Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(domain reputation). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Johansen, Lisa Yvette. EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION.

Degree: MS, Computer Science and Engineering, 2008, Penn State University

Email has become an integral and sometimes overwhelming part of users’ personal and professional lives. Due to the number of emails and their wide range of importance, managing this communication medium has become a intensely researched topic. In communication net- works, the identification of communities of interest (COIs) – groups of users that share a common bond – has proven highly applicable in automating various tasks. In this thesis, we measure the flow and frequency of user email toward the identification of COIs. Through this identification, we hope to enable the automation of some of the management tasks associated with email. We begin by analyzing a large corpus of university email in order to drive the development of algo- rithms for automatically determining COIs in email. We then validate the proposed algorithms by evaluating their ability to serve as an automated priority filter. Our analysis shows that the proposed algorithms correctly identify email as being sent from the human-identified COI with high accuracy. This indicates that a significant amount of information can be determined solely from the sender and receiver of an email. Identification of COIs in email communication can be highly applicable in a variety of email-related applications. In the second part of our research, we look at a possible application for COI: an automated reputation service for use with DKIM (DomainKeys Identified Mail). We describe a COI-based domain reputation service, analyze its ability to identify relationships between users and domains and compare its characteristics to current reputation services. We discuss the benefit of employing the identification of communities of interest in email.

Subjects/Keywords: domain reputation; social network; email

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johansen, L. Y. (2008). EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8248

Chicago Manual of Style (16th Edition):

Johansen, Lisa Yvette. “EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION.” 2008. Masters Thesis, Penn State University. Accessed July 17, 2019. https://etda.libraries.psu.edu/catalog/8248.

MLA Handbook (7th Edition):

Johansen, Lisa Yvette. “EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION.” 2008. Web. 17 Jul 2019.

Vancouver:

Johansen LY. EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION. [Internet] [Masters thesis]. Penn State University; 2008. [cited 2019 Jul 17]. Available from: https://etda.libraries.psu.edu/catalog/8248.

Council of Science Editors:

Johansen LY. EMAIL COMMUNITIES OF INTEREST AND THEIR APPLICATION. [Masters Thesis]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8248

2. Machado, Alexandre Fragoso. O uso da marca sob a ótica da integridade.

Degree: Mestrado, Direito Comercial, 2013, University of São Paulo

O presente estudo tem como objetivo analisar os efeitos do uso da marca pelo titular ou por terceiros sob a ótica da integridade. O uso da marca traz consequências negativas ao próprio signo no que tange à sua integridade material, causando o desgaste da sua distinção entre marcas de concorrentes, o que faz diminuir a distância distintiva entre os sinais de uma mesma atividade econômica ou afins. Além disso, o uso da marca também pode causar a perda completa de sua unicidade, corpo distintivo da marca, chegando, às vezes, à vulgarização da mesma, tornando-se res communis omnium. Do outro lado, a integridade material da marca pode passar por processos positivos que fortalecem o seu corpo distintivo. O uso da marca com sucesso faz aumentar sua fama perante o mercado e consumidores, diferenciando-a das demais e sendo alçada ao posto de marca famosa. A fama através do uso impulsiona marcas ordinárias ao status de marcas notoriamente conhecidas ou marcas de alto renome. Ambas representam degraus superiores de integridade material em relação às marcas que são ordinariamente protegidas dentro de suas atividades comerciais. Além disso, apesar do direito de uso exclusivo oferecido às marcas registradas, tal direito não é absoluto. Ou seja, mesmo ocorrendo usos desautorizados de marcas de terceiros que ocasionem alterações na integridade material das mesmas, há usos considerados permitidos pela legislação e jurisprudência. Dessa forma, pretende-se demonstrar que o uso da marca é o fio condutor desses fenômenos.

This paper aims to analyze the effects of the use of the trademark by the owner or by third parties from the perspective of the integrity. The use of the trademark brings negative consequences to the sign itself with respect to its material integrity, causing lack of its distinctiveness among competing marks, which slims the distinctive distance between the signs of the same or related economic field. Furthermore, the use of the trademark can also cause the complete loss of its uniqueness, distinctive body of the mark, reaching sometimes the vulgarization of the same, becoming res communis omnium. On the other hand, the material integrity of the mark can undergo positive processes that enhance its distinctive body. The successful use of the mark increases its fame before the market and consumers, differentiating it from others and being raised to a level of a famous mark. The fame through use elevates the ordinary marks to the status of well-known marks or trademarks of high repute. Both represent upper rungs of material integrity towards marks that are ordinarily protected within their fields of activities. Moreover, despite the right of exclusive use offered to registered marks, such right is not absolute. That is, even occurring unauthorized uses of trademarks by third parties which cause changes in the material integrity of the same, there are uses considered permitted by law and jurisprudence. Thus, this paper intends to demonstrate that the use of the mark is the common thread of these phenomena.

Advisors/Committee Members: Silveira, Newton.

Subjects/Keywords: Distinction; Distinctiveness; Integrity; Intellectual property; Marcas; Marcas comerciais; Propriedade intelectual; Public domain; Reputation; Trademark; Uniqueness; Use

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Machado, A. F. (2013). O uso da marca sob a ótica da integridade. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/2/2132/tde-09062014-132140/ ;

Chicago Manual of Style (16th Edition):

Machado, Alexandre Fragoso. “O uso da marca sob a ótica da integridade.” 2013. Masters Thesis, University of São Paulo. Accessed July 17, 2019. http://www.teses.usp.br/teses/disponiveis/2/2132/tde-09062014-132140/ ;.

MLA Handbook (7th Edition):

Machado, Alexandre Fragoso. “O uso da marca sob a ótica da integridade.” 2013. Web. 17 Jul 2019.

Vancouver:

Machado AF. O uso da marca sob a ótica da integridade. [Internet] [Masters thesis]. University of São Paulo; 2013. [cited 2019 Jul 17]. Available from: http://www.teses.usp.br/teses/disponiveis/2/2132/tde-09062014-132140/ ;.

Council of Science Editors:

Machado AF. O uso da marca sob a ótica da integridade. [Masters Thesis]. University of São Paulo; 2013. Available from: http://www.teses.usp.br/teses/disponiveis/2/2132/tde-09062014-132140/ ;


Macquarie University

3. Jayarathna, Wadu M. M. Dilshan. Security techniques for virtual machine based systems.

Degree: 2017, Macquarie University

Empiriical thesis.

Bibliography:

1. Introduction  – 2. Related work  – 3. Application specific attack detection and protection  – 4. Reputation-based model for DNS  – 5. Attacks and defences techniques against reputation systems  – 6. Integrated security model  – 7. Conclusion and future work  – 8. List of publications  – Apendices  – References.

Virtualising computing environments has generated significant research and commercial interest in the past decade and half. The main factors contributing to this resurgence include, but not limited to, greater isolation, ease of deployment and low total cost of ownership that virtualisation provides while improving availability and increasingeffciency of resources. Security has become an important part of the whole virtualisation landscape due to the increased use of virtualised environments that demand diverse security requirements and various levels of trust associated with different platforms, applications and users. This thesis is essentially focusing on security attacks and security architecture for virtual machine based systems.

First, the thesis considers virtual machine introspection based techniques for detecting anomalies in virtual machine based applications and services. In particular, it addresses Domain Naming System (DNS) and Web Server based applications, and analyses the different types of security attacks that are possible against these services and the security measures and architecture that can be adopted to counteract these attacks.

Then, the thesis proposes a graph-based reputation model for domain name system (DNS) to further strengthen the attacks detection capabilities of the proposed architecture. A detailed analysis of the attacks against the reputation system and technique sto counteract them are described.

Finally, an integrated security model combining access control with proposed attack and intrusion detection capabilities together with trust management is proposed for virtual machine based systems. The integrated security architecture can detect intrusions and attacks against the monitored services and is able to dynamically update the access controls policies of the live system to isolate the problematic/compromised service from accessing all other resources while the service is still running. This enables administrators to address the security threats without affecting the rest of the infrastructure. Such a feature helps to enhance the resilience of the system, which is vitally important in securing virtual infrastructures. The thesis describes the design of the integrated security architecture and its implementation. Then the analysis of a number of attacks against DNS and Web servers using the architecture is discussed.

Dynamic nature of detecting attacks, proactively protecting specific applications from previously unknown threats and isolating virtual machines without additional resources can stand out as unique features of the security techniques proposed in this thesis.

1 online resource (xx, 315 pages)…

Advisors/Committee Members: Macquarie University. Department of Computing.

Subjects/Keywords: Virtual computer systems  – Security measures; virtualisation; security; cloud security; trusted computing; access control; intrusion detection; integrated security; domain name system (DNS); WebServer; security attacks; hypervisor; virtual machine introspection (VMI); reputation based systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayarathna, W. M. M. D. (2017). Security techniques for virtual machine based systems. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1260499

Chicago Manual of Style (16th Edition):

Jayarathna, Wadu M M Dilshan. “Security techniques for virtual machine based systems.” 2017. Doctoral Dissertation, Macquarie University. Accessed July 17, 2019. http://hdl.handle.net/1959.14/1260499.

MLA Handbook (7th Edition):

Jayarathna, Wadu M M Dilshan. “Security techniques for virtual machine based systems.” 2017. Web. 17 Jul 2019.

Vancouver:

Jayarathna WMMD. Security techniques for virtual machine based systems. [Internet] [Doctoral dissertation]. Macquarie University; 2017. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/1959.14/1260499.

Council of Science Editors:

Jayarathna WMMD. Security techniques for virtual machine based systems. [Doctoral Dissertation]. Macquarie University; 2017. Available from: http://hdl.handle.net/1959.14/1260499

.