The Master thesis data analysis is a major hurdle that creates major issues in the way of any study selection.
Some ideas for a Master thesis If you are interested in the topics below, contact Nicola Zannone email: Privacy is becoming a urgent issue in information systems because of the stringent requirements imposed by data protection regulations.
Traditional access control mechanisms are not adequate to address these requirements.
The underlying fundamental problem is that those approaches are preventive and thus they are not able to deal with exceptions. The goal of the project is to develop a practical privacy framework that shifts the problem of preventing infringements into a problem of detecting infringements.
The project requires investigation on systematic log auditing techniques, use of patterns and privacy metrics to detect and quantify infringements. Constructing Probable Explanations of Nonconformity: A Data-aware and History-based Approach.
Measuring Privacy Compliance with Process Specifications.
Policy compliance over incomplete logs: Organizations that collect, use and share personal data have to ensure that data are processed according to security and privacy policies.
Compliance is usually assessed by analyzing audit logs, which record user behavior, against policy specifications. However, the logs maintained by an organization may be incomplete i.
The goal of this project is to investigate methods and techniques aims to assist auditors in assessing policy compliance over incomplete logs. In recent years, collaboration has become an important aspect of information systems. With more and more users being connected through the Internet, the need of online collaborative environments has arisen.
This has spurred the development of several collaborative systems like web application platforms e. Collaborative systems provide users an environment in which they can work together to achieve a common goal.
A main feature of collaborative systems is the possibility to share possibly sensitive information. Indeed, sharing information in a collaboration might be required to achieve a common goal. This information, however, might be sensitive and should be accessed exclusively by authorized users.
Information is usually protected by means of access control. However, access control mechanisms usually assume that information is "owned" by single users. This may not be the case in collaborative environments.
Here, more that one user may retain some rights on the information; moreover, each user may regulate access to information in different capacity.
The goal of this project is to investigate novel access control models for collaborative systems.
Over the years several organizations have migrated to more practical solutions to regulate access to sensitive information, e. This has spurred the design and development of techniques and methods to automatically extract access control policies from the current set of permissions assigned to users.
In particular, several role mining techniques have been proposed to automatically extract RBAC policies. In the last years Attribute-Based Access Control ABAC is emerging as the new paradigm for the specification and enforcement of access control policies.
However, the specification of ABAC policies is not trivial for end-users. The goal of this project is to design and develop novel techniques that assist end-users in the mining of ABAC policies from from the current set of permissions assigned to users.
Policy administration in TBA: Tag-Based Authorization TBA is a hybrid access control model that combines the ease of use of extensional access control models with the expressivity of logic-based formalisms.
In particular, it allows the users of a system to assign descriptive tags to the system's resources i. The main limitation of the TBA model is that it lacks support for policy administration. More precisely, it does not allow policy-writers to specify administrative policies that constrain the tags that users can assign, and to verify the compliance of assigned tags with these policies.
The goal of this project is to enable policy administration in TBA.
|Thesis Topics | List Of PhD & Masters Thesis Topics||A thesis is essentially a research project relating to your field of study.|
|Harvard Graduate School of Design||While many security studies have been conducted and reported on enterprise scale organizations, similar research on small businesses in the U.|
|Information for||Through hands-on coursework, research and capstone experiences, you will learn advanced computing while honing your problem-solving, analytical and creative abilities. A High-Quality, Practical Degree When you earn your MS in Computer Science from Lewis University, you receive a practical education that is customizable, market-relevant and immediately applicable to your career.|
|Latest Information Security Project Ideas & Topics | Nevonprojects||Frequently Asked Question s Q: What is the accepted prerequisite degree for becoming eligible for the Master in Network Management and Security?|
Policy Administration in Tag-Based Authorization.Master of Science in Cybersecurity at Eastern Illinois University. Healthy Job Outlook. According to the Bureau of Labor Statistics, the employment opportunities for Information Security Analysts is expected to increase at a much higher than average rate over the next decade, at 18% from Brief Description.
Network segmentation provides methods of controlling access, movement, and network problems. This is commonly viewed as an improved security measurement in networking and as such, the demand for user-friendly visualizations are rising.
Improve your career outlook with a Master's in Cyber Security. Search our comprehensive directory of on-campus and online programs to get started. This list of thesis topics has been divided into two categories; Masters thesis topics and PhD thesis topics.
PhD Thesis Topics This is a list of PhD thesis topics to give you an idea so that you can generate more thesis topics. Oct 04, · Is a master's degree in information security research oriented? What are some good topics for thesis in Information security for a system and storage administrator?
What are some interesting thesis topics in computer security? Security System Thesis for Research Scholars. Security System thesis can be based on home security thesis and library system or library management system thesis. Important documents and properties are ever under risk of being lost or destroyed.