Theses

Theses 24 records found  beginprevious15 - 24  jump to record: Search took 0.00 seconds. 
15. Towards Supporting Users in Assessing the Risk in Privilege Elevation / Sara Motiee [LERSSE-THESIS-2011-003]
To better protect users from security incidents, the principle of least privilege (PLP) requires that users and programs be granted the most restrictive set of privileges possible to perform the required tasks. [...]
Published in Sara Motiee, "Towards Supporting Users in Assessing the Risk in Privilege Elevation", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
16. Optimizing Re-Evaluation of Malware Distribution Networks / Kyle Zeeuwen [LERSSE-THESIS-2011-002]
The retrieval and analysis of malicious content is an essential task for security researchers. [...]
Published in Kyle Zeeuwen, "Optimizing Re-Evaluation of Malware Distribution Networks", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
17. Towards Improving the Usability of Personal Firewalls / Fahimeh Raja [LERSSE-THESIS-2011-001]
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. [...]
Published in Fahimeh Raja, "Towards Improving the Usability of Personal Firewalls," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, January 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;
18. Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization / Pranab Kini [LERSSE-THESIS-2010-001]
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. [...]
Published in Pranab Kini, "Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization" Masters thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, October, 2010 :
Transfer from CDS 0.99.7: Download fulltextPDF;
19. Towards Improving the Availability and Performance of Enterprise Authorization Systems / Qiang Wei [LERSSE-THESIS-2009-006]
Authorization protects application resources by allowing only authorized entities to access them. [...]
Published in Qiang Wei, "Towards Improving the Availability and Performance of Enterprise Authorization Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, October, 2009, pp.141.:
Transfer from CDS 0.99.7: Download fulltextPDF;
20. Analysis of ANSI RBAC Support in Commercial Middleware / Wesam M. Darwish [LERSSE-THESIS-2009-001]
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+) [...]
Published in Wesam M. Darwish, "Analysis of ANSI RBAC Support in Commercial Middleware," Master thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, April, 2009, pp.124. :
Transfer from CDS 0.99.7: Download fulltextPDF;
21. Creation and Evaluation of SQL Injection Security Tools / Fabrizio Monticelli [LERSSE-THESIS-2008-005]
This work summarizes our research on the topic of the creation and evaluation of security tools against SQL injection attacks (SQLIAs) [...]
Published in Fabrizio Monticelli, "Creation and Evaluation of SQL Injection Security Tools," Master thesis, Milano (MI), Italia, Department of Computer Engineering, Politecnico di Milano Technical University, Oct, 2008, pp.184. :
Transfer from CDS 0.99.7: Download fulltextPDF;
22. Challenges, Collaborative Interactions, and Diagnosis Performed by IT Security Practitioners: An Empirical Study / Rodrigo Werlinger [LERSSE-THESIS-2008-004]
This thesis investigates four different aspects of information security management: challenges faced by security practitioners, interactive collaborations among security practitioners and other stakeholders, diagnostic work performed by security practitioners during the response to incidents, and factors that impact the adoption of an intrusion detection system in one organization. [...]
Published in Rodrigo Werlinger, "Challenges, Collaborative Interactions, and Diagnosis Performed by IT Security Practitioners: An Empirical Study," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, July 2008. :
Transfer from CDS 0.99.7: Download fulltextPDF;
23. Multiple-Channel Security Model And Its Implementation Over SSL / Yong Song [LERSSE-THESIS-2005-003]
Multiple-Channel SSL (MC-SSL) is a new model and protocol to secure client-server communication. [...]
Published in Yong Song, "Multiple-Channel Security Model And Its Implementation Over SSL," M.A.Sc. thesis in department of ECE, Vancouver, Canada, University of British Columbia, Fall, 2004, pp.100. :
Transfer from CDS 0.99.7: Download fulltextPDF;
24. A Method for Assessing the Trustworthiness of an Entity by Cooperating Authorities / Mathias Kohler [TEST-THESIS-2005-001]
In this thesis a Model of Trust based on Bayesian Networks is introduced. [...]
Published in Mathias Kohler, "A Method for Assessing the Trustworthiness of an Entity by Cooperating Authorities," Master thesis in Communication and Media Engineering, Offenburg, Germany, University of Applied Sciences, Sep, 2005, pp.66. :
Transfer from CDS 0.99.7: Download fulltextPDF;

Theses : 24 records found   beginprevious15 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.