Spelling suggestions: "subject:"internet domain named"" "subject:"internet domain games""
1 |
IDNS [i.e. Incremental Domain Name System] : an efficient approach to portability and mobility support /Chen, Yu, January 2002 (has links)
Thesis (Ph. D.)--Lehigh University, 2003. / Includes vita. Includes bibliographical references (leaves 89-96).
|
2 |
Limiting DNS covert channels and network validated DNSMcCracken, Rex D. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains ix, 107 p. : ill. Includes abstract. Includes bibliographical references (p. 104-107).
|
3 |
An analysis of domain name dispute resolution in Hong KongWong, Iris Yuen Ting. January 2005 (has links) (PDF)
Thesis (M.A.)--City University of Hong Kong, 2005. / Title from title screen (viewed on 27 Mar. 2006) "Master of arts in arbitration and dispute resolution research paper." Includes bibliographical references.
|
4 |
Der internationale Schutz von Domainnamen und Markenrechten im Internet Analyse unter Berücksichtigung deutschen RechtsRau, Marco. January 2010 (has links)
Univ., Diss., 2009--Mainz. / Includes bibliographical references.
|
5 |
The effects of domain knowledge and web experience on user search performance in a digital library context /Che Kassim, Ahmad Rafee, January 2003 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 2003. / Typescript. Vita. Includes bibliographical references (leaves 142-148). Also available on the Internet.
|
6 |
The effects of domain knowledge and web experience on user search performance in a digital library contextChe Kassim, Ahmad Rafee, January 2003 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 2003. / Typescript. Vita. Includes bibliographical references (leaves 142-148). Also available on the Internet.
|
7 |
Critical infrastructure protection and the Domain Name Service (DNS) systemSnyder, Mark E. January 2008 (has links) (PDF)
Thesis (M.S.)--Missouri University of Science and Technology, 2008. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
|
8 |
Extensions to the self protecting object model to facilitate integrity in stationary and mobile hostsBrandi, Wesley 13 March 2014 (has links)
M.Sc. (Computer Science) / In this dissertation we propose extensions to the Self Protecting Object (SPO) model to facilitate the sharing of information in a more effective manner. We see the sharing ofinformation as the sharing of objects that provide services. Sharing objects effectively is allowing the objects to be used in a secure environment, independent of their location, in a manner usage was intended. The SPO model proposed by Olivier [32] allows for objects in a federated database to be moved from one site to another and ensures that the security policy of the object will always be respected and implemented, regardless of its location. Although the SPO model does indeed allow for objects (information) to be shared effectively, it fails to address issues of maintaining integrity within objects. We therefore define the notion of maintaining integrity within the spa model and propose a model to achieve it. We argue that ensuring an SPO is only used in a way usage was intended does not suffice to ensure integrity. The model we propose is based on ensuring that modifications to an SPO are only executed if the modification does not violate the constraints defined for the Sf'O, The model" allows for an spa to maintain its unique identity in addition to maintaining its integrity. The SPO model is designed to be used in a federated database on sites that are stationary. Therefore, having addressed the issue of maintaining integrity within SPOs on stationary sites in the federated database, we then introduce the notion of a mobile site: a site that will eventually disconnect from the federated database and become unreachable for some time. Introducing the mobile site into the federated database allows us to propose the Mobile Self Protecting Object (MSPO) and its associated architecture. Because of the nature of mobile sites, the original model for maintaining integrity can not be applied to the MSPO architecture. We therefore propose a mechanism (to be implemented in unison with the original model) to ensure the integrity of MSPOs on mobile sites. We then discuss the JASPO prototype. The aim of the prototype was to determine if the Self Protecting Object model was feasible using current development technologies. We examine the requirements identified in order for the prototype to be successful and discuss how these were satisfied. Several modifications were made to the original spa model, including the addition of a new module and the exclusion of others, we discuss these modifications and examine why they were necessary.
|
9 |
The regulation of domain name disputes in South AfricaNyachowe, Pasno N January 2003 (has links)
This treatise provides an overview of the procedures for the registration, regulation and protection of Internet domain names. An analysis of legal rules applicable to domain names and problems related to the protection of domain names in South Africa, United State, United Kingdom and internationally is undertaken. The problems includes cybersquatting, misuse of personal names, reverse domain hijacking, misuse of meta tags and keywords. The treatise established possible solutions applicable to South Africa by investigating how other countries have dealt with such problems, and further investigated the extent to which South African legislation is suited to deal with such problems. An investigation of the regulation in terms of the Electronic Communications and Transactions Act 25 of 2002 is briefly attempted, and proposals for the future on the South African domain name system suggested.
|
10 |
The resolution of domain name disputes : a comparison of Jordan, United Kingdom, United States, and ICANN rulesAbuGhazaleh, Shereen N. A. January 2010 (has links)
Domain names constitute a valuable key element in electronic commerce. However, some intend to benefit from this fact by registering identical or similar trademarks as domain names, thereby depriving the legitimate owners from obtaining the domain name. This thesis aims to evaluate the protection provided for domain names, by illustrating several models that are under civil, common and international jurisdiction, namely, Jordan, the United Kingdom, the United States and by ICANN. In the first model there are no special regulations. In the second model alternative regulations are applied while, in the third model, a special act is provided; the fourth model constitutes a global protection for specific types of domain name disputes. It is concluded that the absence of a unified legal identity for domain names is the reason why diverse positions are required to protect them; concomitantly, domain name disputes have not been sufficiently addressed, and there is a necessity to provide domain names with a globally comprehensive protection mechanism.
|
Page generated in 0.0841 seconds