• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 39
  • 28
  • 27
  • 24
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 281
  • 70
  • 55
  • 53
  • 51
  • 45
  • 44
  • 43
  • 37
  • 35
  • 34
  • 31
  • 31
  • 27
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Criptografia / Cryptographic

Mata, Tulio Fernando da 06 August 2015 (has links)
Submitted by Luciana Ferreira (lucgeral@gmail.com) on 2015-10-28T13:09:56Z No. of bitstreams: 2 Dissertação - Tulio Fernando da Mata - 2015.pdf: 1121756 bytes, checksum: 845f7de938a5d68c11d5b1bcd6fdf5ca (MD5) license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) / Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2015-10-28T13:12:01Z (GMT) No. of bitstreams: 2 Dissertação - Tulio Fernando da Mata - 2015.pdf: 1121756 bytes, checksum: 845f7de938a5d68c11d5b1bcd6fdf5ca (MD5) license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) / Made available in DSpace on 2015-10-28T13:12:01Z (GMT). No. of bitstreams: 2 Dissertação - Tulio Fernando da Mata - 2015.pdf: 1121756 bytes, checksum: 845f7de938a5d68c11d5b1bcd6fdf5ca (MD5) license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) Previous issue date: 2015-08-06 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This paper makes a brief reading on the crisis experienced by the mathematics education in Brazilian public schools in recent years, analyzing some of the reasons and motives of this crisis and trying to point out ways that this teaching will become better, more e cient and above all presenting mathematics as a fundamental importance for today's world science, pointing their applicability in everyday situations that may arouse the interest of students and present themselves as challenges to their ability to think and learn. In order to show the applicability and the importance of mathematics shows the encryption, if elected as a basis for analysis the cryptographic method RSA, one of the most widespread throughout the world, to present it as a tool that uses mathematical algorithms to encoding and/or decoding of data, enabling the protection and con dentiality of sensitive information transmitted via satellite in commercial and banking transactions. The paper presents the general importance of cryptography in the context of a globalized and technological world of today, as well as within the story, noting even its decisive contribution to the Allied victory against the Germans in the 2nd World War. It presents also the mathematical basis for encryption, prior knowledge of mathematics that are used to encrypt messages and or data, and presents examples of encoding and decoding simple messages. Finally, a general approach on the encryption is done, since its concept and common de nitions, pointing secured requirements for its use and the main types of algorithms for encryption and decryption codes, also called cryptographic keys. / O presente trabalho faz uma breve leitura sobre a situação de crise vivida pelo ensino de matemática na escola pública brasileira nos últimos anos, analisando algumas das razões e motivos dessa crise e tentando apontar caminhos para que esse ensino se torne melhor e mais e ciente e acima de tudo apresentando a matemática como uma ciência de fundamental importância para o mundo atual, apontando sua aplicabilidade em situações cotidianas que podem despertar o interesse dos alunos e se apresentam como desa os para suas capacidades de raciocinar e de aprender. Na perspectiva de mostrar a aplicabilidade e a importância da matemática apresenta-se a criptogra a, elegendo-se como base de análise o método criptográ co RSA, um dos mais difundidos em todo o mundo, para apresentá-lo como uma ferramenta que usa algoritmos matemá- ticos para a codi cação e/ou decodi cação de dados, permitindo a proteção e o sigilo de informações con denciais transmitidas via satélite em transações comerciais e banc árias. O trabalho apresenta a importância geral da criptogra a no contexto do mundo globalizado e tecnológico da atualidade, assim como dentro da história, ressaltando, inclusive, sua contribuição decisiva para a vitória dos Aliados contra os alemães na 2.a Guerra Mundial. Apresenta-se ainda a base matemática necessária para criptogra- a, ou seja, os conhecimentos prévios de matemática que são usados para criptografar mensagens e dados, bem como se apresenta exemplos de codi cação e decodi cação de mensagens simples. Por m, faz-se uma abordagem geral sobre a criptogra a, desde seu conceito e de nições mais comuns, apontando os requisitos garantidos pelo seu uso e os principais tipos de algoritmos para cifragem e decifragem de códigos, também chamadas de chaves criptográ cas.
92

Um Mecanismo de SeguranÃa com AdaptaÃÃo DinÃmica em Tempo de ExecuÃÃo para Dispositivos MÃveis. / A Security Mechanism With Dynamic Adaptation For Mobile Device

Alexandre Correia Cirqueira 07 October 2011 (has links)
CoordenaÃÃo de AperfeiÃoamento de Pessoal de NÃvel Superior / A crescente utilizaÃÃo de dispositivos mÃveis, redes sem fio e aplicaÃÃes mÃveis evidencia a importÃncia da garantia de seguranÃa da informaÃÃo. Esta preocupaÃÃo surge devido aos riscos envolvidos no trÃfego de informaÃÃes sensÃveis por meio sem fio, uma vez que o meio nÃo limita os riscos de ataques, tal como nas redes convencionais. Adicionalmente, a tendÃncia no uso de prÃticas sustentÃveis defendidas pela ComputaÃÃo Verde impÃe a necessidade de concepÃÃo de aplicaÃÃes flexÃveis que busquem a reduÃÃo do consumo de recursos, como o de energia. Assim, mecanismos para o provimento de confidencialidade de informaÃÃes que trafegam por meio sem fio devem considerar a alocaÃÃo eficiente de recursos computacionais. Esta à uma questÃo chave a ser considerada no momento da concepÃÃo de aplicaÃÃes mÃveis seguras. Portanto, os mecanismos de proteÃÃo devem balancear o nÃvel de seguranÃa requerido de acordo com o consumo de recursos alocados para provÃ-lo. O emprego de informaÃÃes que caracterizam a situaÃÃo corrente (contexto) pode auxiliar nessa tarefa. Assim, a utilizaÃÃo de proteÃÃo adequada aos requisitos de seguranÃa das aplicaÃÃes e combinada com o contexto pode identificar situaÃÃes nas quais serà necessÃrio aumentar ou diminuir o nÃvel de seguranÃa, de forma a diminuir o consumo de recursos do dispositivo. Esse trabalho propÃe, portanto, um Mecanismo de SeguranÃa com AdaptaÃÃo DinÃmica (MeSAD), com foco na confidencialidade, capaz de adaptar o nÃvel de seguranÃa de acordo com o contexto e reduzir o consumo de recursos dos dispositivos mÃveis. O objetivo principal consiste em encontrar o ponto de equilÃbrio no tradeoff entre nÃvel de seguranÃa e consumo de recursos. A fim de atingir este objetivo, este trabalho apresenta tambÃm uma ferramenta de suporte à utilizaÃÃo do MeSAD durante o desenvolvimento de aplicaÃÃes mÃveis, alÃm de possibilitar a realizaÃÃo de avaliaÃÃes sobre o desempenho dos algoritmos criptogrÃficos que sÃo utilizados nos diferentes dispositivos. / The increasing use of mobile devices, wireless networks and mobile applications highlights the importance of ensuring information security. This concern arises because of the risks involved in traffic sensitive information via wireless, since it does not limit the risk of attacks, as in conventional networks. Additionally, the trend in the use of sustainable practices advocated by the Green Computing imposes the need for designing flexible applications that seek to reduce consumption of resources such as energy. Thus, mechanisms for providing confidentiality of information passing over the wireless medium should consider the efficient allocation of computing resources. This is a key issue to be considered when designing secure mobile applications. Therefore, the protection mechanisms should balance the security level required in accordance with the consumption of resources allocated to provide it. The use of information that characterizes the current situation (context) can assist in this task. Thus, the use of appropriate protective security requirements of applications and combined with the context can identify situations where you need to raise or lower the security level in order to reduce the resource consumption of the device. This work proposes a Security Mechanism Dynamic Adaptation (MeSAD), focusing on confidentiality, able to adapt the level of security according to the context and reduce the resource consumption of mobile devices. The main objective is to find the balance point in the tradeoff between the level of security and resource consumption. In order to achieve this goal, this paper presents a tool to support the use of MeSAD during the development of mobile applications, and enable the assessments on the performance of cryptographic algorithms that are used in different devices.
93

Achieving Security in Messaging and Personal Content in Symbian Phones

Enany, Ahmed January 2007 (has links)
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented in java and tested on an actual device, Nokia N70. In addition, we measured the time required by each of the algorithms we used to encrypt/decrypt a certain number of bytes. We found that the time taken by RSA and Blowfish algorithms will not be noticeable by the user. However, since the implementation of the Identity Based Cryptography we used was not meant to run on mobile devices, we encountered a noticeable delay whenever encrypting/decrypting the data using this algorithm. Securing the SMS messages will make it to be considered as one of the proposed means that could be used to conduct m-commerce. In addition, securing the MMS messages and the mobile content will increase the usability and the reliability of the mobile phones especially to the users on the move. / Phone: +46735731360
94

Evaluation and Implementation of a Secure Zero Configuration IoT System

Yi, Lirong January 2017 (has links)
The Internet of Things (IoT) comprises a large number of heterogeneous devices. It is forecasted that up to 50 billion devices will be connected to the Internet by 2020. All of them have to be configured. Due to the heterogeneity of devices and the enormous increasing number of devices, manual configuration becomes more and more complex and inefficient. Zero configuration is put forward to solve this problem, which makes device configured automatically without additional manual involvement. Besides that, there are many security threats we want to avoid in the future. These security problems include unauthenticated nodes accessing to IoT data, denial of service, lack of confidentiality, malicious attack from hackers and so on. This paper studies the characteristics of IoT firstly and then highlights the implementation of zero configuration and security to IoT. This paper describes the underlying features of zero configuration and primary requirements of security, as well as finds some related mature technologies, based on that proposes a concise solution – combining the Bonjour and many security approaches for implementation of a secure zero IoT system. In addition, this solution is implemented in a small environment scenario of IoT, a smart home. All the programs are in Java language. Evaluation and conclusion are done in final phase.
95

Forensic Computing from a Computer Security perspective / Forensisk granskning av datorer ur ett datasäkerhetsperspektiv

Lázaro, Pablo García-Crovetto January 2004 (has links)
This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created. Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.
96

Dynamique professionnelle et transformations de l’action publique : Reformer l’organisation des soins dans les prisons françaises : les tentatives de spécialisation de la « médecine pénitentiaire » (1970-1994) / Professional dynamics and the transformations of public action : Reforming the organization of medical care in French prisons : the attempts to specialize health care in French prisons (1970-1994)

Farges, Eric 28 June 2013 (has links)
L’article 2 de la loi n°94-43 du 18 janvier 1994, transférant l’organisation des soins en milieu carcéral du ministère de la Justice au service public hospitalier, a souvent été présenté comme une réforme de santé publique s’imposant au vu de l’état des prisons françaises. L’épidémie de sida et le volontarisme des ministres de la Santé suffiraient à rendre compte de ce qui a été qualifié de « révolution sanitaire ». Pourtant au-delà de ces facteurs conjoncturels, les conditions de possibilité de cette réforme s’inscrivent plus largement au croisement d’une double dynamique, professionnelle et carcérale, que cette recherche propose de retracer. En effet, la loi du 18 janvier 1994 est également la réforme d’une profession et d’un secteur d’action publique tous deux fortement contestés. La réforme de l’organisation des soins en prison marque l’échec d’une stratégie de spécialisation médicale, entendue comme la tentative opérée par certains praticiens d’occuper une position spécifique au sein du secteur médical.Initiée au début des années soixante par le premier Médecin-inspecteur des prisons, Georges Fully, l’affirmation d’une « médecine pénitentiaire » spécifique avait alors pour but de conférer aux praticiens une plus grande légitimité, et ainsi autonomie, à l’égard de leur employeur, l’Administration pénitentiaire. La spécialisation était ainsi conçue comme une ressource supplémentaire afin de mettre fin au tiraillement auquel étaient confrontés les praticiens travaillant en détention entre leur statut de vacataire du ministère de la Justice et celui de médecin-traitant des détenus. Toutefois, après la violente contestation des prisons survenue durant les années soixante-dix, l’affirmation d’une médecine pénitentiaire devient pour le nouveau Médecin-inspecteur, Solange Troisier, le moyen de légitimer un secteur d’action publique discrédité : l’organisation des soins en milieu carcéral. La consécration d’une médecine spécifique aux détenus est également pour elle le moyen de faire prévaloir les exigences du Code de procédure pénale sur celles issus du Code de déontologie. La spécialisation de la médecine pénitentiaire devient ainsi un moyen de s’autonomiser non pas du ministère de la Justice mais du secteur médical. La réforme de 1994 marque l’échec de cette tentative de spécialisation médicale. Elle résulte de la rencontre entre un « segment » de praticiens défendant l’idée d’une médecine non-spécifique avec quelques magistrats-militants, issus du Syndicat de la magistrature, en poste à l’Administration pénitentiaire favorables à un « décloisonnement » de l’institution carcérale. La loi du 18 janvier 1994 marque l’aboutissement de cette stratégie et l’échec de la tentative de spécialisation. A la « médecine pénitentiaire », désormais rattachée à un passé stigmatisant révolu, succéderait une « médecine exercée en milieu carcéral ».L’enjeu de cette thèse est par conséquent de retracer la sociogenèse d’une réforme à partir des dynamiques qui traversent un groupe professionnel, d’une part, et des transformations qui affectent un secteur d’action publique, d’autre part. On montrera également que la spécialisation de la médecine ne peut être comprise que si elle est articulée à d’autres logiques et qu’elle ne peut ainsi être réduite à sa seule dimension médicale. / Article 2 of French law No 94-43 of January 18, 1994, which concerns the transfer of the organization of health care in prisons from the Ministry of Justice to the public hospital service, has often been presented as a necessary public health reform considering the state of French prisons. The AIDS epidemic and the voluntary work of the Ministry of Health and the Ministry of Justice have revealed the need for what has been called a “sanitary revolution”. However, the conditions required for this reform would seem to require a dual approach: both professional and institutional, which this study will underline. Indeed, The French law of January 18, 1994 is also the reform of a profession, and of a sector of action, that is strongly criticized publicly. The reform of organization of health care in prisons underlines the failure of a strategy for a medical specialty, and is viewed by a few observers as an attempt by some practitioners to establish a particular position within the medical sector.Launched in the early sixties by the very first Doctor-inspector for prisons, Georges Fully, the assertion of specific “ health care in prison” was designed to give more legitimacy to the practitioners and therefore to allow them a greater level of autonomy from their employer, the prison administration. The specialization was designed to be an additional resource to help to put an end to the tension that the practitioners working in prison had to face, between their contract status at the Ministry of Justice and their status as general practitioners working in prisons . However, after the violent protests in prisons during the seventies, the organisation of “ health care in prisons” became for the new Doctor-inspector, Solange Troisier, a means of legitimizing the work of a discredited public service. The consecration of a specific medical practice for prisoners was also for her a means of asserting the requirements of the Code of Criminal Procedure over those of the Code of Medical Ethics. Thus the specialization of health care in prison became a means of empowerment not for the Ministry of Justice but for the medical sector.The reform of 1994 marks the failure of this attempt of medical specialization. It results from interactions between a group of practitioners defending the idea of a non-specific medical care and several militant magistrates, coming from the trade union of magistrates, working in the prison administration who were in favour of a opening-out of the penitentiary institution. The French law of January 18, 1994, highlights the accomplishment of this type of strategy and the failure to create a specialized health care in prison, the latter being then attached to a stigmatized and outdated past.The issue of this thesis is consequently to explore the sociogenesis of a reform from the dynamics which guide a professional group, on the one hand, and the evolutions which affect a public sector of action, on the other hand. We will also show that the specialization of medicine can be understood only if it is apprehended differently and subsequently cannot be reduced only to its medical dimension.
97

Advokát a klient - vzájemná práva a povinnosti / Attorney and client - mutual rights and obligations

Kuklík, Jiří January 2016 (has links)
Resumé Theme of this thesis is legal relationship attorney - client and their mutual rights and obligations. I focused on the current legal regulation contained in the Act No. 85/1996 Coll., advocacy law, and related legal regulations, primarily in professional regulation published by Czech bar association. My objective was to try to give all- embracing explanation of this theme even though I realised this theme and all its aspects is too extensive to be explained completely. This thesis is divided into six parts, which are further systematically divied into chapters. First part gives basic historical review of development of legal regulation of advocacy since ancient Rome. Second part gives definitions of the most important terms of this thesis - attorney and client, with evident orientation on legal regulation of conditions which must fulfil a person in orded to become an attorney. Third part deals with possible methods of constitution of legal relationship between attorney and client (to conclude a contract or to be appointed by court or to be designated by Czech bar assosiation) and related attorney's obligation to refuse to plead client in certain situations as well as termination of this relationship. Fourth part is dedicated to individual rights and obligations o attorneys and clients. Each one is...
98

Advokát a klient - vzájemná práva a povinnosti / The lawyer and the client - mutual rights and obligations

Výprachtická, Šárka January 2016 (has links)
The thesis is focused on the internal relationship between the lawyer and the client. Although this topic was already processed many times, I believe that, in particular, in the context of the current case law and the amendment of certain provisions, this work may contribute to the better understanding of this topic. The thesis is systematically divided into six chapters. In the first chapter, there is outlined the nature of this relationship and stressed out the importance of mutual trust. To further break down the individual rights and obligations in detail, it is necessary to outline the formation of the relationship between solicitor and client first. It is important to note that the specific obligations imposed on lawyer legislation even before the formation of the legal relationship. Under the conditions described in the first chapter, the lawyer has a duty to refuse to provide legal services to the client, which can be considered as the pre-contractual obligation. Attorney has an obligation, although there is still no relationship between them. Considering the entire work, the second and third chapters are the most important ones. In the second chapter I push the reciprocal rights and obligations in the context of their legal arrangements, both legal and underpinned, and the professional and...
99

Confidentiality enforcement using dynamic information flow analyses

Le Guernic, Gurvan January 1900 (has links)
Doctor of Philosophy / Department of Computing and Information Sciences / David A. Schmidt, Anindya Banerjee, Thomas Jensen / With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches.
100

The implementation of ISA 701-key audit matters: : Empirical evidence on auditors adjustments in the new audit report

Dogan Bozan, Berivan, Arefaine, Bana January 2017 (has links)
The previous audit report gained a lot of criticism since it contained to much standard text that failed to convey valuable information for users. This lead to IAASB implementing a new standard, called ISA 701-KAM, which was implemented by all listed companies in the end of 2016. The purpose of KAM is to make the audit report less standardized and instead provide transparent and entity-specific information. However, there are those who believe that the confidentiality duty, which is prerequisite to be able to perform an audit, can stand in contrast to the new standard.  In order to investigate this issue, we have interviewed auditors to get their view of how they have implemented and applied KAM in the audit report. Our results show that auditors are skeptical in regards to the audit report being as entity-specific and transparent as IAASB expect it to be, since there exist an underlying fear of overstepping TCD.

Page generated in 0.0794 seconds