Showing 1 - 10 of 109
The dissertation consists of two parts. The first part investigates whether and how to protect cultural goods. In particular, Chapter II analyses how the notion of social identity affects the respective demand for protection of cultural goods independent of its tangible or intangible nature....
Persistent link: https://www.econbiz.de/10011297188
degree on IT efficiency and security. The findings of this study, which has been conducted in partnership with the … of the present e-security situation in SMEs of Queensland's Gold Coast region. The data shows that the installation and … updating process in order to be on top of the IT development, which is why most SMEs rely to a substantial degree on the …
Persistent link: https://www.econbiz.de/10009437520
risk is placed on the security and privacy of the data. PVI, LoBot, and TVEM provide a means for clients to establish trust … in cloud platforms, thus reducing their risk exposure. PVI is a new management and security model that shares the … responsibility of security management in cloud computing between the service provider and client, decreasing the risk exposure to …
Persistent link: https://www.econbiz.de/10009439441
are more likely to affect user satisfaction than unintentional security breaches. Additional analyses were performed using …. The results also facilitated the development of a usability model and associated recommendations for how sites that … privacy policies and the impact of privacy and security breaches. As part of this research, a conceptual model is presented …
Persistent link: https://www.econbiz.de/10009439442
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071
information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT … discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research … literature so far. Second, we conduct a detailed security analysis of the most influential standard Object Naming Service (ONS …
Persistent link: https://www.econbiz.de/10009467072
Rapide Fortschritte in der Netzwerk- und Speichertechnologie haben dazu geführt, dass Informationen über viele verschiedene Quellen wie z.B. Personal Computer oder Datenbanken verstreut sind. Weil diese Informationen oft auch sehr heterogen sind, wurde gleichzeitig die Entwicklung effektiver...
Persistent link: https://www.econbiz.de/10009467121
human needs, is key to economic development, public health, and military security. The availability of these two resources …
Persistent link: https://www.econbiz.de/10009475575