Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Library and Information Science

Partnership Between Library And Graduate School For Electronic Theses And Dissertations, Adrian K. Ho Jan 2014

Partnership Between Library And Graduate School For Electronic Theses And Dissertations, Adrian K. Ho

Adrian K. Ho

This presentation describes how the library and the Graduate School at the University of Kentucky collaborated to streamline the thesis and dissertation submission process. The outcome was that the Graduate School implemented an electronic thesis and dissertation mandate in Fall 2013 and students now submit their theses or dissertations directly to the institutional repository, which enables immediate free online access to their research.


Partnership Between Library And Graduate School For Electronic Theses And Dissertations, Adrian K. Ho Jan 2014

Partnership Between Library And Graduate School For Electronic Theses And Dissertations, Adrian K. Ho

Library Presentations

This presentation describes how the library and the Graduate School at the University of Kentucky collaborated to streamline the thesis and dissertation submission process. The outcome was that the Graduate School implemented an electronic thesis and dissertation mandate in Fall 2013 and students now submit their theses or dissertations directly to the institutional repository, which enables immediate free online access to their research.


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …