51 |
A new model for computer network security risk analysis /Martel, Sophie, January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2002. / Includes bibliographical references (p. 167-172). Also available in electronic format on the Internet.
|
52 |
Cyberciege scenario illustrating integrity risks to a military like facility /Fielk, Klaus W. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
|
53 |
Hardware & software codesign of a JPEG200 watermarking encoderMendoza, Jose Antonio. Kougianos, Elias, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
54 |
Region aware DCT domain invisible robust blind watermarking for color imagesNaraharisetti, Sahasan. Mohanty, Saraju, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
55 |
A socio-technical perspective on information security knowledge and attitudes /Long, Cheri Lanette, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 210-223). Available also in a digital version from Dissertation Abstracts.
|
56 |
Preserving privacy with user-controlled sharing of verified informationBauer, David Allen. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
57 |
Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
|
58 |
HDT crypt: Compression and Encryption of RDF DatasetsFernandez Garcia, Javier David, Kirrane, Sabrina, Polleres, Axel, Steyskal, Simon January 2018 (has links) (PDF)
The publication and interchange of RDF datasets online has experienced significant growth in recent years, promoted by different but complementary efforts, such as Linked Open Data, the Web of Things and RDF stream processing systems. However, the current Linked Data infrastructure does not cater for the storage and exchange of sensitive or private data. On the one hand, data publishers need means to limit access to confidential data (e.g. health, financial, personal, or other sensitive data). On the other hand, the infrastructure needs to compress RDF graphs in a manner that minimises the amount of data that is both stored and transferred over the wire. In this paper, we demonstrate how HDT - a compressed serialization format for RDF - can be extended to cater for supporting encryption. We propose a number of different graph partitioning strategies and discuss the benefits and tradeoffs of each approach.
|
59 |
Obecné nařízení o ochraně osobních údajů: výzvy pro cloud / General Data Protection Regulation: Challenges for the CloudStudihradová, Barbora January 2018 (has links)
1 CHARLES UNIVERSITY IN PRAGUE Faculty of Law Barbora Studihradová General Data Protection Regulation: Challenges for the Cloud Master's thesis Master's thesis supervisor: JUDr. Magdaléna Svobodová, Ph.D. Department of European Law Date of completion (manuscript closure): 13 April 2018 2 General Data Protection Regulation: Challenges for the Cloud Abstract This thesis recognizes and analyses some of the fundamental challenges that the General Data Protection Regulation poses for cloud computing. Its aim is to answer the question whether the GDPR can be regarded as cloud friendly. The hypothesis that is proposed and tested is that it cannot be, since it includes concepts and wording that are impractical in cloud computing. This is assessed based on how different cloud computing services function. The thesis therefore lays down foundations of both legal and technical understanding of the data protection in the cloud in the first chapters. The analysis of the challenges then builds on this knowledge. The challenges of the GDPR for the cloud are divided into five groups. Firstly, what is regulated as personal data in the cloud is consider with regard to the concepts of anonymisation, pseudonymisation and encryption. Secondly, controller - processor relationship and their obligations in the complex cloud...
|
60 |
Customer ratings as a vector for discrimination in employment relations? Pathways and pitfalls for legal remediesKullmann-Klocke, Miriam, Ducato, Rossana, Rocca, Marco 18 March 2018 (has links) (PDF)
The use of customer ratings to evaluate worker performance is increasingly worrisome because of its widespread use in the gig-economy. As scholars in computer and social sciences denounce, this practice entails the risk of producing discriminatory outcomes, by reproducing biases existing in society. By drawing an analogy with discriminatory practices adopted by an employer to satisfy its customers' preferences, we propose a legal analysis of this phenomenon grounded in EU non-discrimination law. Thus, we first analyse the issues related to the application of non-discrimination law to (alleged) self-employed workers. Then, we address the lack of access for the individual worker to the data regarding customers' ratings. We conclude by arguing that the use of customer ratings should be considered as a suspect criterion, while the current (EU) non-discrimination laws should be modernised through a clearer inclusion of (alleged) self-employed workers. / Series: ohne Reihe
|
Page generated in 0.0884 seconds