-gestruktureerde onderhoud met elk van die betrokke moeders. Die meting van emosionele en sosiale ontwikkeling met behulp van die vraelys toon dat, ongeag van die afwesigheid van die deelnemers se vaders, en die konflikte, vrese en behoeftes wat hulle ervaar volgens die projeksiemedia, die deelnemers se emosionele en sosiale ontwikkeling oorwegend gemiddeld tot hoog is. Die uitkomste bied hopelik ʼn insiggewende bydrae hoe pendelhuwelike vyf jong kinders se emosionele en sosiale ontwikkeling beïnvloed het. / Commuter marriages are increasing and have various influences on the young child in the family. The primary aim of this study was to determine the influences of a commuter marriage on a young child between 7 and 11 years, using emotional and social intelligence as a basis. A mixed method empirical research design was used. Three sessions were conducted with five participants individually to obtain data through: observations and field notes, projection media, a questionnaire, and a semi-structured interview with each mother. The measurement of emotional and social development through the use of the questionnaire shows that, despite the absence of the participants’ fathers, and the conflicts, fears and needs they experienced according to the projection media, the participants’ emotional and social development are predominantly average to high. The study hopefully provides a significant contribution to the understanding of how commuter marriages influenced five young children’s emotional and social development. / Psychology of Education / M. Ed. (Voorligting)
476

Odposlech moderních šifrovaných protokolů / Interception of Modern Encrypted Protocols

Marček, Ján January 2012 (has links)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
477

Guidelines for alternative caregivers to enhance attachment with the traumatised child

Nieuwoudt, Judith 06 1900 (has links)
This thesis focuses on the development of Gestalt guidelines for alternative caregivers to enhance attachment with the traumatised child. The researcher made use of the intervention research process, consisting of six phases. For the purpose of this study of limited scope, the intervention research process was completed up to step one of the fourth phase. The target group in this study was alternative caregivers of traumatised children where attachment difficulties existed. `Alternative caregivers' refers to people who provide care to these children, either on a voluntary basis or professionally. Focus groups, field notes and observation were used as data collection method, and Creswell's spiral was used to analyse data. Not all aspects regarding attachment were covered in this study and only relevant Gestalt principles were discussed. Gestalt guidelines with an observational system were finally developed. The views of the respondents, those of experts and a literature review were incorporated into the guidelines, as well as some functional elements of existing treatments. / Practical Theology / M. Diac. (Play Therapy)
478

Guidelines for alternative caregivers to enhance attachment with the traumatised child

Nieuwoudt, Judith 06 1900 (has links)
This thesis focuses on the development of Gestalt guidelines for alternative caregivers to enhance attachment with the traumatised child. The researcher made use of the intervention research process, consisting of six phases. For the purpose of this study of limited scope, the intervention research process was completed up to step one of the fourth phase. The target group in this study was alternative caregivers of traumatised children where attachment difficulties existed. `Alternative caregivers' refers to people who provide care to these children, either on a voluntary basis or professionally. Focus groups, field notes and observation were used as data collection method, and Creswell's spiral was used to analyse data. Not all aspects regarding attachment were covered in this study and only relevant Gestalt principles were discussed. Gestalt guidelines with an observational system were finally developed. The views of the respondents, those of experts and a literature review were incorporated into the guidelines, as well as some functional elements of existing treatments. / Philosophy, Practical and Systematic Theology / M. Diac. (Play Therapy)
479

Streamlining Certification Management with Automation and Certification Retrieval : System development using ABP Framework, Angular, and MongoDB / Effektivisering av certifikathantering med automatisering och certifikathämtning : Systemutveckling med ABP Framework, Angular och MongoDB

Hassan, Nour Al Dine January 2024 (has links)
This thesis examines the certification management challenge faced by Integrity360. The decentralized approach, characterized by manual processes and disparate data sources, leads to inefficient tracking of certification status and study progress. The main objective of this project was to construct a system that automates data retrieval, ensures a complete audit, and increases security and privacy.  Leveraging the ASP.NET Boilerplate (ABP) framework, Angular, and MongoDB, an efficient and scalable system was designed, developed, and built based on DDD (domain-driven design) principles for a modular and maintainable architecture. The implemented system automates data retrieval from the Credly API, tracks exam information, manages exam vouchers, and implements a credible authentication system with role-based access control.  With the time limitations behind the full-scale implementation of all the planned features, such as a dashboard with aggregated charts and automatic report generation, the platform significantly increases the efficiency and precision of employee certification management. Future work will include these advanced functionalities and integrations with external platforms to improve the system and increase its impact on operations in Integrity360.

Page generated in 0.0383 seconds