Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Purdue University" +contributor:("Samuel P. Liles"). Showing records 1 – 2 of 2 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Purdue University

1. Vargas Silva, Hans Christian. The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools.

Degree: MS, Computer and Information Technology, 2014, Purdue University

The aim of this thesis is to determine if there are greater benefits than costs associated in the participation of public K-12 school corporations in the Indiana Cybersecurity Services Center (INCSC). This thesis is an ex-antecost-benefit analysis policy assessment of the INCSC. The study consisted of a sample of 6 school corporations from which 5 were classified as small and 1 was large. Three methods were considered for data collection; however conducting interviews was the most effective method due to the interaction with IT personnel from each organization in order to analyze current costs related to 4 areas of interest: (a) networking hardware; (b) Antivirus software; (c) computer hardware; (d) IT personnel. These costs were compared to those potential costs if products and/or services would be procured through the INCSC. School corporations, with the goal to enhance their level of information security, would only receive benefit from participating in the INCSC when procuring networking equipment and Antivirus software. The author also recommends exploring the costs and legal implications of data breaches as well as considering insurance products. Advisors/Committee Members: Melissa J. Dark, James E. Dietz, Brandeis H. Marshall, Samuel P. Liles.

Subjects/Keywords: Applied sciences; Education; Cost-benefit analysis; Cybersecurity; K-12 school corporation; Computer Sciences; Databases and Information Systems; Education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vargas Silva, H. C. (2014). The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/391

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vargas Silva, Hans Christian. “The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools.” 2014. Thesis, Purdue University. Accessed February 19, 2020. http://docs.lib.purdue.edu/open_access_theses/391.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vargas Silva, Hans Christian. “The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools.” 2014. Web. 19 Feb 2020.

Vancouver:

Vargas Silva HC. The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools. [Internet] [Thesis]. Purdue University; 2014. [cited 2020 Feb 19]. Available from: http://docs.lib.purdue.edu/open_access_theses/391.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vargas Silva HC. The Indiana Cybersecurity Services Center (INCSC): A Cost-Benefit Analysis For K-12 Schools. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/391

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

2. Xie, Di. User-differentiated hierarchical key management for the bring-your-own-device environments.

Degree: MS, Technology, 2014, Purdue University

To ensure confidentiality, the sensitive electronic data held within a corporation is always carefully encrypted and stored in a manner so that it is inaccessible to those parties who are not involved. During this process, the specific manners of how to keep, distribute, use, and update keys which are used to encrypt the sensitive data become an important thing to be considered. Through use of hierarchical key management, a technique that provides access controls in multi-user systems where a portion of sensitive resources shall only be made available to authorized users or security ordinances, required information is distributed on a need-to-know basis. As a result of this hierarchical key management, time-bound hierarchical key management further adds time controls to the information access process. There is no existing hierarchical key management scheme or time-bound hierarchical key management scheme which is able to differentiate users with the same authority. When changes are required for any user, all other users who have the same access authorities will be similarly affected, and this deficiency then further deteriorates due to a recent trend which has been called Bring-Your-Own-Device. This thesis proposes the construction of a new time-bound hierarchical key management scheme called the User-Differentiated Two-Layer Encryption-Based Scheme (UDTLEBC), one which is designed to differentiate between users. With this differentiation, whenever any changes are required for one user during the processes of key management, no additional users will be affected during these changes and these changes can be done without interactions with the users. This new scheme is both proven to be secure as a time-bound hierarchical key management scheme and efficient for use in a BYOD environment. Advisors/Committee Members: Baijian Yang, Baijian Yang, John A. Springer, Samuel P. Liles.

Subjects/Keywords: Information Technology; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, D. (2014). User-differentiated hierarchical key management for the bring-your-own-device environments. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Thesis, Purdue University. Accessed February 19, 2020. http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Web. 19 Feb 2020.

Vancouver:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Internet] [Thesis]. Purdue University; 2014. [cited 2020 Feb 19]. Available from: http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.