Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Business Intelligence and Data Warehouse (1)
- Categorical Imperatives (1)
- Compliance (1)
- Consumption (1)
- Cryptography (1)
-
- Data Analytics (1)
- Data Masking (1)
- Data Security and Anonymization (1)
- Health Data Privacy (1)
- Homomorphic Encryption Properties (1)
- Hyper-parameter Optimization (1)
- Impediments (1)
- Interviews (1)
- MITRE ATT&CK (1)
- Machine Learning (1)
- NIST 800.53 (1)
- Network Anomaly Detection (1)
- Optimized Ensemble Learning Model Selection (1)
- Ownership (1)
- Prime Power Groups (1)
- Public Key Cryptosystem (1)
- Qualitative Research (1)
- Repair (1)
- Right to Repair (1)
- Risk Analysis (1)
- Secure Integer Comparison (1)
- Security Controls (1)
- Security Intelligence (1)
- Security Services (1)
- Software Engineering (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat
Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat
Electronic Thesis and Dissertation Repository
The rapid growth of the Internet and related technologies has led to the collection of large amounts of data by individuals, organizations, and society in general [1]. However, this often leads to information overload which occurs when the amount of input (e.g. data) a human is trying to process exceeds their cognitive capacities [2]. Machine learning (ML) has been proposed as one potential methodology capable of extracting useful information from large sets of data [1]. This thesis focuses on two applications. The first is education, namely e-Learning environments. Within this field, this thesis proposes different optimized ML ensemble models to …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Secure Integer Comparisons Using The Homomorphic Properties Of Prime Power Subgroups, Rhys A. Carlton
Secure Integer Comparisons Using The Homomorphic Properties Of Prime Power Subgroups, Rhys A. Carlton
Electronic Thesis and Dissertation Repository
Secure multi party computation allows two or more parties to jointly compute a function under encryption without leaking information about their private inputs. These secure computations are vital in many fields including law enforcement, secure voting and bioinformatics because the privacy of the information is of paramount importance.
One common reference problem for secure multi party computation is the Millionaires' problem which was first introduced by Turing Award winner Yao in his paper "Protocols for secure computation". The Millionaires' problem considers two millionaires who want to know who is richer without disclosing their actual worth.
There are public-key cryptosystems that …