• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 7
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 31
  • 10
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Arbetsrutiner för dagvatten i Gävle kommun : Förbättringsförslag

Hansson, Tomas, Skoglund, Erik January 2016 (has links)
Through a preliminary study, made by the writers of this paper, it turned out that the stormwater-management in the municipality of Gävle does have some flaws, which can result in making the work with stormwater less effective than it could be. The aim for this project has been to find possible solutions that in the long run could improve the stormwater-management in the municipality of Gävle. A goal was to collect data from operators to see where they saw room for improvement. A literature study and a survey had been made in order to potentially find more undetected flaws in the stormwater-management in the municipality of Gävle. The result from the used methods was that there are flaws in the communication, informing-process, the reporting of the work with stormwater and financing. The writers of these papers’ suggestions is, among some, to clarify the funding, make a contact-list, to encourage stakeholders to report their work with stormwater and to formulate a common goal for the stormwater. The results show that there is potential for improvement for how the current work with stormwater is being done. If the suggestions are taken into consideration the municipality of Gävle might come closer to realizing their vision, being one of the best eco-municipality in Sweden. / Det visade sig i en förstudie av rapportförfattarna att dagvattenhanteringen i Gävle kommun har brister som kan resultera i att dagvattenhanteringen inte blir lika effektivt som den skulle kunna vara. Syftet med projektet var att ta fram ett antal förbättringsförslag för att i längden hjälpa Gävle kommun att få ett bättre dagvattenarbete. Ett mål var att samla in data från aktörer för att se var de ansåg att det fanns förbättringsmöjlighet. Genom att genomföra en litteraturstudie, en jämförelse mellan några kommuners dagvattenpolicy och en enkätundersökning var tanken att eventuellt identifiera ytterligare förbättringsmöjligheter i dagvattenarbetet i Gävle kommun. Resultatet att det finns förbättringsmöjligheter gällande kommunikation, informering, rapportering och finansieringsansvar. Författarna har givit några förbättringsförslag bl.a. att tydliggöra finansieringen, sammanställa en kontaktlista, presentera sitt dagvattenarbete i miljörapporter och sätta ett gemensamt mål för dagvatten. Resultatet från detta projekt och från förstudien visar att det finns förbättringspotential för dagvattenarbetet i kommunen. Om förbättringsförslagen skulle tas i åtanke skulle Gävle kommun kunna komma närmare sin vision, att bli en av de bästa miljökommunerna i Sverige.
2

Detecting known host security flaws over a network connection

Andersson, Martin January 2007 (has links)
<p>To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be made. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used.</p><p>There is no common way of merging information from different VA tools. Therefore the Vulnerability Assessment Information Handler (VAIH) has been developed. The VAIH system consists of three parts. First, a intermediate language format defined in XML. Second, modules that converts the output of VA tools to the intermediate language format. Third, a program for reading and displaying the intermediate language format.</p><p>The VAIH system makes it possible to merge the results from vulnerability assessment tools into one file that can be displayed and edited through a GUI.</p>
3

Our flaws are ‘only human’: the role of the human nature concept in group-protection

Koval, Peter January 2009 (has links)
Negative characterisations of social groups threaten group members’ social identities evoking various group-protective responses. Drawing on research about the functions of lay conceptions of humanness in social perception, the current research investigated a novel group-protective strategy: believing that an in group’s negative traits (flaws) are fundamental aspects of ‘human nature’ (HN). A similar protective strategy has been documented when acknowledging flaws in the individual self; this was extended to the acknowledgement of in group flaws in the current studies. In Study 1 (N = 77),participants’ in group-descriptiveness ratings of flaws were most strongly predicted by their HN ratings of flaws, suggesting that people may selectively acknowledge HN flaws as in group-descriptive. Study 2 (N = 51) demonstrated that flaws were rated higher on HN when attributed to an in group than to an out group. However, this effect was not found for positive traits, suggesting that it may reflect a motivation to protect a threatened in group-identity. Study 3 (N = 79) replicated this asymmetrical ‘humanising of in group flaws’ effect, and found that it was independent of desirability. In addition in group-identification was measured in Study 3 and found not to moderate the humanising of in group flaws. / Finally, in Study 3 participants also rated traits on an alternative sense of humanness, known as ‘human uniqueness’ (HU). The asymmetrical humanising of in group flaws effect was not found for the HU dimension, indicating that HN may be better suited to the protective function of mitigating flaws. These studies indicate that HN beliefs are systematically related to in group flaw-acknowledgement and suggest that in order to mitigate their in group’s flaws and thus protect the value of their social identities, people may be motivated to (a) selectively acknowledge HN flaws as in group-descriptive; and (b) ‘humanise’ flaws attributed to their in group Further more, the current research supports the claim that HN is an important dimension of social perception (e.g., Haslam et al., 2008); extends the relevance of this dimension to perceptions of in groups; and suggests that the HN concept should be understood as dynamic and flexible, rather than fixed.
4

GSM-Security: A Survey and Evaluation of the Current Situation / GSM-säkerhet: En Översikt och evaluering av nuvarande situation

Yousef, Paul January 2004 (has links)
<p>The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality. </p><p>The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked. </p><p>The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality. </p><p>Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality. </p><p>The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time. </p><p>In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.</p>
5

Security in Unlicensed Mobile Access

Eriksson, Martin January 2005 (has links)
<p>Unlicensed Mobile Access (UMA) provides transparent access to 2G and 3G networks for Mobile Stations over the unlicensed radio interface. Unlicensed radio tehnologies such as Bluetooth or WLAN technology connects the Mobile Station to the fixed IP network of the home or office and delivers high bandwith to the Mobile Station.</p><p>The purpose of this report is to examine if subscribers can feel as secure using UMA as they do when using any of the alternetive mobile technologies that UMA supports. The security evaluation is performed by first investigating the current security level of GSM, GPRS and UMTS and then compares them to the security mechanisms of UMA.</p><p>This evaluation noticed two distinct flaws in UMA that could compromise security. The conclusion is that these flaws do not have a major inpact and UMA does provide a general higher level of security than the 2G and 3G counterparts.</p>
6

Security in Unlicensed Mobile Access

Eriksson, Martin January 2005 (has links)
Unlicensed Mobile Access (UMA) provides transparent access to 2G and 3G networks for Mobile Stations over the unlicensed radio interface. Unlicensed radio tehnologies such as Bluetooth or WLAN technology connects the Mobile Station to the fixed IP network of the home or office and delivers high bandwith to the Mobile Station. The purpose of this report is to examine if subscribers can feel as secure using UMA as they do when using any of the alternetive mobile technologies that UMA supports. The security evaluation is performed by first investigating the current security level of GSM, GPRS and UMTS and then compares them to the security mechanisms of UMA. This evaluation noticed two distinct flaws in UMA that could compromise security. The conclusion is that these flaws do not have a major inpact and UMA does provide a general higher level of security than the 2G and 3G counterparts.
7

Detecting known host security flaws over a network connection

Andersson, Martin January 2007 (has links)
To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be made. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used. There is no common way of merging information from different VA tools. Therefore the Vulnerability Assessment Information Handler (VAIH) has been developed. The VAIH system consists of three parts. First, a intermediate language format defined in XML. Second, modules that converts the output of VA tools to the intermediate language format. Third, a program for reading and displaying the intermediate language format. The VAIH system makes it possible to merge the results from vulnerability assessment tools into one file that can be displayed and edited through a GUI.
8

GSM-Security: A Survey and Evaluation of the Current Situation / GSM-säkerhet: En Översikt och evaluering av nuvarande situation

Yousef, Paul January 2004 (has links)
The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality. The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked. The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality. Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality. The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time. In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.
9

Thermo-Mechanical Fatigue Assessment of Marine Boiler : Using linear Finite Element Analyses

Alagbada, Adefemi Samuel January 2020 (has links)
This thesis is on fatigue crack growth assessments of a thermomechanical loaded Marine Boiler- Sunrod CPDB12. The installation position of the marine boiler in the ship in relation to its fatigue life under mode 1 loading is investigated. Thermomechanical loading embodies pressures, temperatures, RAO, subjected to the rigid body dynamic of ship in the marine environment.   Linear elastic fracture mechanics (LEFM) method was used is predicting the growth rates of the welding flaws at the joint based on stress range of the Paris law relationship. FEA Numerical simulation delivered better crack growth rate assessments and life predictions of the smallest detectable flaws in the boiler.   The identified smallest detestable flaws at the welding joint diminishing the designed safe life of the boiler significantly.  Also, installation position within the ship do affect the fatigue life of the boiler.
10

A Taxonomy of Computer Attacks with Applications to Wireless Networks

Lough, Daniel Lowry 30 April 2001 (has links)
The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with the aspect of security in mind; and security that is present is typically added as an afterthought. What makes these systems so vulnerable is that the security design process is based upon assumptions that have been made in the past; assumptions which now have become obsolete or irrelevant. In addition, fundamental errors in the design and implementation of systems repeatedly occur, which lead to failures. This research presents a comprehensive analysis of the types of attacks that are being leveled upon computer systems and the construction of a general taxonomy and methodologies that will facilitate design of secure protocols. To develop a comprehensive taxonomy, existing lists, charts, and taxonomies of host and network attacks published over the last thirty years are examined and combined, revealing common denominators among them. These common denominators, as well as new information, are assimilated to produce a broadly applicable, simpler, and more complete taxonomy. It is shown that all computer attacks can be broken into a taxonomy consisting of improper conditions: <b>V</b>alidation <b>E</b>xposure <b>R</b>andomness <b>D</b>eallocation <b>I</b>mproper <b>C</b>onditions <b>T</b>axonomy; hence described by the acronym <b>VERDICT</b>. The developed methodologies are applicable to both wired and wireless systems, and they are applied to some existing Internet attacks to show how they can be classified under VERDICT. The methodologies are applied to the IEEE 802.11 wireless local area network protocol and numerous vulnerabilities are found. Finally, an extensive annotated bibliography is included. / Ph. D.

Page generated in 0.0488 seconds