Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer security

Articles 1 - 4 of 4

Full-Text Articles in Library and Information Science

Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler Jan 2022

Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler

Legacy Theses & Dissertations (2009 - 2024)

The growth of cloud-based services collecting user data for online analytical processing (OLAP), machine learning, and applications relating to the Internet of Things (IoT) has also increased concern with data privacy. Privacy-preserving data sharing using Secure Multiparty Communication (SMC) enables the exchange of encrypted data between parties to perform calculations while maintaining data privacy for both parties simultaneously. This research builds on established work that proposed a privacy-preserving driving style recognition protocol designed to work well with semi-honest actors. In this protocol, both parties follow the established algorithms and do not overtly attempt to deceive the other party into revealing …


Bioont : Improving Knowledge Organization And Representation In The Domain Of Biometric Authentication, Stephen Bryan Buerle Jan 2017

Bioont : Improving Knowledge Organization And Representation In The Domain Of Biometric Authentication, Stephen Bryan Buerle

Legacy Theses & Dissertations (2009 - 2024)

This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of a biometric authentication corpus and an empirically derived ontological prototype, which aids and promotes further research into the fundamental ontological structure of the field of biometric authentication. In doing so this research explores the use of automated and semi-supervised ontological engineering, corpus analysis and natural language processes techniques in the development of this …


Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen Jan 2012

Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen

Legacy Theses & Dissertations (2009 - 2024)

The purpose of this dissertation is to develop and test a conceptual model of an Information Security Policy (ISP) and to measure the benefits that accrue to organizations that implement and deploy such policies. As a result of rapid changes in technology, the importance of computer Information Security Policy (ISP) has increased dramatically. In recent decades, governments and private enterprises have increasingly come to store ever greater amounts of information on computers and on networks. Unfortunately, storing information in this manner not only makes firms engaged in cutting-edge technology vulnerable to hackers, but may also jeopardize customer / employee relations, …


Polymorphic Attacks And Network Topology : Application Of Concepts From Natural Systems, Prahalad Rangan Jan 2010

Polymorphic Attacks And Network Topology : Application Of Concepts From Natural Systems, Prahalad Rangan

Legacy Theses & Dissertations (2009 - 2024)

The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers and networks, which could result in system failure. At the user level, the goal of network security is to prevent any malicious attack by a virus or a worm. However, at the network level, total prevention of such malicious attacks is an impossible and impractical objective to …