Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Storage security). Showing records 1 – 30 of 89 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Levels

Languages

Country

▼ Search Limiters


Penn State University

1. Chaitanya, Shiva. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.

Degree: PhD, Computer Science and Engineering, 2009, Penn State University

Storage security has emerged as a significant area of research in the last decade. Given the rise of sensitive digital data such as online medical… (more)

Subjects/Keywords: Storage Security; Performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chaitanya, S. (2009). ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9939

Chicago Manual of Style (16th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Doctoral Dissertation, Penn State University. Accessed June 25, 2019. https://etda.libraries.psu.edu/catalog/9939.

MLA Handbook (7th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Web. 25 Jun 2019.

Vancouver:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2019 Jun 25]. Available from: https://etda.libraries.psu.edu/catalog/9939.

Council of Science Editors:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/9939


Penn State University

2. Butler, Kevin Raymond Boyce. Leveraging Emerging Disk Functionality for New Security Services.

Degree: PhD, Computer Science and Engineering, 2010, Penn State University

 The complexity of modern operating systems makes securing them a challenging problem. However, changes in the computing model, such as the rise of cloud computing… (more)

Subjects/Keywords: security; storage; operating systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Butler, K. R. B. (2010). Leveraging Emerging Disk Functionality for New Security Services. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/11115

Chicago Manual of Style (16th Edition):

Butler, Kevin Raymond Boyce. “Leveraging Emerging Disk Functionality for New Security Services.” 2010. Doctoral Dissertation, Penn State University. Accessed June 25, 2019. https://etda.libraries.psu.edu/catalog/11115.

MLA Handbook (7th Edition):

Butler, Kevin Raymond Boyce. “Leveraging Emerging Disk Functionality for New Security Services.” 2010. Web. 25 Jun 2019.

Vancouver:

Butler KRB. Leveraging Emerging Disk Functionality for New Security Services. [Internet] [Doctoral dissertation]. Penn State University; 2010. [cited 2019 Jun 25]. Available from: https://etda.libraries.psu.edu/catalog/11115.

Council of Science Editors:

Butler KRB. Leveraging Emerging Disk Functionality for New Security Services. [Doctoral Dissertation]. Penn State University; 2010. Available from: https://etda.libraries.psu.edu/catalog/11115

3. Upadhyay, Jalaj. Integrity and Privacy of Large Data.

Degree: 2015, University of Waterloo

 There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the… (more)

Subjects/Keywords: Proof-of-storage; Unconditional Security; Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Upadhyay, J. (2015). Integrity and Privacy of Large Data. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10015

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Upadhyay, Jalaj. “Integrity and Privacy of Large Data.” 2015. Thesis, University of Waterloo. Accessed June 25, 2019. http://hdl.handle.net/10012/10015.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Upadhyay, Jalaj. “Integrity and Privacy of Large Data.” 2015. Web. 25 Jun 2019.

Vancouver:

Upadhyay J. Integrity and Privacy of Large Data. [Internet] [Thesis]. University of Waterloo; 2015. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10012/10015.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Upadhyay J. Integrity and Privacy of Large Data. [Thesis]. University of Waterloo; 2015. Available from: http://hdl.handle.net/10012/10015

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

4. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed June 25, 2019. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 25 Jun 2019.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Chiang, Chao-hsun. The implementation of secure cloud storage caching system.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud storage is very popular in recent years. People usually store their important data in cloud storage. However, the cloud storage provider might secretly access… (more)

Subjects/Keywords: Cloud; Cache; Data security; Cloud storage; Cloud storage gateway

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, C. (2014). The implementation of secure cloud storage caching system. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Chao-hsun. “The implementation of secure cloud storage caching system.” 2014. Thesis, NSYSU. Accessed June 25, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Chao-hsun. “The implementation of secure cloud storage caching system.” 2014. Web. 25 Jun 2019.

Vancouver:

Chiang C. The implementation of secure cloud storage caching system. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 25]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang C. The implementation of secure cloud storage caching system. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

6. Huang, Jian. Exploiting intrinsic flash properties to enhance modern storage systems.

Degree: PhD, Computer Science, 2017, Georgia Tech

 The longstanding goals of storage system design have been to provide simple abstractions for applications to efficiently access data while ensuring the data durability and… (more)

Subjects/Keywords: Flash memory; Storage systems; Cloud storage; Wearable storage; Performance isolation; System security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, J. (2017). Exploiting intrinsic flash properties to enhance modern storage systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60162

Chicago Manual of Style (16th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 25, 2019. http://hdl.handle.net/1853/60162.

MLA Handbook (7th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Web. 25 Jun 2019.

Vancouver:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/1853/60162.

Council of Science Editors:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60162


University of Colorado

7. Sayler, Andy. Custos: A Flexibly Secure Key-Value Storage Platform.

Degree: MS, 2013, University of Colorado

  The magnitude of the digital data we create, store, and interact with on a daily basis is rapidly increasing. Simultaneously, we are demanding increasingly… (more)

Subjects/Keywords: Cloud Services; Computer Security; Encryption; Key Management; Key Storage as a Service; Secret Storage; Computer Sciences; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. (2013). Custos: A Flexibly Secure Key-Value Storage Platform. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/80

Chicago Manual of Style (16th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Masters Thesis, University of Colorado. Accessed June 25, 2019. http://scholar.colorado.edu/csci_gradetds/80.

MLA Handbook (7th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Web. 25 Jun 2019.

Vancouver:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Jun 25]. Available from: http://scholar.colorado.edu/csci_gradetds/80.

Council of Science Editors:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/80


East Carolina University

8. Anderson, James Carold. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.

Degree: 2012, East Carolina University

 Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of… (more)

Subjects/Keywords: Computer security; Social networks – Security measures; Information storage and retrieval systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, J. C. (2012). ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062

Chicago Manual of Style (16th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Masters Thesis, East Carolina University. Accessed June 25, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

MLA Handbook (7th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Web. 25 Jun 2019.

Vancouver:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2019 Jun 25]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

Council of Science Editors:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062


Dalhousie University

9. Lakshminarayanan, Harisubramanian. Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating.

Degree: Master of Applied Science, Department of Environmental Engineering, 2012, Dalhousie University

 Worldwide, wind energy added to the energy mix of electricity suppliers may be seen as way of improving energy security and reducing greenhouse gas emissions.… (more)

Subjects/Keywords: Energy Security; Wind Electricity Allocation; Allocation Methods; Space Heating; Electric Thermal Storage; Energy Storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshminarayanan, H. (2012). Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/15442

Chicago Manual of Style (16th Edition):

Lakshminarayanan, Harisubramanian. “Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating.” 2012. Masters Thesis, Dalhousie University. Accessed June 25, 2019. http://hdl.handle.net/10222/15442.

MLA Handbook (7th Edition):

Lakshminarayanan, Harisubramanian. “Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating.” 2012. Web. 25 Jun 2019.

Vancouver:

Lakshminarayanan H. Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating. [Internet] [Masters thesis]. Dalhousie University; 2012. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10222/15442.

Council of Science Editors:

Lakshminarayanan H. Wind Allocation Methods for Improving Energy Security in Residential Space and Hot Water Heating. [Masters Thesis]. Dalhousie University; 2012. Available from: http://hdl.handle.net/10222/15442


Queensland University of Technology

10. Al Beshri, Aiiad Ahmad M. Outsourcing data storage without outsourcing trust in cloud computing.

Degree: 2013, Queensland University of Technology

 The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud… (more)

Subjects/Keywords: Cloud Computing; Cloud Security; Cloud Storage; Cloud Storage Security; Geographic Assurance; Data Replication; Trust in the Cloud

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Beshri, A. A. M. (2013). Outsourcing data storage without outsourcing trust in cloud computing. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61738/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al Beshri, Aiiad Ahmad M. “Outsourcing data storage without outsourcing trust in cloud computing.” 2013. Thesis, Queensland University of Technology. Accessed June 25, 2019. https://eprints.qut.edu.au/61738/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al Beshri, Aiiad Ahmad M. “Outsourcing data storage without outsourcing trust in cloud computing.” 2013. Web. 25 Jun 2019.

Vancouver:

Al Beshri AAM. Outsourcing data storage without outsourcing trust in cloud computing. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2019 Jun 25]. Available from: https://eprints.qut.edu.au/61738/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al Beshri AAM. Outsourcing data storage without outsourcing trust in cloud computing. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/61738/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

11. Kathirvel, Anitha. Efficient Privacy Preserving Key Management for Public Cloud Networks.

Degree: Radio Systems Laboratory (RS Lab), 2014, KTH

Most applications and documents are stored in a public cloud for storage and management purposes in a cloud computing environment. The major advantages of… (more)

Subjects/Keywords: Cloud storage; Secure Storage; Key Management scheme; access level security; Cloud Storage; säker förvaring; nyckelhantering schema; åtkomstnivå säkerhet; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kathirvel, A. (2014). Efficient Privacy Preserving Key Management for Public Cloud Networks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kathirvel, Anitha. “Efficient Privacy Preserving Key Management for Public Cloud Networks.” 2014. Thesis, KTH. Accessed June 25, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kathirvel, Anitha. “Efficient Privacy Preserving Key Management for Public Cloud Networks.” 2014. Web. 25 Jun 2019.

Vancouver:

Kathirvel A. Efficient Privacy Preserving Key Management for Public Cloud Networks. [Internet] [Thesis]. KTH; 2014. [cited 2019 Jun 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kathirvel A. Efficient Privacy Preserving Key Management for Public Cloud Networks. [Thesis]. KTH; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Carolina University

12. Anderson, James Carold. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.

Degree: 2012, East Carolina University

 Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of… (more)

Subjects/Keywords: Computer science; Model checking; Social networks; Computer security; Social networks – Security measures; Information storage and retrieval systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, J. C. (2012). ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Thesis, East Carolina University. Accessed June 25, 2019. http://hdl.handle.net/10342/3936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Web. 25 Jun 2019.

Vancouver:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Internet] [Thesis]. East Carolina University; 2012. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10342/3936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

13. Alkhojandi, Naelah Abdulrahman. Privacy-preserving public auditing with data deduplication in cloud computing.

Degree: 2015, Ryerson University

Storage represents one of the most commonly used cloud services. Data integrity and storage efficiency are two key requirements when storing users’ data. Public auditability,… (more)

Subjects/Keywords: Cloud computing; Computer security; Cloud computing  – Security measures; Computer storage devices; Data protection; Electronic data processing  – Distributed processing  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkhojandi, N. A. (2015). Privacy-preserving public auditing with data deduplication in cloud computing. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Thesis, Ryerson University. Accessed June 25, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Web. 25 Jun 2019.

Vancouver:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Internet] [Thesis]. Ryerson University; 2015. [cited 2019 Jun 25]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dalhousie University

14. Muralidhar, Anirudh. INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES.

Degree: Master of Applied Science, Department of Electrical & Computer Engineering, 2011, Dalhousie University

 The world faces two major energy-related challenges: reducing greenhouse-gas emissions and improving energy security. Wind-electricity, a clean and environmentally sustainable energy source, appears promising. However,… (more)

Subjects/Keywords: Energy security; Greenhouse gas emissions; Transportation; Thermal storage; Batteries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muralidhar, A. (2011). INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/13181

Chicago Manual of Style (16th Edition):

Muralidhar, Anirudh. “INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES.” 2011. Masters Thesis, Dalhousie University. Accessed June 25, 2019. http://hdl.handle.net/10222/13181.

MLA Handbook (7th Edition):

Muralidhar, Anirudh. “INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES.” 2011. Web. 25 Jun 2019.

Vancouver:

Muralidhar A. INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES. [Internet] [Masters thesis]. Dalhousie University; 2011. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10222/13181.

Council of Science Editors:

Muralidhar A. INTEGRATING WIND GENERATED ELECTRICITY WITH SPACE HEATING AND STORAGE BATTERIES. [Masters Thesis]. Dalhousie University; 2011. Available from: http://hdl.handle.net/10222/13181


University of Limerick

15. Lasc, Ioana. Addressing synchrony issues of dynamic shared secrets in security protocols.

Degree: 2011, University of Limerick

peer-reviewed

This research addresses synchronisation issues in security protocols for wireless communications. A new class of attacks, termed Suppress-and-Desynchronise (SD) attacks, is introduced. This attack… (more)

Subjects/Keywords: wireless communications; security protocols; long-term storage; shared secrets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lasc, I. (2011). Addressing synchrony issues of dynamic shared secrets in security protocols. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/4175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lasc, Ioana. “Addressing synchrony issues of dynamic shared secrets in security protocols.” 2011. Thesis, University of Limerick. Accessed June 25, 2019. http://hdl.handle.net/10344/4175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lasc, Ioana. “Addressing synchrony issues of dynamic shared secrets in security protocols.” 2011. Web. 25 Jun 2019.

Vancouver:

Lasc I. Addressing synchrony issues of dynamic shared secrets in security protocols. [Internet] [Thesis]. University of Limerick; 2011. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10344/4175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lasc I. Addressing synchrony issues of dynamic shared secrets in security protocols. [Thesis]. University of Limerick; 2011. Available from: http://hdl.handle.net/10344/4175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

16. Radley, Johannes Jurgens. Pseudo-random access compressed archive for security log data.

Degree: MS, Faculty of Science, Computer Science, 2015, Rhodes University

 We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data… (more)

Subjects/Keywords: Computer security; Information storage and retrieval systems; Data compression (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Radley, J. J. (2015). Pseudo-random access compressed archive for security log data. (Masters Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1020019

Chicago Manual of Style (16th Edition):

Radley, Johannes Jurgens. “Pseudo-random access compressed archive for security log data.” 2015. Masters Thesis, Rhodes University. Accessed June 25, 2019. http://hdl.handle.net/10962/d1020019.

MLA Handbook (7th Edition):

Radley, Johannes Jurgens. “Pseudo-random access compressed archive for security log data.” 2015. Web. 25 Jun 2019.

Vancouver:

Radley JJ. Pseudo-random access compressed archive for security log data. [Internet] [Masters thesis]. Rhodes University; 2015. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10962/d1020019.

Council of Science Editors:

Radley JJ. Pseudo-random access compressed archive for security log data. [Masters Thesis]. Rhodes University; 2015. Available from: http://hdl.handle.net/10962/d1020019

17. Christiansen, Mark M. Guesswork.

Degree: 2015, RIAN

 The security of systems is often predicated on a user or application selecting an object, a password or key, from a large list. If an… (more)

Subjects/Keywords: Guesswork; security of systems; modern applications; secure storage; communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Christiansen, M. M. (2015). Guesswork. (Thesis). RIAN. Retrieved from http://eprints.maynoothuniversity.ie/6520/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Christiansen, Mark M. “Guesswork.” 2015. Thesis, RIAN. Accessed June 25, 2019. http://eprints.maynoothuniversity.ie/6520/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Christiansen, Mark M. “Guesswork.” 2015. Web. 25 Jun 2019.

Vancouver:

Christiansen MM. Guesswork. [Internet] [Thesis]. RIAN; 2015. [cited 2019 Jun 25]. Available from: http://eprints.maynoothuniversity.ie/6520/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Christiansen MM. Guesswork. [Thesis]. RIAN; 2015. Available from: http://eprints.maynoothuniversity.ie/6520/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

18. Stieger, Ewald Andreas. A framework for the development of a personal information security agent.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information… (more)

Subjects/Keywords: Computer networks  – Security measures; Information storage and retrieval systems; Artificial intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stieger, E. A. (2011). A framework for the development of a personal information security agent. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1012326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stieger, Ewald Andreas. “A framework for the development of a personal information security agent.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed June 25, 2019. http://hdl.handle.net/10948/d1012326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stieger, Ewald Andreas. “A framework for the development of a personal information security agent.” 2011. Web. 25 Jun 2019.

Vancouver:

Stieger EA. A framework for the development of a personal information security agent. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10948/d1012326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stieger EA. A framework for the development of a personal information security agent. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/d1012326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Chung, I-Chia. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 An efficient and fault-tolerant cloud storage scheme for file owners is presented in this paper. A large file is first divided into secrets, and each… (more)

Subjects/Keywords: secret sharing; cloud storage; cloud security; XOR; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, I. (2017). An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chung, I-Chia. “An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.” 2017. Thesis, NSYSU. Accessed June 25, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chung, I-Chia. “An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.” 2017. Web. 25 Jun 2019.

Vancouver:

Chung I. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Jun 25]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chung I. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

20. Zhu, Shasha. Fuzzy Authorization for Cloud Storage.

Degree: 2013, University of Waterloo

 It is widely accepted that OAuth is the most popular authorization scheme adopted and implemented by industrial and academic world, however, it is difficult to… (more)

Subjects/Keywords: Authorization; Cloud Storage; Security Protocol; CP-ABE; Fuzzy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, S. (2013). Fuzzy Authorization for Cloud Storage. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Shasha. “Fuzzy Authorization for Cloud Storage.” 2013. Thesis, University of Waterloo. Accessed June 25, 2019. http://hdl.handle.net/10012/7729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Shasha. “Fuzzy Authorization for Cloud Storage.” 2013. Web. 25 Jun 2019.

Vancouver:

Zhu S. Fuzzy Authorization for Cloud Storage. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10012/7729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhu S. Fuzzy Authorization for Cloud Storage. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

21. Fung, King Hong CSE. Combining differential privacy and PIR for efficient strong location privacy.

Degree: 2015, Hong Kong University of Science and Technology

 Data privacy is a huge concern nowadays. In the context of location based services, a very important issue regards protecting the position of users issuing… (more)

Subjects/Keywords: Location-based services; Security measures; Information storage and retrieval systems; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fung, K. H. C. (2015). Combining differential privacy and PIR for efficient strong location privacy. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Thesis, Hong Kong University of Science and Technology. Accessed June 25, 2019. https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Web. 25 Jun 2019.

Vancouver:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2015. [cited 2019 Jun 25]. Available from: https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Thesis]. Hong Kong University of Science and Technology; 2015. Available from: https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Miami

22. Lin, Wenghui. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.

Degree: MS, Computer Science (Arts and Sciences), 2009, University of Miami

 Conventional storage technologies do not always give sufficient guarantees of security for critical information. Databases and file servers are regularly compromised, with consequential theft of… (more)

Subjects/Keywords: Web Applications; Storage; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, W. (2009). Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. (Thesis). University of Miami. Retrieved from https://scholarlyrepository.miami.edu/oa_theses/235

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Wenghui. “Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.” 2009. Thesis, University of Miami. Accessed June 25, 2019. https://scholarlyrepository.miami.edu/oa_theses/235.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Wenghui. “Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.” 2009. Web. 25 Jun 2019.

Vancouver:

Lin W. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. [Internet] [Thesis]. University of Miami; 2009. [cited 2019 Jun 25]. Available from: https://scholarlyrepository.miami.edu/oa_theses/235.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin W. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. [Thesis]. University of Miami; 2009. Available from: https://scholarlyrepository.miami.edu/oa_theses/235

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

23. Said, Hisham M. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.

Degree: PhD, 0106, 2010, University of Illinois – Urbana-Champaign

 Planning the site layout of construction projects is a crucial task that has a significant impact on construction cost, productivity, and safety. It involves the… (more)

Subjects/Keywords: construction; site; layout; planning; material; logistics; storage; procurement; security; critical; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Said, H. M. (2010). Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16995

Chicago Manual of Style (16th Edition):

Said, Hisham M. “Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.” 2010. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed June 25, 2019. http://hdl.handle.net/2142/16995.

MLA Handbook (7th Edition):

Said, Hisham M. “Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.” 2010. Web. 25 Jun 2019.

Vancouver:

Said HM. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2010. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/2142/16995.

Council of Science Editors:

Said HM. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16995


University of Rochester

24. Chen, Zhuan. System support for data-intensive sensing in the field.

Degree: PhD, 2016, University of Rochester

 High-intensity data sensing and processing in the field are important for emerging applications in intelligent transportation, surveillance, and environmental management. Many such systems reside in… (more)

Subjects/Keywords: Cyber-physical systems; Deduplication; Operating systems; Security; Storage systems; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2016). System support for data-intensive sensing in the field. (Doctoral Dissertation). University of Rochester. Retrieved from http://hdl.handle.net/1802/31468

Chicago Manual of Style (16th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Doctoral Dissertation, University of Rochester. Accessed June 25, 2019. http://hdl.handle.net/1802/31468.

MLA Handbook (7th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Web. 25 Jun 2019.

Vancouver:

Chen Z. System support for data-intensive sensing in the field. [Internet] [Doctoral dissertation]. University of Rochester; 2016. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/1802/31468.

Council of Science Editors:

Chen Z. System support for data-intensive sensing in the field. [Doctoral Dissertation]. University of Rochester; 2016. Available from: http://hdl.handle.net/1802/31468


Brigham Young University

25. Hansen, Christopher Glenn. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.

Degree: MS, 2016, Brigham Young University

 The constant evolution of new varieties of computing systems - cloud computing, mobile devices, and Internet of Things, to name a few - have necessitated… (more)

Subjects/Keywords: RAID; storage; security; privacy; reliability; architecture; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hansen, C. G. (2016). A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd

Chicago Manual of Style (16th Edition):

Hansen, Christopher Glenn. “A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.” 2016. Masters Thesis, Brigham Young University. Accessed June 25, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd.

MLA Handbook (7th Edition):

Hansen, Christopher Glenn. “A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.” 2016. Web. 25 Jun 2019.

Vancouver:

Hansen CG. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. [Internet] [Masters thesis]. Brigham Young University; 2016. [cited 2019 Jun 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd.

Council of Science Editors:

Hansen CG. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. [Masters Thesis]. Brigham Young University; 2016. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd


Brigham Young University

26. Florence, Trevor Bradshaw. KiwiVault: Encryption Software for Portable Storage Devices.

Degree: MS, 2009, Brigham Young University

 While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found… (more)

Subjects/Keywords: security; portable storage; privacy; file encryption; computer science; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Florence, T. B. (2009). KiwiVault: Encryption Software for Portable Storage Devices. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd

Chicago Manual of Style (16th Edition):

Florence, Trevor Bradshaw. “KiwiVault: Encryption Software for Portable Storage Devices.” 2009. Masters Thesis, Brigham Young University. Accessed June 25, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd.

MLA Handbook (7th Edition):

Florence, Trevor Bradshaw. “KiwiVault: Encryption Software for Portable Storage Devices.” 2009. Web. 25 Jun 2019.

Vancouver:

Florence TB. KiwiVault: Encryption Software for Portable Storage Devices. [Internet] [Masters thesis]. Brigham Young University; 2009. [cited 2019 Jun 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd.

Council of Science Editors:

Florence TB. KiwiVault: Encryption Software for Portable Storage Devices. [Masters Thesis]. Brigham Young University; 2009. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd


University of Colorado

27. Sayler, Andy Jackson. Securing Secrets and Managing Trust in Modern Computing Applications.

Degree: PhD, Computer Science, 2016, University of Colorado

  The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous… (more)

Subjects/Keywords: Cryptography; Encryption; Secret Storage; Secret Storage as a Service; Security; Service Oriented Architecture; Computer Sciences; Public Policy; Science and Technology Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. J. (2016). Securing Secrets and Managing Trust in Modern Computing Applications. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/112

Chicago Manual of Style (16th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Doctoral Dissertation, University of Colorado. Accessed June 25, 2019. http://scholar.colorado.edu/csci_gradetds/112.

MLA Handbook (7th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Web. 25 Jun 2019.

Vancouver:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Internet] [Doctoral dissertation]. University of Colorado; 2016. [cited 2019 Jun 25]. Available from: http://scholar.colorado.edu/csci_gradetds/112.

Council of Science Editors:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Doctoral Dissertation]. University of Colorado; 2016. Available from: http://scholar.colorado.edu/csci_gradetds/112

28. Berg, Markus. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.

Degree: Informatics, 2018, University of Skövde

Denna fallstudie har undersökt och studerat hur ett företag som arbetar med informationsteknologi (IT) hanterar problemet att anställda lagrar arbetsrelaterad information i sina privata… (more)

Subjects/Keywords: Cloud storage; private cloud storage; cloud security; Molnlagring; privat molnlagring; säkerhet i molnet; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berg, M. (2018). Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. (Thesis). University of Skövde. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Berg, Markus. “Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.” 2018. Thesis, University of Skövde. Accessed June 25, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Berg, Markus. “Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.” 2018. Web. 25 Jun 2019.

Vancouver:

Berg M. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. [Internet] [Thesis]. University of Skövde; 2018. [cited 2019 Jun 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Berg M. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. [Thesis]. University of Skövde; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

29. Barreto, Andres E. API-Based Acquisition of Evidence from Cloud Storage Providers.

Degree: MS, Computer Science, 2015, University of New Orleans

  Cloud computing and cloud storage services, in particular, pose a new challenge to digital forensic investigations. Currently, evidence acquisition for such services still follows… (more)

Subjects/Keywords: Cloud forensics; cloud storage; kumodd; API-based evidence acquisition; Google Drive; Dropbox; OneDrive; Box; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barreto, A. E. (2015). API-Based Acquisition of Evidence from Cloud Storage Providers. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Thesis, University of New Orleans. Accessed June 25, 2019. https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Web. 25 Jun 2019.

Vancouver:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Internet] [Thesis]. University of New Orleans; 2015. [cited 2019 Jun 25]. Available from: https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Thesis]. University of New Orleans; 2015. Available from: https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ottawa

30. Noman, Ali. Addressing the Data Location Assurance Problem of Cloud Storage Environments .

Degree: 2018, University of Ottawa

 In a cloud storage environment, providing geo-location assurance of data to a cloud user is very challenging as the cloud storage provider physically controls the… (more)

Subjects/Keywords: cloud storage security; data location assurance for cloud; cloud computing security; DLAS; proof of data possession solution for cloud; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Noman, A. (2018). Addressing the Data Location Assurance Problem of Cloud Storage Environments . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/37375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Noman, Ali. “Addressing the Data Location Assurance Problem of Cloud Storage Environments .” 2018. Thesis, University of Ottawa. Accessed June 25, 2019. http://hdl.handle.net/10393/37375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Noman, Ali. “Addressing the Data Location Assurance Problem of Cloud Storage Environments .” 2018. Web. 25 Jun 2019.

Vancouver:

Noman A. Addressing the Data Location Assurance Problem of Cloud Storage Environments . [Internet] [Thesis]. University of Ottawa; 2018. [cited 2019 Jun 25]. Available from: http://hdl.handle.net/10393/37375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Noman A. Addressing the Data Location Assurance Problem of Cloud Storage Environments . [Thesis]. University of Ottawa; 2018. Available from: http://hdl.handle.net/10393/37375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3]

.