Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Country:

You searched for subject:(Storage security). Showing records 1 – 30 of 40 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Penn State University

1. Chaitanya, Shiva. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.

Degree: PhD, Computer Science and Engineering, 2009, Penn State University

Storage security has emerged as a significant area of research in the last decade. Given the rise of sensitive digital data such as online medical… (more)

Subjects/Keywords: Storage Security; Performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chaitanya, S. (2009). ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9939

Chicago Manual of Style (16th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Doctoral Dissertation, Penn State University. Accessed July 16, 2019. https://etda.libraries.psu.edu/catalog/9939.

MLA Handbook (7th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Web. 16 Jul 2019.

Vancouver:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2019 Jul 16]. Available from: https://etda.libraries.psu.edu/catalog/9939.

Council of Science Editors:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/9939


Penn State University

2. Butler, Kevin Raymond Boyce. Leveraging Emerging Disk Functionality for New Security Services.

Degree: PhD, Computer Science and Engineering, 2010, Penn State University

 The complexity of modern operating systems makes securing them a challenging problem. However, changes in the computing model, such as the rise of cloud computing… (more)

Subjects/Keywords: security; storage; operating systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Butler, K. R. B. (2010). Leveraging Emerging Disk Functionality for New Security Services. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/11115

Chicago Manual of Style (16th Edition):

Butler, Kevin Raymond Boyce. “Leveraging Emerging Disk Functionality for New Security Services.” 2010. Doctoral Dissertation, Penn State University. Accessed July 16, 2019. https://etda.libraries.psu.edu/catalog/11115.

MLA Handbook (7th Edition):

Butler, Kevin Raymond Boyce. “Leveraging Emerging Disk Functionality for New Security Services.” 2010. Web. 16 Jul 2019.

Vancouver:

Butler KRB. Leveraging Emerging Disk Functionality for New Security Services. [Internet] [Doctoral dissertation]. Penn State University; 2010. [cited 2019 Jul 16]. Available from: https://etda.libraries.psu.edu/catalog/11115.

Council of Science Editors:

Butler KRB. Leveraging Emerging Disk Functionality for New Security Services. [Doctoral Dissertation]. Penn State University; 2010. Available from: https://etda.libraries.psu.edu/catalog/11115


Oklahoma State University

3. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed July 16, 2019. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 16 Jul 2019.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

4. Huang, Jian. Exploiting intrinsic flash properties to enhance modern storage systems.

Degree: PhD, Computer Science, 2017, Georgia Tech

 The longstanding goals of storage system design have been to provide simple abstractions for applications to efficiently access data while ensuring the data durability and… (more)

Subjects/Keywords: Flash memory; Storage systems; Cloud storage; Wearable storage; Performance isolation; System security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, J. (2017). Exploiting intrinsic flash properties to enhance modern storage systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60162

Chicago Manual of Style (16th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed July 16, 2019. http://hdl.handle.net/1853/60162.

MLA Handbook (7th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Web. 16 Jul 2019.

Vancouver:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1853/60162.

Council of Science Editors:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60162


University of Colorado

5. Sayler, Andy. Custos: A Flexibly Secure Key-Value Storage Platform.

Degree: MS, 2013, University of Colorado

  The magnitude of the digital data we create, store, and interact with on a daily basis is rapidly increasing. Simultaneously, we are demanding increasingly… (more)

Subjects/Keywords: Cloud Services; Computer Security; Encryption; Key Management; Key Storage as a Service; Secret Storage; Computer Sciences; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. (2013). Custos: A Flexibly Secure Key-Value Storage Platform. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/80

Chicago Manual of Style (16th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Masters Thesis, University of Colorado. Accessed July 16, 2019. http://scholar.colorado.edu/csci_gradetds/80.

MLA Handbook (7th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Web. 16 Jul 2019.

Vancouver:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Jul 16]. Available from: http://scholar.colorado.edu/csci_gradetds/80.

Council of Science Editors:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/80


East Carolina University

6. Anderson, James Carold. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.

Degree: 2012, East Carolina University

 Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of… (more)

Subjects/Keywords: Computer security; Social networks – Security measures; Information storage and retrieval systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, J. C. (2012). ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062

Chicago Manual of Style (16th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Masters Thesis, East Carolina University. Accessed July 16, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

MLA Handbook (7th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Web. 16 Jul 2019.

Vancouver:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2019 Jul 16]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

Council of Science Editors:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062


East Carolina University

7. Anderson, James Carold. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.

Degree: 2012, East Carolina University

 Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of… (more)

Subjects/Keywords: Computer science; Model checking; Social networks; Computer security; Social networks – Security measures; Information storage and retrieval systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, J. C. (2012). ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Thesis, East Carolina University. Accessed July 16, 2019. http://hdl.handle.net/10342/3936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Web. 16 Jul 2019.

Vancouver:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Internet] [Thesis]. East Carolina University; 2012. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/10342/3936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Miami

8. Lin, Wenghui. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.

Degree: MS, Computer Science (Arts and Sciences), 2009, University of Miami

 Conventional storage technologies do not always give sufficient guarantees of security for critical information. Databases and file servers are regularly compromised, with consequential theft of… (more)

Subjects/Keywords: Web Applications; Storage; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, W. (2009). Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. (Thesis). University of Miami. Retrieved from https://scholarlyrepository.miami.edu/oa_theses/235

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Wenghui. “Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.” 2009. Thesis, University of Miami. Accessed July 16, 2019. https://scholarlyrepository.miami.edu/oa_theses/235.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Wenghui. “Data Security Enhancement for Web Applications Using Cryptographic Back-end Store.” 2009. Web. 16 Jul 2019.

Vancouver:

Lin W. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. [Internet] [Thesis]. University of Miami; 2009. [cited 2019 Jul 16]. Available from: https://scholarlyrepository.miami.edu/oa_theses/235.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin W. Data Security Enhancement for Web Applications Using Cryptographic Back-end Store. [Thesis]. University of Miami; 2009. Available from: https://scholarlyrepository.miami.edu/oa_theses/235

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

9. Said, Hisham M. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.

Degree: PhD, 0106, 2010, University of Illinois – Urbana-Champaign

 Planning the site layout of construction projects is a crucial task that has a significant impact on construction cost, productivity, and safety. It involves the… (more)

Subjects/Keywords: construction; site; layout; planning; material; logistics; storage; procurement; security; critical; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Said, H. M. (2010). Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16995

Chicago Manual of Style (16th Edition):

Said, Hisham M. “Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.” 2010. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed July 16, 2019. http://hdl.handle.net/2142/16995.

MLA Handbook (7th Edition):

Said, Hisham M. “Optimizing site layout and material logistics planning during the construction of critical infrastructure projects.” 2010. Web. 16 Jul 2019.

Vancouver:

Said HM. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2010. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/2142/16995.

Council of Science Editors:

Said HM. Optimizing site layout and material logistics planning during the construction of critical infrastructure projects. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16995


University of Rochester

10. Chen, Zhuan. System support for data-intensive sensing in the field.

Degree: PhD, 2016, University of Rochester

 High-intensity data sensing and processing in the field are important for emerging applications in intelligent transportation, surveillance, and environmental management. Many such systems reside in… (more)

Subjects/Keywords: Cyber-physical systems; Deduplication; Operating systems; Security; Storage systems; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2016). System support for data-intensive sensing in the field. (Doctoral Dissertation). University of Rochester. Retrieved from http://hdl.handle.net/1802/31468

Chicago Manual of Style (16th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Doctoral Dissertation, University of Rochester. Accessed July 16, 2019. http://hdl.handle.net/1802/31468.

MLA Handbook (7th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Web. 16 Jul 2019.

Vancouver:

Chen Z. System support for data-intensive sensing in the field. [Internet] [Doctoral dissertation]. University of Rochester; 2016. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1802/31468.

Council of Science Editors:

Chen Z. System support for data-intensive sensing in the field. [Doctoral Dissertation]. University of Rochester; 2016. Available from: http://hdl.handle.net/1802/31468


Brigham Young University

11. Hansen, Christopher Glenn. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.

Degree: MS, 2016, Brigham Young University

 The constant evolution of new varieties of computing systems - cloud computing, mobile devices, and Internet of Things, to name a few - have necessitated… (more)

Subjects/Keywords: RAID; storage; security; privacy; reliability; architecture; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hansen, C. G. (2016). A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd

Chicago Manual of Style (16th Edition):

Hansen, Christopher Glenn. “A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.” 2016. Masters Thesis, Brigham Young University. Accessed July 16, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd.

MLA Handbook (7th Edition):

Hansen, Christopher Glenn. “A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage.” 2016. Web. 16 Jul 2019.

Vancouver:

Hansen CG. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. [Internet] [Masters thesis]. Brigham Young University; 2016. [cited 2019 Jul 16]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd.

Council of Science Editors:

Hansen CG. A Secure, Reliable and Performance-Enhancing Storage Architecture Integrating Local and Cloud-Based Storage. [Masters Thesis]. Brigham Young University; 2016. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7470&context=etd


Brigham Young University

12. Florence, Trevor Bradshaw. KiwiVault: Encryption Software for Portable Storage Devices.

Degree: MS, 2009, Brigham Young University

 While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found… (more)

Subjects/Keywords: security; portable storage; privacy; file encryption; computer science; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Florence, T. B. (2009). KiwiVault: Encryption Software for Portable Storage Devices. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd

Chicago Manual of Style (16th Edition):

Florence, Trevor Bradshaw. “KiwiVault: Encryption Software for Portable Storage Devices.” 2009. Masters Thesis, Brigham Young University. Accessed July 16, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd.

MLA Handbook (7th Edition):

Florence, Trevor Bradshaw. “KiwiVault: Encryption Software for Portable Storage Devices.” 2009. Web. 16 Jul 2019.

Vancouver:

Florence TB. KiwiVault: Encryption Software for Portable Storage Devices. [Internet] [Masters thesis]. Brigham Young University; 2009. [cited 2019 Jul 16]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd.

Council of Science Editors:

Florence TB. KiwiVault: Encryption Software for Portable Storage Devices. [Masters Thesis]. Brigham Young University; 2009. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3155&context=etd


University of Colorado

13. Sayler, Andy Jackson. Securing Secrets and Managing Trust in Modern Computing Applications.

Degree: PhD, Computer Science, 2016, University of Colorado

  The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous… (more)

Subjects/Keywords: Cryptography; Encryption; Secret Storage; Secret Storage as a Service; Security; Service Oriented Architecture; Computer Sciences; Public Policy; Science and Technology Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. J. (2016). Securing Secrets and Managing Trust in Modern Computing Applications. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/112

Chicago Manual of Style (16th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Doctoral Dissertation, University of Colorado. Accessed July 16, 2019. http://scholar.colorado.edu/csci_gradetds/112.

MLA Handbook (7th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Web. 16 Jul 2019.

Vancouver:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Internet] [Doctoral dissertation]. University of Colorado; 2016. [cited 2019 Jul 16]. Available from: http://scholar.colorado.edu/csci_gradetds/112.

Council of Science Editors:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Doctoral Dissertation]. University of Colorado; 2016. Available from: http://scholar.colorado.edu/csci_gradetds/112


University of New Orleans

14. Barreto, Andres E. API-Based Acquisition of Evidence from Cloud Storage Providers.

Degree: MS, Computer Science, 2015, University of New Orleans

  Cloud computing and cloud storage services, in particular, pose a new challenge to digital forensic investigations. Currently, evidence acquisition for such services still follows… (more)

Subjects/Keywords: Cloud forensics; cloud storage; kumodd; API-based evidence acquisition; Google Drive; Dropbox; OneDrive; Box; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barreto, A. E. (2015). API-Based Acquisition of Evidence from Cloud Storage Providers. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Thesis, University of New Orleans. Accessed July 16, 2019. https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Web. 16 Jul 2019.

Vancouver:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Internet] [Thesis]. University of New Orleans; 2015. [cited 2019 Jul 16]. Available from: https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Thesis]. University of New Orleans; 2015. Available from: https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

15. Studer, Ahren M. Verifying Physical Endpoints to Secure Digital Systems.

Degree: 2011, Carnegie Mellon University

 The proliferation of electronic devices supporting sensing, actuation, and wireless communication enables the monitoring and/or control of a variety of physical systems with digital communication.… (more)

Subjects/Keywords: System Security; Mobile Computing; Trust Establishment; Key Management; Secure Storage; Vehicular Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Studer, A. M. (2011). Verifying Physical Endpoints to Secure Digital Systems. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/77

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Studer, Ahren M. “Verifying Physical Endpoints to Secure Digital Systems.” 2011. Thesis, Carnegie Mellon University. Accessed July 16, 2019. http://repository.cmu.edu/dissertations/77.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Studer, Ahren M. “Verifying Physical Endpoints to Secure Digital Systems.” 2011. Web. 16 Jul 2019.

Vancouver:

Studer AM. Verifying Physical Endpoints to Secure Digital Systems. [Internet] [Thesis]. Carnegie Mellon University; 2011. [cited 2019 Jul 16]. Available from: http://repository.cmu.edu/dissertations/77.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Studer AM. Verifying Physical Endpoints to Secure Digital Systems. [Thesis]. Carnegie Mellon University; 2011. Available from: http://repository.cmu.edu/dissertations/77

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

16. Morovat, Katanosh. Data Integrity Verification in Cloud Computing.

Degree: MS, 2015, University of Arkansas

  Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services… (more)

Subjects/Keywords: Applied sciences; Cloud computing; Database management systems; Security; Computer and Systems Architecture; Data Storage Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morovat, K. (2015). Data Integrity Verification in Cloud Computing. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1125

Chicago Manual of Style (16th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Masters Thesis, University of Arkansas. Accessed July 16, 2019. https://scholarworks.uark.edu/etd/1125.

MLA Handbook (7th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Web. 16 Jul 2019.

Vancouver:

Morovat K. Data Integrity Verification in Cloud Computing. [Internet] [Masters thesis]. University of Arkansas; 2015. [cited 2019 Jul 16]. Available from: https://scholarworks.uark.edu/etd/1125.

Council of Science Editors:

Morovat K. Data Integrity Verification in Cloud Computing. [Masters Thesis]. University of Arkansas; 2015. Available from: https://scholarworks.uark.edu/etd/1125


The Ohio State University

17. Milindi, Paschal. Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania.

Degree: MS, Food, Agricultural and Biological Engineering, 2016, The Ohio State University

 More than 75% of Tanzanians depend on agriculture for their livelihoods. Many smallholder farmers practice subsistence agriculture with maize as the major cereal crop, which… (more)

Subjects/Keywords: Agricultural Engineering; Grain storage; hermetic; maize grain; smallholder farmers; dry matter loss; food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Milindi, P. (2016). Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1469166460

Chicago Manual of Style (16th Edition):

Milindi, Paschal. “Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania.” 2016. Masters Thesis, The Ohio State University. Accessed July 16, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469166460.

MLA Handbook (7th Edition):

Milindi, Paschal. “Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania.” 2016. Web. 16 Jul 2019.

Vancouver:

Milindi P. Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania. [Internet] [Masters thesis]. The Ohio State University; 2016. [cited 2019 Jul 16]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469166460.

Council of Science Editors:

Milindi P. Improved Hermetic Grain Storage System for Smallholder Farmers in Tanzania. [Masters Thesis]. The Ohio State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469166460


University of Illinois – Urbana-Champaign

18. Manjunath, Archana Shivaram. A conceptual framework for the assessment of integrated energy storage resources.

Degree: MS, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 Concerns regarding climate change impacts, energy security and sustainability are key drivers of the growing deployment of renewable energy resources. The variability, uncertainty and intermittency… (more)

Subjects/Keywords: Energy storage; framework; emissions; security; levelized costs of energy (LCOE); electric vehicles

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manjunath, A. S. (2016). A conceptual framework for the assessment of integrated energy storage resources. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/90743

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Manjunath, Archana Shivaram. “A conceptual framework for the assessment of integrated energy storage resources.” 2016. Thesis, University of Illinois – Urbana-Champaign. Accessed July 16, 2019. http://hdl.handle.net/2142/90743.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Manjunath, Archana Shivaram. “A conceptual framework for the assessment of integrated energy storage resources.” 2016. Web. 16 Jul 2019.

Vancouver:

Manjunath AS. A conceptual framework for the assessment of integrated energy storage resources. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/2142/90743.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Manjunath AS. A conceptual framework for the assessment of integrated energy storage resources. [Thesis]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/90743

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

19. Lakshmanan, Subramanian. Secure Store : A Secure Distributed Storage Service.

Degree: PhD, Computing, 2004, Georgia Tech

 As computers become pervasive in environments that include the home and community, new applications are emerging that will create and manipulate sensitive and private information.… (more)

Subjects/Keywords: Consistency; Secure dissemination; Byzantine fault tolerance; Storage security; Distributed storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshmanan, S. (2004). Secure Store : A Secure Distributed Storage Service. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/4777

Chicago Manual of Style (16th Edition):

Lakshmanan, Subramanian. “Secure Store : A Secure Distributed Storage Service.” 2004. Doctoral Dissertation, Georgia Tech. Accessed July 16, 2019. http://hdl.handle.net/1853/4777.

MLA Handbook (7th Edition):

Lakshmanan, Subramanian. “Secure Store : A Secure Distributed Storage Service.” 2004. Web. 16 Jul 2019.

Vancouver:

Lakshmanan S. Secure Store : A Secure Distributed Storage Service. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1853/4777.

Council of Science Editors:

Lakshmanan S. Secure Store : A Secure Distributed Storage Service. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/4777


Iowa State University

20. Darfour, Bernard. Controlling the deterioration of harvested grain/seed to improve food security.

Degree: 2019, Iowa State University

 The agriculture sector is the largest source of employment for Ghanaians and it is dominated by smallholder farmers. The challenges in the agriculture sector are… (more)

Subjects/Keywords: Economic analysis; Food security; Ghana; Grain and seed; Maize; Post-harvest storage; Agriculture; Bioresource and Agricultural Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Darfour, B. (2019). Controlling the deterioration of harvested grain/seed to improve food security. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/16996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Darfour, Bernard. “Controlling the deterioration of harvested grain/seed to improve food security.” 2019. Thesis, Iowa State University. Accessed July 16, 2019. https://lib.dr.iastate.edu/etd/16996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Darfour, Bernard. “Controlling the deterioration of harvested grain/seed to improve food security.” 2019. Web. 16 Jul 2019.

Vancouver:

Darfour B. Controlling the deterioration of harvested grain/seed to improve food security. [Internet] [Thesis]. Iowa State University; 2019. [cited 2019 Jul 16]. Available from: https://lib.dr.iastate.edu/etd/16996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Darfour B. Controlling the deterioration of harvested grain/seed to improve food security. [Thesis]. Iowa State University; 2019. Available from: https://lib.dr.iastate.edu/etd/16996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Romero-Aguilar, Randall Stace. Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options.

Degree: PhD, Agricultural, Environmental and Developmental Economics, 2015, The Ohio State University

 During the Global Food Price Crisis of 2007-2011, millions of people suffered hunger because food had become too expensive. To cope with this problem, the… (more)

Subjects/Keywords: Agricultural Economics; Economics; food storage; price volatility; food security; hunger

…2.2.2 Public storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3… …29 Optimal grain storage… …Food storage in Haiti . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Euler equation… …14 2.3 Wheat Importer’s storage policy… …3.4 Optimal Food Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Romero-Aguilar, R. S. (2015). Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1437710342

Chicago Manual of Style (16th Edition):

Romero-Aguilar, Randall Stace. “Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options.” 2015. Doctoral Dissertation, The Ohio State University. Accessed July 16, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1437710342.

MLA Handbook (7th Edition):

Romero-Aguilar, Randall Stace. “Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options.” 2015. Web. 16 Jul 2019.

Vancouver:

Romero-Aguilar RS. Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options. [Internet] [Doctoral dissertation]. The Ohio State University; 2015. [cited 2019 Jul 16]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1437710342.

Council of Science Editors:

Romero-Aguilar RS. Essays on the World Food Crisis: A Quantitative Economics Assessment of Policy Options. [Doctoral Dissertation]. The Ohio State University; 2015. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1437710342


California State University – San Bernardino

22. Sodhi, Bir Apaar Singh. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.

Degree: MSin Computer Science, School of Computer Science and Engineering, 2016, California State University – San Bernardino

  In this modern rather interconnected era, an organization’s top priority is to protect itself from major security breaches occurring frequently within a communicational environment.… (more)

Subjects/Keywords: Parallel Computing; Distributed File System; Java Programming; Parser; Big Data; Partitioner; Reducer; Combiner; Mapper; Computer and Systems Architecture; Data Storage Systems; Information Security; Programming Languages and Compilers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sodhi, B. A. S. (2016). DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. (Thesis). California State University – San Bernardino. Retrieved from http://scholarworks.lib.csusb.edu/etd/271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sodhi, Bir Apaar Singh. “DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.” 2016. Thesis, California State University – San Bernardino. Accessed July 16, 2019. http://scholarworks.lib.csusb.edu/etd/271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sodhi, Bir Apaar Singh. “DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.” 2016. Web. 16 Jul 2019.

Vancouver:

Sodhi BAS. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. [Internet] [Thesis]. California State University – San Bernardino; 2016. [cited 2019 Jul 16]. Available from: http://scholarworks.lib.csusb.edu/etd/271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sodhi BAS. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. [Thesis]. California State University – San Bernardino; 2016. Available from: http://scholarworks.lib.csusb.edu/etd/271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kansas State University

23. Kleopfer, Lyle. Levels of protection and associated overhead in the formulary protection system.

Degree: 1975, Kansas State University

Subjects/Keywords: Information storage and retrieval systems; Electronic data processing departments – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kleopfer, L. (1975). Levels of protection and associated overhead in the formulary protection system. (Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/8693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kleopfer, Lyle. “Levels of protection and associated overhead in the formulary protection system.” 1975. Thesis, Kansas State University. Accessed July 16, 2019. http://hdl.handle.net/2097/8693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kleopfer, Lyle. “Levels of protection and associated overhead in the formulary protection system.” 1975. Web. 16 Jul 2019.

Vancouver:

Kleopfer L. Levels of protection and associated overhead in the formulary protection system. [Internet] [Thesis]. Kansas State University; 1975. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/2097/8693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kleopfer L. Levels of protection and associated overhead in the formulary protection system. [Thesis]. Kansas State University; 1975. Available from: http://hdl.handle.net/2097/8693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Goparaju, Sreechakra. Erasure Codes for Optimal Node Repairs in Distributed Storage Systems .

Degree: PhD, 2014, Princeton University

 Google, Amazon, and other services store data in multiple geographically separated disks called nodes, among other reasons, to safeguard the data from node failures. Standard… (more)

Subjects/Keywords: Coding Theory; Distributed Storage; Erasure Codes; Linear Algebra; Security

…3 1.2.1 Minimum Storage Regenerating (MSR) Codes… …Figures 1.1 The storage vs. repair bandwidth trade-off curve for (n, 5, 6) optimal… …59 5.1 An example of how repairing a DSS can compromise the system security… …need to store data, and with the advent of cloud storage, our particular ability to store it… …Moore’s lawesque drop in the data storage cost in the last few decades. However, between a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Goparaju, S. (2014). Erasure Codes for Optimal Node Repairs in Distributed Storage Systems . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01n583xx224

Chicago Manual of Style (16th Edition):

Goparaju, Sreechakra. “Erasure Codes for Optimal Node Repairs in Distributed Storage Systems .” 2014. Doctoral Dissertation, Princeton University. Accessed July 16, 2019. http://arks.princeton.edu/ark:/88435/dsp01n583xx224.

MLA Handbook (7th Edition):

Goparaju, Sreechakra. “Erasure Codes for Optimal Node Repairs in Distributed Storage Systems .” 2014. Web. 16 Jul 2019.

Vancouver:

Goparaju S. Erasure Codes for Optimal Node Repairs in Distributed Storage Systems . [Internet] [Doctoral dissertation]. Princeton University; 2014. [cited 2019 Jul 16]. Available from: http://arks.princeton.edu/ark:/88435/dsp01n583xx224.

Council of Science Editors:

Goparaju S. Erasure Codes for Optimal Node Repairs in Distributed Storage Systems . [Doctoral Dissertation]. Princeton University; 2014. Available from: http://arks.princeton.edu/ark:/88435/dsp01n583xx224


University of North Texas

25. Al Smadi, Duha. Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust.

Degree: 2019, University of North Texas

 This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of… (more)

Subjects/Keywords: Cloud computing; information sharing and storage behavior; perceived security; perceived privacy; peers' influence, perceived trust; perceived risk; semi-structured interviewees; perceived technical support, surveys, structural equation modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Smadi, D. (2019). Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1505164/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al Smadi, Duha. “Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust.” 2019. Thesis, University of North Texas. Accessed July 16, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al Smadi, Duha. “Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust.” 2019. Web. 16 Jul 2019.

Vancouver:

Al Smadi D. Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust. [Internet] [Thesis]. University of North Texas; 2019. [cited 2019 Jul 16]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1505164/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al Smadi D. Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust. [Thesis]. University of North Texas; 2019. Available from: https://digital.library.unt.edu/ark:/67531/metadc1505164/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

26. Eilertson, Eric. A data collection, storage, and analysis framework for network security.

Degree: PhD, Computer Science, 2007, University of Minnesota

 As the number, severity and sophistication of computer network attacks increase network administrators have an increasingly difficult time identifying and cleaning up compromised computers. In… (more)

Subjects/Keywords: Scan detection; Context extraction; Data mining; Data storage; Network security; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eilertson, E. (2007). A data collection, storage, and analysis framework for network security. (Doctoral Dissertation). University of Minnesota. Retrieved from http://purl.umn.edu/60293

Chicago Manual of Style (16th Edition):

Eilertson, Eric. “A data collection, storage, and analysis framework for network security.” 2007. Doctoral Dissertation, University of Minnesota. Accessed July 16, 2019. http://purl.umn.edu/60293.

MLA Handbook (7th Edition):

Eilertson, Eric. “A data collection, storage, and analysis framework for network security.” 2007. Web. 16 Jul 2019.

Vancouver:

Eilertson E. A data collection, storage, and analysis framework for network security. [Internet] [Doctoral dissertation]. University of Minnesota; 2007. [cited 2019 Jul 16]. Available from: http://purl.umn.edu/60293.

Council of Science Editors:

Eilertson E. A data collection, storage, and analysis framework for network security. [Doctoral Dissertation]. University of Minnesota; 2007. Available from: http://purl.umn.edu/60293

27. Salajegheh, Mastooreh. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions.

Degree: PhD, Computer Science, 2013, U of Massachusetts : PhD

  My thesis explores the effectiveness of software techniques that bend digital abstractions in order to allow embedded systems to do more with less energy.… (more)

Subjects/Keywords: embedded systems; energy; low-power; rfid; security; storage; Computer Sciences

…volatile storage. The main challenge of this work is to preserve the security and privacy of the… …storage. The primary challenge to this approach was to preserve data privacy and security. My… …Radio Security & Privacy Probabilistic Storage Reliability Unconventional Use of SRAM Security… …saving remote storage system that provides security under the constraints of passive RFID… …otherwise squandered on communication, storage, time keeping, or sensing: 1) CCCP… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salajegheh, M. (2013). Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. (Doctoral Dissertation). U of Massachusetts : PhD. Retrieved from https://scholarworks.umass.edu/open_access_dissertations/704

Chicago Manual of Style (16th Edition):

Salajegheh, Mastooreh. “Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions.” 2013. Doctoral Dissertation, U of Massachusetts : PhD. Accessed July 16, 2019. https://scholarworks.umass.edu/open_access_dissertations/704.

MLA Handbook (7th Edition):

Salajegheh, Mastooreh. “Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions.” 2013. Web. 16 Jul 2019.

Vancouver:

Salajegheh M. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. [Internet] [Doctoral dissertation]. U of Massachusetts : PhD; 2013. [cited 2019 Jul 16]. Available from: https://scholarworks.umass.edu/open_access_dissertations/704.

Council of Science Editors:

Salajegheh M. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. [Doctoral Dissertation]. U of Massachusetts : PhD; 2013. Available from: https://scholarworks.umass.edu/open_access_dissertations/704


University of Florida

28. Chen, Jin ( Dissertant ). Design and implementation of a host-based and event-based detector.

Degree: M.S, Computer and Information Science and Engineering, 2001, University of Florida

 In the recent decade, network system and e-commerce models can go to every "corner" of our world. While people enjoy such unprecedented convenience and happiness,… (more)

Subjects/Keywords: Buffer storage; Detection; Emeralds; Engines; Hash coding; Information search; Intrusion detection systems; Network security; Sliding; Transceivers; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, J. (. D. ). (2001). Design and implementation of a host-based and event-based detector. (Masters Thesis). University of Florida. Retrieved from http://ufdc.ufl.edu/UF00100738

Chicago Manual of Style (16th Edition):

Chen, Jin ( Dissertant ). “Design and implementation of a host-based and event-based detector.” 2001. Masters Thesis, University of Florida. Accessed July 16, 2019. http://ufdc.ufl.edu/UF00100738.

MLA Handbook (7th Edition):

Chen, Jin ( Dissertant ). “Design and implementation of a host-based and event-based detector.” 2001. Web. 16 Jul 2019.

Vancouver:

Chen J(D). Design and implementation of a host-based and event-based detector. [Internet] [Masters thesis]. University of Florida; 2001. [cited 2019 Jul 16]. Available from: http://ufdc.ufl.edu/UF00100738.

Council of Science Editors:

Chen J(D). Design and implementation of a host-based and event-based detector. [Masters Thesis]. University of Florida; 2001. Available from: http://ufdc.ufl.edu/UF00100738


Georgia Tech

29. Subbiah, Arun. Efficient Proactive Security for Sensitive Data Storage.

Degree: PhD, Electrical and Computer Engineering, 2007, Georgia Tech

 Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail.… (more)

Subjects/Keywords: Proactive security; Secret sharing; Grid sharing; Mobile adversary; Byzantine fault tolerance; Quorum systems; Information storage and retrieval systems; Computer security; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subbiah, A. (2007). Efficient Proactive Security for Sensitive Data Storage. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/19719

Chicago Manual of Style (16th Edition):

Subbiah, Arun. “Efficient Proactive Security for Sensitive Data Storage.” 2007. Doctoral Dissertation, Georgia Tech. Accessed July 16, 2019. http://hdl.handle.net/1853/19719.

MLA Handbook (7th Edition):

Subbiah, Arun. “Efficient Proactive Security for Sensitive Data Storage.” 2007. Web. 16 Jul 2019.

Vancouver:

Subbiah A. Efficient Proactive Security for Sensitive Data Storage. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1853/19719.

Council of Science Editors:

Subbiah A. Efficient Proactive Security for Sensitive Data Storage. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/19719


Georgia Tech

30. Paul, Arnab. Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes.

Degree: PhD, Computing, 2005, Georgia Tech

 This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing. The main results are at the intersection of Security and Fault Tolerance… (more)

Subjects/Keywords: Authentication protocol; Large scale storage; Distributed computing; Security; Fault-tolerant computing; Ubiquitous computing; Authentication; Computer security; Electronic data processing Distributed processing; Error-correcting codes (Information theory)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paul, A. (2005). Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/6848

Chicago Manual of Style (16th Edition):

Paul, Arnab. “Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes.” 2005. Doctoral Dissertation, Georgia Tech. Accessed July 16, 2019. http://hdl.handle.net/1853/6848.

MLA Handbook (7th Edition):

Paul, Arnab. “Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes.” 2005. Web. 16 Jul 2019.

Vancouver:

Paul A. Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes. [Internet] [Doctoral dissertation]. Georgia Tech; 2005. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1853/6848.

Council of Science Editors:

Paul A. Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes. [Doctoral Dissertation]. Georgia Tech; 2005. Available from: http://hdl.handle.net/1853/6848

[1] [2]

.