• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 1
  • Tagged with
  • 8
  • 8
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A SECURE MEDIA STREAM COMMUNICATION FOR NEXT GENERATION NETWORK

Wu, Hao, Zhong, Zhangdui 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / In NGN, the open interfaces and the IP protocol make the hazard of security aspect increased accordingly. Thereby, it is a very important premise for NGN network operation to afford a good secure media stream communication. In this paper, we will present a secure media stream communication for NGN. Then we will discuss the three parts of the media stream secure communication——media stream source authentication, secret key negotiation and distribution; media stream encryption/decryption in detail. It can effectively realize media stream end-to-end secure communication. Meanwhile, it also makes use of the expanding of former protocol during the secret key negotiation process.
2

Performance study of security mechanism for mobile agent domain

Kolli, Manoj Kumar, Arimanda, Srikanth Reddy January 2011 (has links)
Context: Mobile agents are considered quite challenging and provide scope for developing innovative applications in distributed computing domain. One important area where there is a scope to employ mobile agents successfully is the Network security domain. There are plethora of mobile agent based security mechanisms proposed till now. But the successful deployment of the security mechanism is effected by the parameters like performance, efficiency, ability to identify the intruders, and the models vulnerability to direct attacks and so-on which make the successful deployment of the mobile agents in the security domain more challenging. Therefore it’s often demanding to identify a security mechanism that entails the performance by making use of the mobile agents in the security domain on the contrary the mechanism need to be generic and support all kinds of the environments. As a result performing vulnerability analysis in mobile agent security domain is often required. Objectives: The main objective of this study is to provide the report that incorporates the empirical analysis of the selected mobile agent based security mechanism from the perspective of performance that could be useful in defining the standards for development of the security modules for mobile agents. The secondary aim of this study is to characterize the issues related to the performance of the security mechanism in the mobile agents environment. And finally to identify the model specific barriers that will effect the performance of the security mechanism for mobile agents. Methods: This thesis performs the vulnerability analysis on the selected mobile agent based security mechanism and uses a direct implementation method to study the performance of the security mechanism. The factors considered from the performance perspective are the round trip time or can also be termed as total response time. The effect of the performance is studied with respect to the scalability of the network parameters like the number of packets and the size of the network. This thesis focuses on implementing four different modules which are individual agents communicating with each other in the network when deployed while performing a combing on the network for vulnerabilities. The four different modules implemented in the thesis are the Information Gathering Agent, Tracing Agent, Manager or Managing agent, Monitor or Monitoring agent. The performance of the mechanism is studied in three phases. The agents of the selected mechanism are implemented in the first phase and in the second phase a shear testing is done on those implemented agents of the security mechanism by collecting the round trip times of the agents as a whole with respect to the number of increasing packets (with a % increase in the number of illegitimate packets and also with the change in the number of nodes). A close monitoring on the model for the performance is performed to identify the pit falls of the model. Finally in the third phase the collected results are analyzed and presented as a set of findings from this study. Results: The results collected from this experimental study are analyzed from the motive that the security mechanism is being monitored from the perspective of identifying as many intrusions efficiently as an elusive goal rather than identifying as many intrusions precisely. The results from this thesis prove that the mechanism considered is more efficient rather than precise. Even though the results obtained from this study can be seen as efficient but there is a set of residue packets which takes a bit more time than the other packets as can be seen when one progresses the results from top to bottom this is primarily because of the factors associated with the inter networking environment like the network traffic with respect to the size of the network or the number of nodes in the network. Conclusions: After analyzing the results and providing the answers to the research questions, a conclusion can be made that the selected security mechanism is proved efficient rather than precise. This mechanism is proved to be useful only to reduce the number of intruders in the networking domain. On the contrary the mechanism also helps the deployment of the security mechanism easy this is because the advantage associated with the selected security mechanism which uses the less number of agents.
3

Canadas Non-Imperial Internationalism in Africa: Understanding Canadas Security Policy in the AU and ECOWAS

Akuffo , Edward Ansah 06 1900 (has links)
This study is concerned with Canadas policy towards peace, security and development in Africa. It examines Canadas response to these issues in relation to the New Partnership for Africas Development (NEPAD), the African Union Peace and Security Architecture (APSA), and the Economic Community of West African States (ECOWAS) Security Mechanism. With the intensification of violent conflicts in parts of Africa and their impact on individuals, communities, and socioeconomic development, African leaders transformed the OAU into the AU and established APSA to promote regional and human security in Africa. At the sub-regional level, West African leaders established the ECOWAS Security Mechanism to address the (human) security deficit in the West Africa region. These institutional transformations coincided with the launching of the NEPAD, which became one of the central instruments of engagement between Africa and the international community to address the peace, security and development challenges on the African continent. Canadas response to the NEPAD under the Liberal government of Jean Chrtien came in the form of a $500 million Canada fund for Africa (CFA) that among other things supported the capacity building of APSA and the ECOWAS Security Mechanism. The promotion of human security played a key role in Canadas approach to the AU and ECOWAS peace and security capacity building. I use a non-imperial internationalist approach that draws on the theoretical insights of a constructivist approach to international relations to provide an understanding of the Canadian governments policy. I argue that the Canadian governments policy towards the AU and ECOWAS can be understood in terms of the moral identity that Canada has built or acquired over the years in Africa. While this moral identity provides the means through which Canadian interests are pursued in Africa, it appears that the interest in maintaining this image has overshadowed the need for the Canadian government to craft an overarching policy and put resources behind the rhetoric of promoting peace and security, particularly human security in Africa.
4

Canada’s Non-Imperial Internationalism in Africa: Understanding Canada’s Security Policy in the AU and ECOWAS

Akuffo , Edward Ansah Unknown Date
No description available.
5

Users’ perceptions on security of mobile computing for adoption of e-applications in South Africa

Mapande, Fhatuwani Vivian January 2018 (has links)
M.Tech (Department of Information technology, Faculty of Applied and Computer Science), Vaal University of Technology. / The advancement of technology, particularly in the area of mobile computing, revolutionizes the way business is done in many industries such as the education sector, government sector, financial institutions, retail sector and the way people conduct their daily activities. The current technology provides influential tools for organisations and can significantly influence their operation, structure and approach. The development of mobile computing has created a new innovation for various industries by increasing the availability, frequency and speed of communication between the organisations and the individuals. However, users’ perceptions can play an important role towards the adoption of these new developments. The overriding purpose of this study was to investigate the users’ perceptions on the security of mobile computing in South Africa for adoption of e-applications. The literature review was concentrated on the process of progressive development occurring during the study. To accomplish that goal it became necessary to reach some essential objectives i.e. investigating the users’ perceptions models in literature. For the purpose of the study, it was important to propose a research framework for users’ perceptions on the security of mobile computing with the potential for the adoption of e-applications in South Africa. The research evaluated the proposed framework to establish if there is any relationship between the e-application adoption factors. Furthermore, the hypotheses were tested to determine which factors would influence the adoption of e-applications in South Africa. Technology Adoption Model 2 (TAM2) and Diffusion of Innovation (DOI) provide the theoretical basis for explaining how users perceive e-application services that they access and operate through mobile computing. To achieve that, a quantitative study was conducted with South African residents, with respect to mobile security perceptions; 476 valid questionnaires were received from the participants who were selected non-randomly. Questionnaires were developed from the proposed research framework derived from DOI and TAM2 and the items were adopted from other prior technology adoption studies. Through the use of the survey instrument developed for this study, data were collected in order to address the importance of this study based on the problem statement posed in the first chapter of this dissertation. The valid questionnaires were analysed by using the Statistical Package for the Social Sciences (SPSS), Version 24.0. Reliability analysis, principal component analysis, correlations and multiple linear regression tests were conducted. Among other things this study made sure that ethical considerations are adhered to. The findings revealed positive relationships between perceived usefulness of security mechanisms, perceived ease of use of security mechanisms, subjective norm on security mechanisms, relative advantage of security mechanisms, compatibility of security mechanisms, complexity of security mechanisms, aesthetics of security mechanisms interface and intention to adopt e-applications. Furthermore, subjective norm on security mechanisms was strongly correlated to intention to adopt e-applications, complexity of security mechanisms strongly correlated to perceived usefulness of security mechanisms, relative advantage of security mechanisms and aesthetic of security mechanisms interface strongly correlated to perceived usefulness of security mechanisms. In addition, subjective norm of security mechanisms strongly influence intention to adopt eapplications in South Africa. Also, aesthetics of security mechanisms interface strongly influence both perceived usefulness of security mechanisms and perceived ease of use of security mechanisms. The reason behind it may be interpreted as users nowadays seeing the beauty as the platform to attract and encourage them to use e-applications. Finally, the proposed model analysis and survey evaluation will enable South African organizations to make informed decisions about the use of e-applications services. These findings contribute to a road map for the education sector, government sector, financial institutions, and retail sector as well as to encourage their customers or clients to adopt e-applications.
6

Securing Network Connected Applications with Proposed Security Models

Konstantaras, Dimitrios, Tahir, Mustafa January 2008 (has links)
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security</p><p>within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.</p><p>By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.</p><p>An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.</p>
7

Securing Network Connected Applications with Proposed Security Models

Konstantaras, Dimitrios, Tahir, Mustafa January 2008 (has links)
In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies. However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications. By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies. An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
8

A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks / Ein bioinspirierter autonomer Authentifizierungsmechanismus in mobilen Ad-hoc-Netzwerken

Memarmoshrefi, Parisa 30 May 2012 (has links)
No description available.

Page generated in 0.0697 seconds