Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(data storage security). Showing records 1 – 30 of 40 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Oklahoma State University

1. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed June 26, 2019. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 26 Jun 2019.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Chiang, Chao-hsun. The implementation of secure cloud storage caching system.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud storage is very popular in recent years. People usually store their important data in cloud storage. However, the cloud storage provider might secretly access… (more)

Subjects/Keywords: Cloud; Cache; Data security; Cloud storage; Cloud storage gateway

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, C. (2014). The implementation of secure cloud storage caching system. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Chao-hsun. “The implementation of secure cloud storage caching system.” 2014. Thesis, NSYSU. Accessed June 26, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Chao-hsun. “The implementation of secure cloud storage caching system.” 2014. Web. 26 Jun 2019.

Vancouver:

Chiang C. The implementation of secure cloud storage caching system. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang C. The implementation of secure cloud storage caching system. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516114-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

3. Sayler, Andy. Custos: A Flexibly Secure Key-Value Storage Platform.

Degree: MS, 2013, University of Colorado

  The magnitude of the digital data we create, store, and interact with on a daily basis is rapidly increasing. Simultaneously, we are demanding increasingly… (more)

Subjects/Keywords: Cloud Services; Computer Security; Encryption; Key Management; Key Storage as a Service; Secret Storage; Computer Sciences; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. (2013). Custos: A Flexibly Secure Key-Value Storage Platform. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/80

Chicago Manual of Style (16th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Masters Thesis, University of Colorado. Accessed June 26, 2019. http://scholar.colorado.edu/csci_gradetds/80.

MLA Handbook (7th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Web. 26 Jun 2019.

Vancouver:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Jun 26]. Available from: http://scholar.colorado.edu/csci_gradetds/80.

Council of Science Editors:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/80


Ryerson University

4. Alkhojandi, Naelah Abdulrahman. Privacy-preserving public auditing with data deduplication in cloud computing.

Degree: 2015, Ryerson University

Storage represents one of the most commonly used cloud services. Data integrity and storage efficiency are two key requirements when storing users’ data. Public auditability,… (more)

Subjects/Keywords: Cloud computing; Computer security; Cloud computing  – Security measures; Computer storage devices; Data protection; Electronic data processing  – Distributed processing  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkhojandi, N. A. (2015). Privacy-preserving public auditing with data deduplication in cloud computing. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Thesis, Ryerson University. Accessed June 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Web. 26 Jun 2019.

Vancouver:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Internet] [Thesis]. Ryerson University; 2015. [cited 2019 Jun 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

5. Radley, Johannes Jurgens. Pseudo-random access compressed archive for security log data.

Degree: MS, Faculty of Science, Computer Science, 2015, Rhodes University

 We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data(more)

Subjects/Keywords: Computer security; Information storage and retrieval systems; Data compression (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Radley, J. J. (2015). Pseudo-random access compressed archive for security log data. (Masters Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1020019

Chicago Manual of Style (16th Edition):

Radley, Johannes Jurgens. “Pseudo-random access compressed archive for security log data.” 2015. Masters Thesis, Rhodes University. Accessed June 26, 2019. http://hdl.handle.net/10962/d1020019.

MLA Handbook (7th Edition):

Radley, Johannes Jurgens. “Pseudo-random access compressed archive for security log data.” 2015. Web. 26 Jun 2019.

Vancouver:

Radley JJ. Pseudo-random access compressed archive for security log data. [Internet] [Masters thesis]. Rhodes University; 2015. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/10962/d1020019.

Council of Science Editors:

Radley JJ. Pseudo-random access compressed archive for security log data. [Masters Thesis]. Rhodes University; 2015. Available from: http://hdl.handle.net/10962/d1020019


Queensland University of Technology

6. Al Beshri, Aiiad Ahmad M. Outsourcing data storage without outsourcing trust in cloud computing.

Degree: 2013, Queensland University of Technology

 The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud… (more)

Subjects/Keywords: Cloud Computing; Cloud Security; Cloud Storage; Cloud Storage Security; Geographic Assurance; Data Replication; Trust in the Cloud

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Beshri, A. A. M. (2013). Outsourcing data storage without outsourcing trust in cloud computing. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61738/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al Beshri, Aiiad Ahmad M. “Outsourcing data storage without outsourcing trust in cloud computing.” 2013. Thesis, Queensland University of Technology. Accessed June 26, 2019. https://eprints.qut.edu.au/61738/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al Beshri, Aiiad Ahmad M. “Outsourcing data storage without outsourcing trust in cloud computing.” 2013. Web. 26 Jun 2019.

Vancouver:

Al Beshri AAM. Outsourcing data storage without outsourcing trust in cloud computing. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2019 Jun 26]. Available from: https://eprints.qut.edu.au/61738/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al Beshri AAM. Outsourcing data storage without outsourcing trust in cloud computing. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/61738/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ottawa

7. Noman, Ali. Addressing the Data Location Assurance Problem of Cloud Storage Environments .

Degree: 2018, University of Ottawa

 In a cloud storage environment, providing geo-location assurance of data to a cloud user is very challenging as the cloud storage provider physically controls the… (more)

Subjects/Keywords: cloud storage security; data location assurance for cloud; cloud computing security; DLAS; proof of data possession solution for cloud; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Noman, A. (2018). Addressing the Data Location Assurance Problem of Cloud Storage Environments . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/37375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Noman, Ali. “Addressing the Data Location Assurance Problem of Cloud Storage Environments .” 2018. Thesis, University of Ottawa. Accessed June 26, 2019. http://hdl.handle.net/10393/37375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Noman, Ali. “Addressing the Data Location Assurance Problem of Cloud Storage Environments .” 2018. Web. 26 Jun 2019.

Vancouver:

Noman A. Addressing the Data Location Assurance Problem of Cloud Storage Environments . [Internet] [Thesis]. University of Ottawa; 2018. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/10393/37375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Noman A. Addressing the Data Location Assurance Problem of Cloud Storage Environments . [Thesis]. University of Ottawa; 2018. Available from: http://hdl.handle.net/10393/37375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

8. Morovat, Katanosh. Data Integrity Verification in Cloud Computing.

Degree: MS, 2015, University of Arkansas

  Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services… (more)

Subjects/Keywords: Applied sciences; Cloud computing; Database management systems; Security; Computer and Systems Architecture; Data Storage Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morovat, K. (2015). Data Integrity Verification in Cloud Computing. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1125

Chicago Manual of Style (16th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Masters Thesis, University of Arkansas. Accessed June 26, 2019. https://scholarworks.uark.edu/etd/1125.

MLA Handbook (7th Edition):

Morovat, Katanosh. “Data Integrity Verification in Cloud Computing.” 2015. Web. 26 Jun 2019.

Vancouver:

Morovat K. Data Integrity Verification in Cloud Computing. [Internet] [Masters thesis]. University of Arkansas; 2015. [cited 2019 Jun 26]. Available from: https://scholarworks.uark.edu/etd/1125.

Council of Science Editors:

Morovat K. Data Integrity Verification in Cloud Computing. [Masters Thesis]. University of Arkansas; 2015. Available from: https://scholarworks.uark.edu/etd/1125

9. Berg, Markus. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.

Degree: Informatics, 2018, University of Skövde

Denna fallstudie har undersökt och studerat hur ett företag som arbetar med informationsteknologi (IT) hanterar problemet att anställda lagrar arbetsrelaterad information i sina privata… (more)

Subjects/Keywords: Cloud storage; private cloud storage; cloud security; Molnlagring; privat molnlagring; säkerhet i molnet; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berg, M. (2018). Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. (Thesis). University of Skövde. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Berg, Markus. “Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.” 2018. Thesis, University of Skövde. Accessed June 26, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Berg, Markus. “Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation.” 2018. Web. 26 Jun 2019.

Vancouver:

Berg M. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. [Internet] [Thesis]. University of Skövde; 2018. [cited 2019 Jun 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Berg M. Privat molnlagring i arbetet : En fallstudie om hur ett IT-företaghanterar att anställda använder privatmolnlagring för arbetsrelateradinformation. [Thesis]. University of Skövde; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

10. Barreto, Andres E. API-Based Acquisition of Evidence from Cloud Storage Providers.

Degree: MS, Computer Science, 2015, University of New Orleans

  Cloud computing and cloud storage services, in particular, pose a new challenge to digital forensic investigations. Currently, evidence acquisition for such services still follows… (more)

Subjects/Keywords: Cloud forensics; cloud storage; kumodd; API-based evidence acquisition; Google Drive; Dropbox; OneDrive; Box; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barreto, A. E. (2015). API-Based Acquisition of Evidence from Cloud Storage Providers. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Thesis, University of New Orleans. Accessed June 26, 2019. https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barreto, Andres E. “API-Based Acquisition of Evidence from Cloud Storage Providers.” 2015. Web. 26 Jun 2019.

Vancouver:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Internet] [Thesis]. University of New Orleans; 2015. [cited 2019 Jun 26]. Available from: https://scholarworks.uno.edu/td/2030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barreto AE. API-Based Acquisition of Evidence from Cloud Storage Providers. [Thesis]. University of New Orleans; 2015. Available from: https://scholarworks.uno.edu/td/2030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mid Sweden University

11. Oduyiga, Adeshola Oyesanya. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection.

Degree: Information Systems and Technology, 2018, Mid Sweden University

  The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for… (more)

Subjects/Keywords: Security-in-cloud-storage; DES; 3DES; Blowfish; RC5; AES; Attacks-on-cloud-facilities; Data-Encryption-Standard; Data-protection.; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oduyiga, A. O. (2018). Security in Cloud Storage : A Suitable Security Algorithm for Data Protection. (Thesis). Mid Sweden University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oduyiga, Adeshola Oyesanya. “Security in Cloud Storage : A Suitable Security Algorithm for Data Protection.” 2018. Thesis, Mid Sweden University. Accessed June 26, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oduyiga, Adeshola Oyesanya. “Security in Cloud Storage : A Suitable Security Algorithm for Data Protection.” 2018. Web. 26 Jun 2019.

Vancouver:

Oduyiga AO. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection. [Internet] [Thesis]. Mid Sweden University; 2018. [cited 2019 Jun 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oduyiga AO. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection. [Thesis]. Mid Sweden University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Rodrigues, Jacinto Coelho. Ferramenta Inteligente de Recolha de Dados.

Degree: 2015, Instituto Politécnico do Porto

À medida que são feitas modificações nas legislações em vigor em relação às energias renováveis, de forma a incentivar o uso destas, surge a necessidade… (more)

Subjects/Keywords: Comunicação de dados; Segurança de dados; Armazenamento de dados; Processamento de dados; Data communication; Data security; Data storage; Data processing; Arquiteturas de Sistemas e Redes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rodrigues, J. C. (2015). Ferramenta Inteligente de Recolha de Dados. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/7158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rodrigues, Jacinto Coelho. “Ferramenta Inteligente de Recolha de Dados.” 2015. Thesis, Instituto Politécnico do Porto. Accessed June 26, 2019. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/7158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rodrigues, Jacinto Coelho. “Ferramenta Inteligente de Recolha de Dados.” 2015. Web. 26 Jun 2019.

Vancouver:

Rodrigues JC. Ferramenta Inteligente de Recolha de Dados. [Internet] [Thesis]. Instituto Politécnico do Porto; 2015. [cited 2019 Jun 26]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/7158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rodrigues JC. Ferramenta Inteligente de Recolha de Dados. [Thesis]. Instituto Politécnico do Porto; 2015. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/7158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Trop, Matej. Metode deljenja skrivnosti.

Degree: 2018, Univerza v Mariboru

Metode deljenja skrivnosti so kriptografske metode, ki s posebnimi postopki skrivnost razdelijo na deleže. Iz dovolj velike podmnožice teh deležev lahko nato izračunamo začetno skrivnost,… (more)

Subjects/Keywords: deljenje skrivnosti; kriptografija; varnost; hranjenje podatkov; secret sharing; cryptography; security; data storage; info:eu-repo/classification/udc/004.08:512.624.95(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trop, M. (2018). Metode deljenja skrivnosti. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=69236 ; https://dk.um.si/Dokument.php?id=121154&dn= ; https://plus.si.cobiss.net/opac7/bib/21154070?lang=sl

Chicago Manual of Style (16th Edition):

Trop, Matej. “Metode deljenja skrivnosti.” 2018. Masters Thesis, Univerza v Mariboru. Accessed June 26, 2019. https://dk.um.si/IzpisGradiva.php?id=69236 ; https://dk.um.si/Dokument.php?id=121154&dn= ; https://plus.si.cobiss.net/opac7/bib/21154070?lang=sl.

MLA Handbook (7th Edition):

Trop, Matej. “Metode deljenja skrivnosti.” 2018. Web. 26 Jun 2019.

Vancouver:

Trop M. Metode deljenja skrivnosti. [Internet] [Masters thesis]. Univerza v Mariboru; 2018. [cited 2019 Jun 26]. Available from: https://dk.um.si/IzpisGradiva.php?id=69236 ; https://dk.um.si/Dokument.php?id=121154&dn= ; https://plus.si.cobiss.net/opac7/bib/21154070?lang=sl.

Council of Science Editors:

Trop M. Metode deljenja skrivnosti. [Masters Thesis]. Univerza v Mariboru; 2018. Available from: https://dk.um.si/IzpisGradiva.php?id=69236 ; https://dk.um.si/Dokument.php?id=121154&dn= ; https://plus.si.cobiss.net/opac7/bib/21154070?lang=sl


Karlstad University

14. Framner, Erik. A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study.

Degree: Karlstad Business School (from 2013), 2019, Karlstad University

Storing personal information in a secure and reliable manner may be crucial for organizational as well as private users. Encryption protects the confidentiality of… (more)

Subjects/Keywords: Secret Sharing; multi-cloud; data storage; user interface; design; HCI; security; privacy; usability; trust; PRISMACLOUD; Human Computer Interaction; Människa-datorinteraktion (interaktionsdesign)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Framner, E. (2019). A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study. (Thesis). Karlstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Framner, Erik. “A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study.” 2019. Thesis, Karlstad University. Accessed June 26, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Framner, Erik. “A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study.” 2019. Web. 26 Jun 2019.

Vancouver:

Framner E. A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study. [Internet] [Thesis]. Karlstad University; 2019. [cited 2019 Jun 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Framner E. A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study. [Thesis]. Karlstad University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

15. Hošek, David. Zavedení doménové struktury v rozsáhlé firmě .

Degree: 2017, Brno University of Technology

 Tato diplomová práce se zabývá problematikou doménové struktury. Hlavní náplní této práce je analýza a návrh zavedení doménové struktury ve firmě. Doménová struktura bude zavedena… (more)

Subjects/Keywords: Doménová struktura; Active Directory; uložiště dat; projekt; bezpečnost; firewall; Domain structure; Active Directory; data storage; project; security; firewall

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hošek, D. (2017). Zavedení doménové struktury v rozsáhlé firmě . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hošek, David. “Zavedení doménové struktury v rozsáhlé firmě .” 2017. Thesis, Brno University of Technology. Accessed June 26, 2019. http://hdl.handle.net/11012/65570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hošek, David. “Zavedení doménové struktury v rozsáhlé firmě .” 2017. Web. 26 Jun 2019.

Vancouver:

Hošek D. Zavedení doménové struktury v rozsáhlé firmě . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/11012/65570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hošek D. Zavedení doménové struktury v rozsáhlé firmě . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/65570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

16. Ali, Osama. Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform.

Degree: 2018, University of Western Ontario

 The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It… (more)

Subjects/Keywords: Business Intelligence and Data Warehouse; Data Masking; Software Framework; Data Security and Anonymization; Health Data Privacy; Business Analytics; Business Intelligence; Computational Engineering; Computer and Systems Architecture; Databases and Information Systems; Data Storage Systems; Information Security; Management Information Systems; Software Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, O. (2018). Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ali, Osama. “Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform.” 2018. Thesis, University of Western Ontario. Accessed June 26, 2019. https://ir.lib.uwo.ca/etd/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ali, Osama. “Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform.” 2018. Web. 26 Jun 2019.

Vancouver:

Ali O. Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform. [Internet] [Thesis]. University of Western Ontario; 2018. [cited 2019 Jun 26]. Available from: https://ir.lib.uwo.ca/etd/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ali O. Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform. [Thesis]. University of Western Ontario; 2018. Available from: https://ir.lib.uwo.ca/etd/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

17. Gajland, Phillip. On Statistical Properties of Arbiter Physical Unclonable Functions.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

  The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50… (more)

Subjects/Keywords: PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gajland, P. (2018). On Statistical Properties of Arbiter Physical Unclonable Functions. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gajland, Phillip. “On Statistical Properties of Arbiter Physical Unclonable Functions.” 2018. Thesis, KTH. Accessed June 26, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gajland, Phillip. “On Statistical Properties of Arbiter Physical Unclonable Functions.” 2018. Web. 26 Jun 2019.

Vancouver:

Gajland P. On Statistical Properties of Arbiter Physical Unclonable Functions. [Internet] [Thesis]. KTH; 2018. [cited 2019 Jun 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gajland P. On Statistical Properties of Arbiter Physical Unclonable Functions. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Unitec New Zealand

18. Alkorbi, Mohammed. Encryption, storage technology and security of data at rest.

Degree: 2015, Unitec New Zealand

 The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years… (more)

Subjects/Keywords: data; sensitive data; data storage; storage of data devices; Hard Disk Drive (HDD); Solid State Hybrid Drive (SSHD); Solid State Disk based NAND Single-Level-Cell (SSD SLC) flash memory; Solid State Disk based NAND Multi-Level-Cell flash memory (SSD MLC); Solid State Disk based NAND Triple-Level- Cell flash memory (SSD TLC); encryption algorithms; BestCrypt (commercial storage encryption software); TrueCrypt (Open source storage encryption software); security; 100602 Input, Output and Data Devices; 080303 Computer System Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkorbi, M. (2015). Encryption, storage technology and security of data at rest. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/3234

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alkorbi, Mohammed. “Encryption, storage technology and security of data at rest.” 2015. Thesis, Unitec New Zealand. Accessed June 26, 2019. http://hdl.handle.net/10652/3234.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alkorbi, Mohammed. “Encryption, storage technology and security of data at rest.” 2015. Web. 26 Jun 2019.

Vancouver:

Alkorbi M. Encryption, storage technology and security of data at rest. [Internet] [Thesis]. Unitec New Zealand; 2015. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/10652/3234.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alkorbi M. Encryption, storage technology and security of data at rest. [Thesis]. Unitec New Zealand; 2015. Available from: http://hdl.handle.net/10652/3234

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – San Bernardino

19. Sodhi, Bir Apaar Singh. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.

Degree: MSin Computer Science, School of Computer Science and Engineering, 2016, California State University – San Bernardino

  In this modern rather interconnected era, an organization’s top priority is to protect itself from major security breaches occurring frequently within a communicational environment.… (more)

Subjects/Keywords: Parallel Computing; Distributed File System; Java Programming; Parser; Big Data; Partitioner; Reducer; Combiner; Mapper; Computer and Systems Architecture; Data Storage Systems; Information Security; Programming Languages and Compilers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sodhi, B. A. S. (2016). DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. (Thesis). California State University – San Bernardino. Retrieved from http://scholarworks.lib.csusb.edu/etd/271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sodhi, Bir Apaar Singh. “DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.” 2016. Thesis, California State University – San Bernardino. Accessed June 26, 2019. http://scholarworks.lib.csusb.edu/etd/271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sodhi, Bir Apaar Singh. “DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP.” 2016. Web. 26 Jun 2019.

Vancouver:

Sodhi BAS. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. [Internet] [Thesis]. California State University – San Bernardino; 2016. [cited 2019 Jun 26]. Available from: http://scholarworks.lib.csusb.edu/etd/271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sodhi BAS. DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP. [Thesis]. California State University – San Bernardino; 2016. Available from: http://scholarworks.lib.csusb.edu/etd/271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

20. Eilertson, Eric. A data collection, storage, and analysis framework for network security.

Degree: PhD, Computer Science, 2007, University of Minnesota

 As the number, severity and sophistication of computer network attacks increase network administrators have an increasingly difficult time identifying and cleaning up compromised computers. In… (more)

Subjects/Keywords: Scan detection; Context extraction; Data mining; Data storage; Network security; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eilertson, E. (2007). A data collection, storage, and analysis framework for network security. (Doctoral Dissertation). University of Minnesota. Retrieved from http://purl.umn.edu/60293

Chicago Manual of Style (16th Edition):

Eilertson, Eric. “A data collection, storage, and analysis framework for network security.” 2007. Doctoral Dissertation, University of Minnesota. Accessed June 26, 2019. http://purl.umn.edu/60293.

MLA Handbook (7th Edition):

Eilertson, Eric. “A data collection, storage, and analysis framework for network security.” 2007. Web. 26 Jun 2019.

Vancouver:

Eilertson E. A data collection, storage, and analysis framework for network security. [Internet] [Doctoral dissertation]. University of Minnesota; 2007. [cited 2019 Jun 26]. Available from: http://purl.umn.edu/60293.

Council of Science Editors:

Eilertson E. A data collection, storage, and analysis framework for network security. [Doctoral Dissertation]. University of Minnesota; 2007. Available from: http://purl.umn.edu/60293


Georgia Tech

21. Parameswaran, Rupa. A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering.

Degree: PhD, Electrical and Computer Engineering, 2006, Georgia Tech

 Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases, such as government records, medical records, and voters… (more)

Subjects/Keywords: Data privacy; Data obfuscation; Data mining; Collaborative filtering; Data mining; Information storage and retrieval systems; Cluster analysis Computer programs; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parameswaran, R. (2006). A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/11459

Chicago Manual of Style (16th Edition):

Parameswaran, Rupa. “A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering.” 2006. Doctoral Dissertation, Georgia Tech. Accessed June 26, 2019. http://hdl.handle.net/1853/11459.

MLA Handbook (7th Edition):

Parameswaran, Rupa. “A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering.” 2006. Web. 26 Jun 2019.

Vancouver:

Parameswaran R. A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/1853/11459.

Council of Science Editors:

Parameswaran R. A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/11459


University of Namibia

22. Uudhila, JM. Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service .

Degree: 2016, University of Namibia

 The persistent threats of the cyber environment drives organizations to adopt risk management as a crucial practice of minimizing dangers to their information assets. However,… (more)

Subjects/Keywords: Threat control ; Information ; Information technology, Security measures ; Risk management ; Information services, Government policy ; Information storage and retrieval systems, Government publications ; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uudhila, J. (2016). Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service . (Thesis). University of Namibia. Retrieved from http://hdl.handle.net/11070/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Uudhila, JM. “Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service .” 2016. Thesis, University of Namibia. Accessed June 26, 2019. http://hdl.handle.net/11070/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Uudhila, JM. “Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service .” 2016. Web. 26 Jun 2019.

Vancouver:

Uudhila J. Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service . [Internet] [Thesis]. University of Namibia; 2016. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/11070/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Uudhila J. Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service . [Thesis]. University of Namibia; 2016. Available from: http://hdl.handle.net/11070/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kansas State University

23. Kleopfer, Lyle. Levels of protection and associated overhead in the formulary protection system.

Degree: 1975, Kansas State University

Subjects/Keywords: Information storage and retrieval systems; Electronic data processing departments – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kleopfer, L. (1975). Levels of protection and associated overhead in the formulary protection system. (Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/8693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kleopfer, Lyle. “Levels of protection and associated overhead in the formulary protection system.” 1975. Thesis, Kansas State University. Accessed June 26, 2019. http://hdl.handle.net/2097/8693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kleopfer, Lyle. “Levels of protection and associated overhead in the formulary protection system.” 1975. Web. 26 Jun 2019.

Vancouver:

Kleopfer L. Levels of protection and associated overhead in the formulary protection system. [Internet] [Thesis]. Kansas State University; 1975. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/2097/8693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kleopfer L. Levels of protection and associated overhead in the formulary protection system. [Thesis]. Kansas State University; 1975. Available from: http://hdl.handle.net/2097/8693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Luo, Jeff Yucong. Secure Cloud Storage.

Degree: 2014, University of Waterloo

 The rapid growth of Cloud based services on the Internet invited many critical security attacks. Consumers and corporations who use the Cloud to store their… (more)

Subjects/Keywords: Cloud Computing; Cloud Storage; Data Security; Cost Optimization; Erasure Code

…Table 5 – Free Tier Data Storage Limits for Cloud Providers [42] [43]… …repository for storing back up data. In team settings, Cloud storage lets teams synchronize and… …organize all kinds of shared data. For start-ups and small corporations, the use of Cloud storage… …security, economic, and reliability issues associated with utilizing the Cloud as a storage… …charge a fee to download data off its Cloud. To take advantage of lower long term storage costs… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, J. Y. (2014). Secure Cloud Storage. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Jeff Yucong. “Secure Cloud Storage.” 2014. Thesis, University of Waterloo. Accessed June 26, 2019. http://hdl.handle.net/10012/8509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Jeff Yucong. “Secure Cloud Storage.” 2014. Web. 26 Jun 2019.

Vancouver:

Luo JY. Secure Cloud Storage. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/10012/8509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo JY. Secure Cloud Storage. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Egli, Peter. Storage Virtualization Promises Agility in the Data Center.

Degree: 2010, Regis University

Data storage and protection has moved to the forefront of Information Technology solutions because the business value of data has gained in rank and importance… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; data security; agile data center; virtual data storage; internet commerce; Regis University MSCIS thesis; College for Professional Studies; MS Systems Engineering; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Egli, P. (2010). Storage Virtualization Promises Agility in the Data Center. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/337

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Egli, Peter. “Storage Virtualization Promises Agility in the Data Center.” 2010. Thesis, Regis University. Accessed June 26, 2019. http://epublications.regis.edu/theses/337.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Egli, Peter. “Storage Virtualization Promises Agility in the Data Center.” 2010. Web. 26 Jun 2019.

Vancouver:

Egli P. Storage Virtualization Promises Agility in the Data Center. [Internet] [Thesis]. Regis University; 2010. [cited 2019 Jun 26]. Available from: http://epublications.regis.edu/theses/337.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Egli P. Storage Virtualization Promises Agility in the Data Center. [Thesis]. Regis University; 2010. Available from: http://epublications.regis.edu/theses/337

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Škoda, Martin. Zabezpečení sdíleného datového úložiště .

Degree: 2012, Brno University of Technology

 Tato práce představuje model cloud computingu. Popisuje modely nasazení a distribuční modely cloud computingu. Distribuční modely software jako služba a infrastruktura jako služba jsou popsány… (more)

Subjects/Keywords: Zabezpečení; sdíleného datového úložiště; Cloud computing; Software jako služba; Infrastruktura jako služba; Kryptografie; Správa identit a přístupu; Ochrana soukromí; Kontrola dat; Bezpečnostní riziko; Model zabezpečení.; Security; Shared data storage; Cloud computing; Aoftware as a service; Infrastructure as a service; Cryptography; Identity and access management; Protection of privacy; Data verification; Security risk; Security model.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Škoda, M. (2012). Zabezpečení sdíleného datového úložiště . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/9723

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Škoda, Martin. “Zabezpečení sdíleného datového úložiště .” 2012. Thesis, Brno University of Technology. Accessed June 26, 2019. http://hdl.handle.net/11012/9723.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Škoda, Martin. “Zabezpečení sdíleného datového úložiště .” 2012. Web. 26 Jun 2019.

Vancouver:

Škoda M. Zabezpečení sdíleného datového úložiště . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/11012/9723.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Škoda M. Zabezpečení sdíleného datového úložiště . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/9723

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

27. James, Peter. Secure portable execution and storage environments: A capability to improve security for remote working.

Degree: 2015, Edith Cowan University

 Remote working is a practice that provides economic benefits to both the employing organisation and the individual. However, evidence suggests that organisations implementing remote working… (more)

Subjects/Keywords: Information Security; Cyber Security; Secure Data at Rest; Secure Portable Storage; Secure Portable Execution Environment; Secure Remote Working; Secure Teleworking; Secure Mobile Working; Secure Deployed Working; Hardened Browser; Hardened Operating System; Anti Digital Forensics; Design Science Research; End Point Security; Human Resources Management; Information Security; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

James, P. (2015). Secure portable execution and storage environments: A capability to improve security for remote working. (Thesis). Edith Cowan University. Retrieved from http://ro.ecu.edu.au/theses/1707

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

James, Peter. “Secure portable execution and storage environments: A capability to improve security for remote working.” 2015. Thesis, Edith Cowan University. Accessed June 26, 2019. http://ro.ecu.edu.au/theses/1707.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

James, Peter. “Secure portable execution and storage environments: A capability to improve security for remote working.” 2015. Web. 26 Jun 2019.

Vancouver:

James P. Secure portable execution and storage environments: A capability to improve security for remote working. [Internet] [Thesis]. Edith Cowan University; 2015. [cited 2019 Jun 26]. Available from: http://ro.ecu.edu.au/theses/1707.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

James P. Secure portable execution and storage environments: A capability to improve security for remote working. [Thesis]. Edith Cowan University; 2015. Available from: http://ro.ecu.edu.au/theses/1707

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Kaaniche, Nesrine. Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques.

Degree: Docteur es, Informatique et réseaux, 2014, Evry, Institut national des télécommunications

 Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale… (more)

Subjects/Keywords: Stockage des données dans le cloud; Confidentialité des données; Intégrité des données; Preuve de possession de données; Sécurité des données dans le cloud; Cryptographie basée sur l'identité; Cryptographie homomorphique; Preuve sans apport de connaissance; Cloud data storage; Data confidentiality; Data integrity; Proof of data possession; Cloud data security; Identity based cryptography; Homomorphic cryptography; Zero-knowledge proofs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaaniche, N. (2014). Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2014TELE0033

Chicago Manual of Style (16th Edition):

Kaaniche, Nesrine. “Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques.” 2014. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed June 26, 2019. http://www.theses.fr/2014TELE0033.

MLA Handbook (7th Edition):

Kaaniche, Nesrine. “Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques.” 2014. Web. 26 Jun 2019.

Vancouver:

Kaaniche N. Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2014. [cited 2019 Jun 26]. Available from: http://www.theses.fr/2014TELE0033.

Council of Science Editors:

Kaaniche N. Cloud data storage security based on cryptographic mechanisms : La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2014. Available from: http://www.theses.fr/2014TELE0033

29. Lundberg, Sebastian. Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform.

Degree: Computer Science, 2015, Linnaeus University

Dagens moderna organisationer driver vanligtvis en kostsam IT-baserad infrastruktur. De besitter högpresterande funktionalitet och säkerhet för att garantera att de dagliga operationerna fortskrider. Mjukvarubaserade… (more)

Subjects/Keywords: Storage platform; Ceph; Storage cluster; Storage; Security; data integrity; recovery; Lagringsplattformar; Ceph; lagringskluster; lagring; lagringssäkerhet; data integritet; återhämtning; Computer Sciences; Datavetenskap (datalogi)

…hantera lagring är med en objektbaserad lagringslösning. Lagringsplattformen behandlar data som… …blocklagringen som skriver data samt metadata till plattformen i samma objekt. Var data som skall… …vanligtvis som IaaS vid nyttjande av Software Defined Storage [28]. Det existerar ett… …noder som hanterar data [30]. 2.5 Dataintegritet Beroende på de krav som existerar… …för lagringslösningar idag kombineras olika tekniker i syfte att skydda data. Säkerhet i… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lundberg, S. (2015). Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lundberg, Sebastian. “Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform.” 2015. Thesis, Linnaeus University. Accessed June 26, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lundberg, Sebastian. “Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform.” 2015. Web. 26 Jun 2019.

Vancouver:

Lundberg S. Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform. [Internet] [Thesis]. Linnaeus University; 2015. [cited 2019 Jun 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lundberg S. Integritetsstudie av Ceph : En mjukvarubaserad lagringsplattform. [Thesis]. Linnaeus University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

30. Shi, Weidong. Architectural Support for Protecting Memory Integrity and Confidentiality.

Degree: PhD, Computing, 2006, Georgia Tech

 This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes… (more)

Subjects/Keywords: Anti-reverse engineering; Secure processor; Memory protection; Computer storage devices; Data encryption (Computer science); Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shi, W. (2006). Architectural Support for Protecting Memory Integrity and Confidentiality. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/11460

Chicago Manual of Style (16th Edition):

Shi, Weidong. “Architectural Support for Protecting Memory Integrity and Confidentiality.” 2006. Doctoral Dissertation, Georgia Tech. Accessed June 26, 2019. http://hdl.handle.net/1853/11460.

MLA Handbook (7th Edition):

Shi, Weidong. “Architectural Support for Protecting Memory Integrity and Confidentiality.” 2006. Web. 26 Jun 2019.

Vancouver:

Shi W. Architectural Support for Protecting Memory Integrity and Confidentiality. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Jun 26]. Available from: http://hdl.handle.net/1853/11460.

Council of Science Editors:

Shi W. Architectural Support for Protecting Memory Integrity and Confidentiality. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/11460

[1] [2]

.