15 results

Embedded document security using sticky policies and identity based encryption

Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture

Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2455031
Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret s...

Cryptographic privacy-preserving enhancement method for investigative data acquisition

Thesis
Kwecka, Z. (2011)
Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...

Garmin satnav forensic methods and artefacts: an exploratory study.

Thesis
Arbelet, A. (2014)
Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7334
Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users e...

An integrated firewall policy validation tool

Thesis
Macfarlane, R. (2009)
An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3971
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manual...

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

Network Firewall Dynamic Performance Evaluation and Formalisation

Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...

Speed improvements for the RSA encryption method

Thesis
Wang, H. (2000)
Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4065
This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the o...

An agent-based Bayesian method for network intrusion detection.

Thesis
Pikoulas, J. (2003)
An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting...

Evaluation of digital identity using Windows CardSpace

Thesis
Fernandez Sepulveda, A. Evaluation of digital identity using Windows CardSpace. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4032
The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a ...