Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Trusted path). Showing records 1 – 5 of 5 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


George Mason University

1. Le, Meixing. Secure Cooperative Data Access in Multi-Cloud Environment .

Degree: 2013, George Mason University

 In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple… (more)

Subjects/Keywords: Information technology; authorization rule; consistent query plan; cooperative data access; join path; trusted third party

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Le, M. (2013). Secure Cooperative Data Access in Multi-Cloud Environment . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8286

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Le, Meixing. “Secure Cooperative Data Access in Multi-Cloud Environment .” 2013. Thesis, George Mason University. Accessed October 23, 2019. http://hdl.handle.net/1920/8286.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Le, Meixing. “Secure Cooperative Data Access in Multi-Cloud Environment .” 2013. Web. 23 Oct 2019.

Vancouver:

Le M. Secure Cooperative Data Access in Multi-Cloud Environment . [Internet] [Thesis]. George Mason University; 2013. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/1920/8286.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Le M. Secure Cooperative Data Access in Multi-Cloud Environment . [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8286

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

2. Kong, Jiantao. Trusted data path protecting shared data in virtualized distributed systems.

Degree: PhD, Computing, 2010, Georgia Tech

 When sharing data across multiple sites, service applications should not be trusted automatically. Services that are suspected of faulty, erroneous, or malicious behaviors, or that… (more)

Subjects/Keywords: Trusted data path; Context flow control; Trust-based access control; Attribute based access control; Security and privacy; Data protection; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kong, J. (2010). Trusted data path protecting shared data in virtualized distributed systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33820

Chicago Manual of Style (16th Edition):

Kong, Jiantao. “Trusted data path protecting shared data in virtualized distributed systems.” 2010. Doctoral Dissertation, Georgia Tech. Accessed October 23, 2019. http://hdl.handle.net/1853/33820.

MLA Handbook (7th Edition):

Kong, Jiantao. “Trusted data path protecting shared data in virtualized distributed systems.” 2010. Web. 23 Oct 2019.

Vancouver:

Kong J. Trusted data path protecting shared data in virtualized distributed systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/1853/33820.

Council of Science Editors:

Kong J. Trusted data path protecting shared data in virtualized distributed systems. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33820


Anna University

3. Neelavathy pari S. Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;.

Degree: Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks, 2015, Anna University

Since last two decades Mobile Ad hoc Networks MANETs has been extensively studied and have attracted the attention of researchers because of their ease of… (more)

Subjects/Keywords: Dempster Shafer Theory; Information and communication engineering; Malicious Node Detection; Mobile Ad hoc Networks; Trade model; Trusted path routing protocol; Zero Knowledge Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

S, N. p. (2015). Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/50225

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

S, Neelavathy pari. “Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;.” 2015. Thesis, Anna University. Accessed October 23, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/50225.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

S, Neelavathy pari. “Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;.” 2015. Web. 23 Oct 2019.

Vancouver:

S Np. Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;. [Internet] [Thesis]. Anna University; 2015. [cited 2019 Oct 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/50225.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

S Np. Investigation of malicious nodes by security improvisation of routing in mobile ad hoc networks;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/50225

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Zhou, Zongwei. On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms.

Degree: 2014, Carnegie Mellon University

 Today large software systems (i.e., giants) thrive in commodity markets, but are untrustworthy due to their numerous and inevitable software bugs that can be exploited… (more)

Subjects/Keywords: On-demand Isolated I/O; Trusted Path; Micro-hypervisor; Isolated Execution Environment; Peripheral Devices; Wimpy Kernel

Trusted Path System 6.1 57 A Simple Hypervisor-based Trusted Path… …based USB Trusted Path . . . . . . . . . . . . . . . . . . . . . 61 6.2.1 Micro-hypervisor… …Comparison of Hypervisor Code Bases . . . . . . . . . . . . . . . . . . . . 58 6.2 Trusted-path… …them. The user of the trusted path should be able to verify the channel status, i.e., whether… …trusted path is a necessary response to what Clark and Blumenthal call the “ultimate insult… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, Z. (2014). On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhou, Zongwei. “On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms.” 2014. Thesis, Carnegie Mellon University. Accessed October 23, 2019. http://repository.cmu.edu/dissertations/328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhou, Zongwei. “On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms.” 2014. Web. 23 Oct 2019.

Vancouver:

Zhou Z. On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms. [Internet] [Thesis]. Carnegie Mellon University; 2014. [cited 2019 Oct 23]. Available from: http://repository.cmu.edu/dissertations/328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhou Z. On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms. [Thesis]. Carnegie Mellon University; 2014. Available from: http://repository.cmu.edu/dissertations/328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Salaün, Mickaël. Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface.

Degree: Docteur es, Informatique, 2018, Evry, Institut national des télécommunications

Cette thèse souhaite fournir des outils pour qu’un utilisateur puisse contribuer activement à la sécurité de son usage d’un système informatique. Les activités de sensibilités… (more)

Subjects/Keywords: Sécurité; Système d’exploitation; Contrôle d’accès; Activité utilisateur; Cloisonnement; Interface homme-machine (IHM); Serveur d’affichage; Chemin de confiance; Security; Operating system; Access control; User activity; Confinement; Sandboxing; Human-computer interface (HCI); Display server; Trusted path

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salaün, M. (2018). Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2018TELE0006

Chicago Manual of Style (16th Edition):

Salaün, Mickaël. “Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface.” 2018. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed October 23, 2019. http://www.theses.fr/2018TELE0006.

MLA Handbook (7th Edition):

Salaün, Mickaël. “Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface.” 2018. Web. 23 Oct 2019.

Vancouver:

Salaün M. Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2018. [cited 2019 Oct 23]. Available from: http://www.theses.fr/2018TELE0006.

Council of Science Editors:

Salaün M. Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance : Involving the end user in access control : from confined processes to trusted human-computer interface. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2018. Available from: http://www.theses.fr/2018TELE0006

.