You searched for subject:(Unauthorized access)
.
Showing records 1 – 7 of
7 total matches.
No search limiters apply to these results.

NSYSU
1.
Wang, Yu-ching.
A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.
Degree: Master, Information Management, 2012, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
► Unauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages…
(more)
▼ Unauthorized computer
access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages to commit it and then find effective methods of prevention to reduce the crime rate. Many studies on computer hacking has discussed the reasons for the behavior, for example: neutralization theory, differential association theory and containment theory. However, those theories and perspectives were adopted independently in past research. In this study, we combine those perspectives and create an integrated model to explain the employeeâs intention to commit
unauthorized computer
access.
Data collected from 351employees in Taiwan confirmed our hypotheses and were tested against the research model. The results support the theoretical model in explaining how neutralization theory and containment theory may affect an employeeâs intention to commit
unauthorized computer
access. Finally, we found that neutralization is the most important factor to take into account when organizations develop and implement security policies or education which can decrease employeesâ intentions to commit
unauthorized computer
access.
Advisors/Committee Members: Tung-Chin Lin (committee member), Jen-Ruei Fu (chair), Jack Shih-Chieh Hsu (committee member), Cathy S. Lin (chair).
Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed January 26, 2021.
http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 26 Jan 2021.
Vancouver:
Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 26].
Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Cambridge
2.
Vetterl, Alexander.
Honeypots in the age of universal attacks and the Internet of Things.
Degree: PhD, 2020, University of Cambridge
URL: https://www.repository.cam.ac.uk/handle/1810/303171
► Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on…
(more)
▼ Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on recent advances in Internet-wide scanning and device discovery. The speed at which (vulnerable) devices can be discovered, and the device monoculture, mean that a single exploit, potentially trivial, can affect millions of devices across brands and continents.
In an attempt to detect and profile the growing threat of autonomous and Internet-scale attacks against the Internet of Things, we revisit honeypots, resources that appear to be legitimate systems. We show that this endeavour was previously limited by a fundamentally flawed generation of honeypots and associated misconceptions.
We show with two one-year-long studies that the display of warning messages has no deterrent effect in an attacked computer system. Previous research assumed that they would measure individual behaviour, but we find that the number of human attackers is orders of magnitude lower than previously assumed.
Turning to the current generation of low- and medium-interaction honeypots, we demonstrate that their architecture is fatally flawed. The use of off-the-shelf libraries to provide the transport layer means that the protocols are implemented subtly differently from the systems being impersonated. We developed a generic technique which can find any such honeypot at Internet scale with just one packet for an established TCP connection.
We then applied our technique and conducted several Internet-wide scans over a one-year period. By logging in to two SSH honeypots and sending specific commands, we not only revealed their configuration and patch status, but also found that many of them were not up to date. As we were the first to knowingly authenticate to honeypots, we provide a detailed legal analysis and an extended ethical justification for our research to show why we did not infringe computer-misuse laws.
Lastly, we present honware, a honeypot framework for rapid implementation and deployment of high-interaction honeypots. Honware automatically processes a standard firmware image and can emulate a wide range of devices without any access to the manufacturers' hardware. We believe that honware is a major contribution towards re-balancing the economics of attackers and defenders by reducing the period in which attackers can exploit vulnerabilities at Internet scale in a world of ubiquitous networked `things'.
Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/303171
Chicago Manual of Style (16th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021.
https://www.repository.cam.ac.uk/handle/1810/303171.
MLA Handbook (7th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.
Vancouver:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26].
Available from: https://www.repository.cam.ac.uk/handle/1810/303171.
Council of Science Editors:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://www.repository.cam.ac.uk/handle/1810/303171
3.
Mačužić, Vladimir.
Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.
Degree: 2018, Univerza v Mariboru
URL: https://dk.um.si/IzpisGradiva.php?id=69856
;
https://dk.um.si/Dokument.php?id=124122&dn=
;
https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl
► V magistrskem delu raziskujemo pojav in razvoj Wi-Fi tehnologije in kibernetske kriminalitete ter potrebo po učinkovitih varnostnih nastavitvah računalniških sistemov z namenom preprečevanja nepooblaščenega dostopanja…
(more)
▼ V magistrskem delu raziskujemo pojav in razvoj Wi-Fi tehnologije in kibernetske kriminalitete ter potrebo po učinkovitih varnostnih nastavitvah računalniških sistemov z namenom preprečevanja nepooblaščenega dostopanja do poslovnih podatkov. V magistrskem delu je prikazana problematika varnosti Wi-Fi tehnologije in varnostnih nastavitev računalniških sistemov gostinskih lokalov, ki uporabnikom predstavljajo dodatno tveganje za nepooblaščeno dostopanje do poslovnih podatkov. V delu so predstavljeni ukrepi in rešitve za izboljšanje varnosti Wi-Fi tehnologije in varnostnih nastavitev računalniških sistemov. Predstavljeni so tudi načini ozaveščanja uporabnikov glede kibernetske kriminalitete in varnosti, ki bodo uporabnikom omogočili bolj rigorozno nastavitev varnostnih protokolov, ter percepcije kibernetskega prostora kot vse bolj razvijajočega se segmenta, polnega inovativnih groženj.
S študijem in analiziranjem literature smo opisali in predstavili Wi-Fi tehnologijo ter njene varnostne slabosti. Prav tako smo predstavili kibernetsko kriminaliteto, nepooblaščene vdore v računalniške in druge informacijske sisteme ter akterje, ki izvajajo nepooblaščene vdore. Z analitično metodo smo predstavili trenutno stanje moderne Wi-Fi tehnologije in varnosti ter prikazali najbolj znane primere nepooblaščenih vdorov v zadnjih letih. Nadalje smo s pomočjo kvantitativne metode oziroma ankete prišli do spoznanj, da so potrebni dodatni varnostni mehanizmi in ozaveščanje uporabnikov z namenom vzpostavitve učinkovite digitalne varnosti. S pomočjo raziskovanja potrebe po boljši ozaveščenosti lastnikov gostinskih lokalov glede kibernetske varnosti in neučinkovitih varnostnih mehanizmov le-teh pričakujemo, da bodo lastniki gostinskih lokalov kibernetske grožnje razumeli kot realne in vseprisotne.
This master's thesis is comprised of the exploration of the Wi-Fi phenomenon, its development and security. The thesis also explores the need for effective computer systems security measures with the primary goal of preventing unauthorized accesses to sensitive business data and information. The ever-increasing problem of Wi-Fi security, as well as inadequate security measures relating to computer systems of the users, in this case the owners of cafés, is also incorporated in the thesis, as it is the main cause for their vulnerability. Because of the latter reasons, we have introduced additional measures and solutions, which can effectively ensure higher Wi-Fi security, as well as better computer systems security settings and mechanisms. Additionally, we have introduced awareness-raising solutions regarding cybercrime and security, which, if taken into consideration, can enable the users to take more rigorous security mechanisms into play. That way the users can perceive the ever-changing cyberspace as an element that is full of different threats.
By studying and analyzing relevant literature, we described and presented Wi-Fi technology and its vulnerabilities. Also, we described cybercrime, unauthorized accesses to computer and other relevant…
Advisors/Committee Members: Bernik, Igor.
Subjects/Keywords: brezžična omrežja; Wi-Fi; podatki; poslovni podatki; nepooblaščeni vdori; informacijska varnost; gostinski lokali; magistrska dela; cybercrime; Wi-Fi technology; awareness level; computer systems; unauthorized access; info:eu-repo/classification/udc/004.056(043.2)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mačužić, V. (2018). Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl
Chicago Manual of Style (16th Edition):
Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Masters Thesis, Univerza v Mariboru. Accessed January 26, 2021.
https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.
MLA Handbook (7th Edition):
Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Web. 26 Jan 2021.
Vancouver:
Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Internet] [Masters thesis]. Univerza v Mariboru; 2018. [cited 2021 Jan 26].
Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.
Council of Science Editors:
Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Masters Thesis]. Univerza v Mariboru; 2018. Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl

University of Cambridge
4.
Vetterl, Alexander.
Honeypots in the age of universal attacks and the Internet of Things.
Degree: PhD, 2020, University of Cambridge
URL: https://doi.org/10.17863/CAM.50250
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825
► Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on…
(more)
▼ Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on recent advances in Internet-wide scanning and device discovery. The speed at which (vulnerable) devices can be discovered, and the device monoculture, mean that a single exploit, potentially trivial, can affect millions of devices across brands and continents. In an attempt to detect and profile the growing threat of autonomous and Internet-scale attacks against the Internet of Things, we revisit honeypots, resources that appear to be legitimate systems. We show that this endeavour was previously limited by a fundamentally flawed generation of honeypots and associated misconceptions. We show with two one-year-long studies that the display of warning messages has no deterrent effect in an attacked computer system. Previous research assumed that they would measure individual behaviour, but we find that the number of human attackers is orders of magnitude lower than previously assumed. Turning to the current generation of low- and medium-interaction honeypots, we demonstrate that their architecture is fatally flawed. The use of off-the-shelf libraries to provide the transport layer means that the protocols are implemented subtly differently from the systems being impersonated. We developed a generic technique which can find any such honeypot at Internet scale with just one packet for an established TCP connection. We then applied our technique and conducted several Internet-wide scans over a one-year period. By logging in to two SSH honeypots and sending specific commands, we not only revealed their configuration and patch status, but also found that many of them were not up to date. As we were the first to knowingly authenticate to honeypots, we provide a detailed legal analysis and an extended ethical justification for our research to show why we did not infringe computer-misuse laws. Lastly, we present honware, a honeypot framework for rapid implementation and deployment of high-interaction honeypots. Honware automatically processes a standard firmware image and can emulate a wide range of devices without any access to the manufacturers' hardware. We believe that honware is a major contribution towards re-balancing the economics of attackers and defenders by reducing the period in which attackers can exploit vulnerabilities at Internet scale in a world of ubiquitous networked 'things'.
Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825
Chicago Manual of Style (16th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021.
https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.
MLA Handbook (7th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.
Vancouver:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26].
Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.
Council of Science Editors:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825

Youngstown State University
5.
Steh, Stephen R.
Unauthorized Access Crimes.
Degree: MSin Criminal Justice, Department of Criminal Justice, 2009, Youngstown State University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817
► This paper examines the concept of unauthorized access crimes statutes in the fifty states and the federal system in order to determine the concept of…
(more)
▼ This paper examines the concept of
unauthorized access
crimes statutes in the fifty states and the federal system in order
to determine the concept of what exactly the crime of
unauthorized
access constitutes. This paper will also determine whether these
same crimes could be prosecuted under preexisting statutes that
were already in effect in the United States criminal codes prior to
the invention of the computer. Through a review of previous
literature on the
subject of computer crime laws, and more
specifically
unauthorized access laws, additional insight as to the
purpose and intent of these laws will also be drawn. Case law on
unauthorized access and any related criminal activity will also be
examined. This information will help to determine whether the
intentions of the legislatures have been to criminalize what is
commonly referred to as hacking.
Advisors/Committee Members: Wagner, Patricia (Advisor).
Subjects/Keywords: Computer Science; Criminology; Law; Technology; computer crime; hacking; unauthorized access; legislation and case law
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Steh, S. R. (2009). Unauthorized Access Crimes. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817
Chicago Manual of Style (16th Edition):
Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Masters Thesis, Youngstown State University. Accessed January 26, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
MLA Handbook (7th Edition):
Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Web. 26 Jan 2021.
Vancouver:
Steh SR. Unauthorized Access Crimes. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2021 Jan 26].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Council of Science Editors:
Steh SR. Unauthorized Access Crimes. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

Pontifícia Universidade Católica de São Paulo
6.
Sérgio Luiz de Almeida Ribeiro.
Habeas data e tutela jurisdicional da privacidade: aspectos processuais.
Degree: 2013, Pontifícia Universidade Católica de São Paulo
URL: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198
► Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a…
(more)
▼ Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a utilidade do referido instituto como instrumento específico de proteção da vida íntima e evidenciar a possibilidade de o indivíduo exercer preventivamente o controle do manuseio indevido de dados pessoais por entidades mantenedoras de bancos dados, como é o caso de redes sociais e órgãos de proteção ao crédito, não se restringindo apenas ao meio processual para obter e/ou retificar informações em entidades mantenedoras de bancos dados, públicas e privadas de caráter público. Para atingir esse propósito, e com o suporte metodológico da abordagem dedutiva e da técnica de pesquisa bibliográfica, os seguintes assuntos foram abordados: aspectos históricos, conceito e escopo do habeas data, o procedimento da ação de habeas data na disciplina da Lei n 9.507/1997 e, por último, as questões ainda controvertidas acerca do referido instituto. A título de conclusão, a principal crítica que emerge do tema analisado alude à comparação do habeas data ao mandado de segurança, que repercutiu no procedimento adotado por sua norma específica (Lei n 9.507/1997), afastando assim este remédio constitucional da sua finalidade precípua, qual seja, preservar objetivamente a vida íntima e servir como instrumento processual específico para esse fim. Outra crítica se refere à exigência de o jurisdicionado trilhar e esgotar toda a via administrativa antes de se socorrer do Judiciário, por meio do habeas data, para obtenção de informações e/ou retificação de dados incorretos a seu respeito. Em rigor, tal exigência impede que o habeas data seja instrumento eficaz na prevenção de danos da vida privada perpetrados por órgãos de proteção ao crédito e redes sociais, por exemplo
This dissertation is about the habeas data and its procedural aspects, as a mean to protect privacy. The main objective of this study is to analyze the usefulness of this feature as a specific instrument for protection of individuals privacy, as well as to ensure that citizens may control the wrongful use of their personal data through social networks and credit protection institutions. In this sense, the habeas data would not be restricted to obtaining general information or rectifying data before public authorities and private companies. In order to achieve this purpose, and based on the deductive method and bibliographical research, the following topics have been addressed in this paper: historical aspects, concept and objetive of the habeas data, proceedings upon habeas data under Law 9507/1997, and, lastly, controversial aspects on habeas data. As a conclusion, the main criticism developed herein is related to the comparison between the habeas data and the writ of mandamus, which has caused a procedural impact on the Law 9507/97. This Law, that rules the habeas data, changed the primary constitutional objective of it, which was very much related to the protection of privacy and the proceedings to achieve…
Advisors/Committee Members: Thereza Celina Diniz de Arruda Alvim.
Subjects/Keywords: DIREITO; Direito fundamental à intimidade; Acesso à justiça; Habeas data; Entidades públicas e/ou privada mantenedoras de bancos de dados; Prevenção contra manuseio e disseminação desautorizados de dados da vida privada; Fundamental right to privacy; Access to justice; Habeas data; Public entities and private administrators of data banks; Protection against handling and unauthorized divulgation of private life data
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ribeiro, S. L. d. A. (2013). Habeas data e tutela jurisdicional da privacidade: aspectos processuais. (Thesis). Pontifícia Universidade Católica de São Paulo. Retrieved from http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ribeiro, Sérgio Luiz de Almeida. “Habeas data e tutela jurisdicional da privacidade: aspectos processuais.” 2013. Thesis, Pontifícia Universidade Católica de São Paulo. Accessed January 26, 2021.
http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ribeiro, Sérgio Luiz de Almeida. “Habeas data e tutela jurisdicional da privacidade: aspectos processuais.” 2013. Web. 26 Jan 2021.
Vancouver:
Ribeiro SLdA. Habeas data e tutela jurisdicional da privacidade: aspectos processuais. [Internet] [Thesis]. Pontifícia Universidade Católica de São Paulo; 2013. [cited 2021 Jan 26].
Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ribeiro SLdA. Habeas data e tutela jurisdicional da privacidade: aspectos processuais. [Thesis]. Pontifícia Universidade Católica de São Paulo; 2013. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Wollongong
7.
Kong, Yibing.
Security and privacy model for association databases.
Degree: Master of Computer Science by Research, School of Information Technology and Computer Science - Faculty of Informatics, 2003, University of Wollongong
URL: ;
https://ro.uow.edu.au/theses/8
► With the rapid development of information technology, data availability is improved greatly. Data may be accessed at anytime by people from any location. However,threats…
(more)
▼ With the rapid development of information technology, data availability is improved greatly. Data may be accessed at anytime by people from any location. However,threats to data security and privacy arise as one of the major problems of the development of information systems, especially those information systems which contain personal information. An association database is a personal information system which contains associations between persons. In this thesis, we identify the security and privacy problems of association databases. In order to solve these problems, we propose a new security and privacy model for association databases equipped with both direct access control and inference control mechanisms. In this model, there are multiple criteria including, not only confidentiality, but also privacy and other aspects of security to classify the association. The methods used in the system are: The direct access control method is based on the mandatory model; The inference control method is based on both logic reasoning and probabilistic reasoning (Belief Networks). My contributions to security and privacy model for association databases and to inference control in the model include: Identification of security and privacy problems in association databases; Formal definition of association database model; Representation association databases as directed multiple graphs; Development of axioms for direct access control; Specification of the unauthorized inference problem; A method for unauthorized inference detection and control that includes: Development of logic inference rules and probabilistic inference rule; Application of belief networks as a tool for unauthorized inference detection and control.
Subjects/Keywords: information technology • data security • privacy • associations • association databases • direct access control • inference control • inference detection • unauthorized inference • confidentiality • mandatory model • logic reasoning • probabilistic reasoning • belief networks • logic inference rules • probabilistic inference rule
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kong, Y. (2003). Security and privacy model for association databases. (Masters Thesis). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/8
Chicago Manual of Style (16th Edition):
Kong, Yibing. “Security and privacy model for association databases.” 2003. Masters Thesis, University of Wollongong. Accessed January 26, 2021.
; https://ro.uow.edu.au/theses/8.
MLA Handbook (7th Edition):
Kong, Yibing. “Security and privacy model for association databases.” 2003. Web. 26 Jan 2021.
Vancouver:
Kong Y. Security and privacy model for association databases. [Internet] [Masters thesis]. University of Wollongong; 2003. [cited 2021 Jan 26].
Available from: ; https://ro.uow.edu.au/theses/8.
Council of Science Editors:
Kong Y. Security and privacy model for association databases. [Masters Thesis]. University of Wollongong; 2003. Available from: ; https://ro.uow.edu.au/theses/8
.