• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 10
  • 8
  • 6
  • 3
  • 3
  • Tagged with
  • 47
  • 47
  • 16
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Potential of mobile devices in New Zealand healthcare : a thesis submitted to the faculty of Massey University at Albany in partial fulfilment of the requirements for the degree of Masters of Engineering in Software

Mirza, Asfahaanullah Baig January 2008 (has links)
This thesis examines the potential for the use of mobile devices in New Zealand healthcare. Adoption of mobile technology can potentially improve information access at point of care, increase efficiency and patient safety, significantly reduce costs, enhance workflow, and promote evidence-based practice to help make effective decisions. Mobile devices of different size and form such as laptops, tablet PCs, PDAs, smart phones, mobile phones, and RFID offer portability, remote access to clinical data, traceability, convergence, and connectivity which traditional computers cannot emulate. The pervasiveness of mobile devices is increasing both globally and within New Zealand. The potential of mobile technology in healthcare has been recognized by many developed countries; there is adequate evidence for improving productivity, efficiency, and patient engagement. The study focuses on the three prominent healthcare sectors in New Zealand: Primary, Secondary, and Community. As mobile technology is still an underdeveloped area within New Zealand’s healthcare industry, the use of a qualitative research approach involving surveys and interviews helps to determine which m-health applications are most appropriate to adopt here. The sample surveyed consists of health providers, health strategists, and technology vendors. The potential of mobile devices that were identified from the interviews included real-time access to information such as clinical data, drug database, and medical references. the use of SMS reminders and alerts, use of RFID to reduce medical errors, manage patients and assets, and for identification of medical equipment and drug identification. Over 80 percent of the participants considered privacy, confidentiality, and security to be very important challenges in the m-health domain. Many challenges and implications were identified, including technical constraints such as form factor of mobile devices, storage space, limited battery life, durability, and reading distance of RFID devices. Privacy, security, and ethical issues were discussed including the sensitivity of personal data, sending and receiving of clinical data, RFID tracking ability, security, and encryption standards, authentication barriers, and cultural barriers.
2

Konzeption und Realisierung einer dynamischen Verbindungsoptimierung für .NET Remoting

Theisinger, Michael. January 2003 (has links)
Konstanz, FH, Diplomarb., 2003.
3

Establishing and controlling remote access to corporate networks

Lourens, Jacques Ernst 13 August 2012 (has links)
M.Comm. / The problem of establishing and controlling remote access to corporate networks has become one of the most difficult issues facing network administrators and information security professionals (Tipton & Krause (b), 2001:99). As the connection devices become more powerful and less expensive, more and more personally owned devices make their way to the connected edge of the network. The rise of the Internet as an accepted vehicle for business use has dramatically increased the points of entry to the corporate network. As employees and third parties gain mobility through the use of laptops, smart phones and Personal Digital Assistants (PDAs), the threat to organisational security grows (Cartwright, 2001). There are three main reasons why remote access connections are often insecure: Lack of awareness regarding security risks associated with remote access; Protecting a remote access connection is a complex task which is unlikely to be done well unless a methodical approach is taken; and Remote locations are not under the direct control of the organisation and are inherently insecure (Information Security Forum (a), 1999). The purpose of this short dissertation is to: Provide an overview of remote access, including concepts and definitions; Identify the risks associated with remote access to corporate networks; Identify possible controls to mitigate these risks; and highlight possible future trends regarding remote access.
4

Secure remote network administration and power management

Sullivan, Mark P. 06 1900 (has links)
Approved for public release; distribution is unlimited / Remote Network Administration allows network administrators to manage their networks while being physically separated from the network equipment. Having the capability to manage wired and wireless networks securely, from remote locations, can substantially reduce operating expenses across the entire Department of Defense A variety of methods for remotely managing networks is explored for both wired and wireless networks. Requirements for remote network administration are identified. Chief among them is security and the ability to remotely manage power. Several widely-used remote management utilities are examined. All fail to meet these two requirements. A new power control device is presented that can be managed securely and remotely. / Captain, United States Air Force
5

Latency reduction techniques for remote memory access in ANEMONE

Lewandowski, Mark. Gopalan, Kartik. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Kartik Gopalan, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 6, 2006). Document formatted into pages; contains ix, 43 pages. Includes bibliographical references.
6

Secure Remote Access to Telemetry: A Study in How to Allow Remote Access to Satellite Telemetry Data

McClinton, Arthur T., Jr. 10 1900 (has links)
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada / The need to allow remote access to telemetry data from closed networks has long existed. To ensure the correct engineers are available for anomaly resolution, NOAA developed the Secure Remote Access Server (SRAS) to allow transfer of satellite telemetry to an external secure server. SRAS uses one-way links to protect the ground system and secure communications for all communications with the user. After the SRAS was developed, a similar system was developed to support file transfers. This paper provides an overview of these systems and lessons learned in the development of one-way fiber systems.
7

Zugang zu elektronischen Ressourcen für externe Benutzer in wissenschaftlichen Bibliotheken : Konzeption und praktische Anwendung /

Simanowski, Jörg. January 2008 (has links)
Zugl.: Berlin, Humboldt-Universiẗat, Masterarbeit, 2008.
8

Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?

Palm, Patrik January 2015 (has links)
I denna uppsats avser författaren att utvärdera om det är möjligt för en hemanvändare attskapa en trojan med ett program som genererar trojaner och med hjälp av andra gratisverktyg ta sig förbi antivirus-program. Samtidigt så kommer antivirus-program utvärderas angående hur dem lyckas skydda sig mot de skapade trojanerna och ge en överblick om hur skyddet är, både via uppladdning av trojaner till VirusTotal samt test av olika antivirusprogram. Den vetenskaplig forskning som gjorts tidigare som denna uppsats kommer vara snarlikgår att finna i [5]. Det forskas även om nya idéer för att upptäcka trojaner redan när dembörjar kommunicera[4] Uppsatsens resultat består av tre delar, resultat av uppladdning av trojaner viaVirusTotal, resultat av skanning med antivirus-program samt en kort analys omresultaten. I resultatet om VirusTotal så får en överblick om hur antivirus-programupptäcker Remote Access Trojaner(RAT) som blivit genererade i ett program.Dessa RATs görs även mer svårupptäckta av verktyg som går att få tag i gratis, cryptersför att kryptera trojanerna och binders för att binda trojaner ihop med en annan fil. Efterantivirus-skanningen redovisas resultat om hur ett antal utvalda antivirus-program klararav att skydda en PC mot RATs. I resultaten upptäcktes det att säkerheten är i vissa fallganska undermålig, men att det även finns antivirus-program som skyddar betydligtbättre än andra.
9

The Remote Socket Architecture a proxy based solution for TCP over wireless /

Schläger, Morten. Unknown Date (has links) (PDF)
Techn. University, Diss., 2004--Berlin.
10

Enhancing the security of wireless sensor network based home automation systems

Gill, Khusvinder January 2009 (has links)
Home automation systems (HASs)seek to improve the quality of life for individuals through the automation of household devices. Recently, there has been a trend, in academia and industry, to research and develop low-cost Wireless Sensor Network (WSN) based HASs (Varchola et al. 2007). WSNs are designed to achieve a low-cost wireless networking solution, through the incorporation of limited processing, memory, and power resources. Consequently, providing secure and reliable remote access for resource limited WSNs, such as WSN based HASs, poses a significant challenge (Perrig et al. 2004). This thesis introduces the development of a hybrid communications approach to increase the resistance of WSN based HASs to remote DoS flooding attacks targeted against a third party. The approach is benchmarked against the dominant GHS remote access approach for WSN based HASs (Bergstrom et al. 2001), on a WSN based HAS test-bed, and shown to provide a minimum of a 58.28%, on average 59.85%, and a maximum of 61.45% increase in remote service availability during a DoS attack. Additionally, a virtual home incorporating a cryptographic based DoS detection algorithm, is developed to increase resistance to remote DoS flooding attacks targeted directly at WSN based HASs. The approach is benchmarked against D-WARD (Mirkovic 2003), the most effective DoS defence identified from the research, and shown to provide a minimum 84.70%, an average 91.13% and a maximum 95.6% reduction in packets loss on a WSN based HAS during a DoS flooding attack. Moreover, the approach is extended with the integration of a virtual home, hybrid communication approach, and a distributed denial of defence server to increase resistance to remote DoS attacks targeting the home gateway. The approach is again benchmarked against the D-WARD defence and shown to decrease the connection latency experienced by remote users by a minimum of 90.14%, an average 90.90%, and a maximum 91.88%.

Page generated in 0.0396 seconds