• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 45
  • 30
  • 17
  • 5
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 126
  • 49
  • 29
  • 28
  • 23
  • 22
  • 21
  • 21
  • 21
  • 20
  • 19
  • 18
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Evaluation of different Cloud Environments and Services related to large scale organizations(Swedish Armed forces)

Ravichandran, Pravin Karthick, Balmuri, Santhosh Keerthi January 2011 (has links)
Cloud Computing (CC) is one of the fast growing computer network technologies and many companies offer their services through cloud network. Cloud Computing has many properties with respect to the existing traditional service provisions like scalability, availability, fault tolerance, capability and so on which are supported by many IT companies like Google, Amazon, Salesforce.com. These IT companies have more chances to adapt their services into a new environment, known as Cloud computing systems. There are many cloud computing services which are being provided by many IT companies.The purpose of this thesis is to investigate which cloud environment (public, private and hybrid) and services (Infrastructure as a Service, Software as a Service, and Platform as a Service) are suitable for Swedish Armed Forces (SWAF) with respect to performance, security, cost, flexibility and functionality. SWAF is using private (internal) cloud for communications where both sensitive and non-sensitive information are located in the internal cloud. There are problems like maintenance of hardware, cost issues and secure communication while maintaining the private cloud. In order to overcome those problems we have suggested a hybrid and community cloud environment and SaaS, IaaS, PaaS services for SWAF.For suggesting these cloud environments and cloud services we have performed a literature study and two empirical studies (survey and interviews) with different organizations.A new cloud model is designed based on the suggested cloud environment, separate storage spaces for sensitive and non-sensitive information, suitable services and an effective infrastructure for sharing the internal information for SWAF.
122

Mitteilungen des URZ 1/2004

Richter,, Riedel,, Grunewald,, Schier, 04 March 2004 (has links) (PDF)
Informationen des Universitätsrechenzentrums
123

Návrh bezpečnostní infrastruktury elektronického archivu / Design of security infrastructure for electronic archive

Doležel, Radek January 2009 (has links)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
124

Anonymní pohyb v síti internet / Anonymous communication on the internet

Hořejš, Jan January 2014 (has links)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
125

Mitteilungen des URZ 1/2004

Richter, Riedel, Grunewald, Schier 04 March 2004 (has links)
Informationen des Universitätsrechenzentrums:Jahresrückblick 2003 Aktuelle HBFG-Projekte Sicheres Programmieren mit PHP Passwort vergessen - was nun? VPN-Dienst des URZ Spam-Schutz 'Textanalyse' erweitert
126

Changing from the silo model to the horizontal layers model in public policy regulations: the implications and potential for the telecommunications industry

Spencer Logan, Lemuella C. 12 1900 (has links)
The end of the Twentieth Century and the start of the Twenty First Century has been a tumultuous time for the Telecommunications Industry. Even as it moves forward to embrace the new technologies the Industry finds itself embroiled in issues of governance. The Industry finds itself in a dilemma since innovations increase at a rate faster than the laws can be changed and these render its existing laws and policies to be in some cases obsolete and inappropriate for the reality of the present. In the past, the United States of America has relied on vertically integrated top down laws and methods of regulating all the different parts in its Telecommunications Industry. These laws are contained in the different numbered Titles of this Countrys Legal Codes. Since the inception of these laws, emphasis was placed in creating and documenting policies structured by industry, sector and type of content. This form of regulation is usually referred to as the Silo Method. However, in recent years, especially in the regulation of the Telephony industry, the method of law and rule formulation moved from content regulation to one in which the technologies are getting regulated in what has been described as a Layers Method. This paper first considered whether the Silo Method of regulation is in actuality the same as using the Horizontal Layers method and showed that this is the case. Then it determined that Enhanced Services are the same as Basic Services and that Telecommunications Services are the same as Information services and showed that given that the pair sets as noted were the same, it went on to conclude that all these services were essentially the same. While studying to some detail the technologies of VoIP, the paper also showed that VoIP although an Internet technology is similar to traditional telephony, and is both a Telecommunications Service and Information Service based on the definition as given in the law as well as the technologies that are used and that as a result of this, the current regulatory environment for this service with regards to telephony is inconsistent. It concluded that Telecommunications policies though now adequate may need to be modified.

Page generated in 0.0176 seconds