On the issues of auditing cryptographic applications and studying mono-unary algebras

In this thesis several applications of mono-unary algebras and a systematic approach to audit cryptographic applications were presented. This thesis is based on the observation that most of the procedures to perform IS audits utilize check-lists, which might not be applicable to all IT environments;...

Full description

Saved in:
Bibliographic Details
Main Author: Carrillo Ugalde, Jorge (Dissertant)
Other Authors: Gruska, Jozef, 1933- (Thesis advisor)
Format: Thesis Manuscript
Language:English
Published: 2007.
Subjects:
Online Access:http://is.muni.cz/th/55823/fi_d/
Cover Image
LEADER 04813ctm a22007337a 4500
001 MUB01000538151
003 CZ BrMU
005 20080519093546.0
008 080122s2007 xr ||||| |||||||||||eng d
STA |a POSLANO DO SKCR  |b 2017-03-06 
035 |a (ISMU-VSKP)72757 
040 |a BOD114  |b cze  |d BOD018 
080 |a 003.26  |2 MRF 
100 1 |a Carrillo Ugalde, Jorge  |% UČO 55823  |* [absolvent FI MU]  |4 dis 
245 1 0 |a On the issues of auditing cryptographic applications and studying mono-unary algebras  |h [rukopis] /  |c Jorge Carrillo Ugalde. 
260 |c 2007. 
300 |a 81 s. 
500 |a Vedoucí práce: Jozef Gruska. 
502 |a Dizertace (Ph.D.)--Masarykova univerzita, Fakulta informatiky, 2008. 
520 2 |a In this thesis several applications of mono-unary algebras and a systematic approach to audit cryptographic applications were presented. This thesis is based on the observation that most of the procedures to perform IS audits utilize check-lists, which might not be applicable to all IT environments; however, by examining some applications of a simple algebraic structure, such as mono-unary algebras, a systematic methodology to execute an IS audit could be designed to improve the current IS audit approach. By defining basic components of an IS audit and simple relationships among them, one could create an efficient IS audit. It is not the aim of this thesis to provide a pure algebraic process to perform an IS audit; however, understanding several applications of mono-unary algebras can help to identify and abstract the basic elements of an IS audit. The main application of mono-unary algebras refers to the construction of the subgroupoid generated by a subset of the carrier of a fini.  |% cze 
520 2 9 |a In this thesis several applications of mono-unary algebras and a systematic approach to audit cryptographic applications were presented. This thesis is based on the observation that most of the procedures to perform IS audits utilize check-lists, which might not be applicable to all IT environments; however, by examining some applications of a simple algebraic structure, such as mono-unary algebras, a systematic methodology to execute an IS audit could be designed to improve the current IS audit approach. By defining basic components of an IS audit and simple relationships among them, one could create an efficient IS audit. It is not the aim of this thesis to provide a pure algebraic process to perform an IS audit; however, understanding several applications of mono-unary algebras can help to identify and abstract the basic elements of an IS audit. The main application of mono-unary algebras refers to the construction of the subgroupoid generated by a subset of the carrier of a fini.  |9 eng 
650 0 7 |a kryptografie  |7 ph127774  |2 czenas 
650 0 9 |a cryptography  |2 eczenas 
655 7 |a disertace  |7 fd132024  |2 czenas 
658 |a Informatika (čtyřleté)  |b Informatika  |c FI D-IN4 IN (IN)  |2 CZ-BrMU 
700 1 |a Gruska, Jozef,  |d 1933-  |7 ola2007365192  |% UČO 3026  |4 ths 
710 2 |a Masarykova univerzita.  |b Fakulta informatiky  |7 kn20010709274  |4 dgg 
856 4 1 |u http://is.muni.cz/th/55823/fi_d/ 
CAT |c 20080122  |l MUB01  |h 0450 
CAT |c 20080429  |l MUB01  |h 1814 
CAT |c 20080429  |l MUB01  |h 1828 
CAT |a KREKOVA  |b 02  |c 20080519  |l MUB01  |h 0935 
CAT |c 20091203  |l MUB01  |h 0204 
CAT |c 20091203  |l MUB01  |h 1847 
CAT |c 20100428  |l MUB01  |h 1006 
CAT |a BATCH-UPD  |b 00  |c 20100501  |l MUB01  |h 1146 
CAT |a BATCH-UPD  |b 00  |c 20100929  |l MUB01  |h 0326 
CAT |c 20110627  |l MUB01  |h 1908 
CAT |c 20110627  |l MUB01  |h 2316 
CAT |a batch  |b 00  |c 20120324  |l MUB01  |h 0110 
CAT |a POSPEL  |b 02  |c 20120403  |l MUB01  |h 1417 
CAT |a POSPEL  |b 02  |c 20120403  |l MUB01  |h 1419 
CAT |a POSPEL  |b 02  |c 20120417  |l MUB01  |h 0740 
CAT |a POSPEL  |b 02  |c 20120626  |l MUB01  |h 0801 
CAT |a BATCH  |b 00  |c 20130303  |l MUB01  |h 0943 
CAT |a POSPEL  |b 02  |c 20130530  |l MUB01  |h 0738 
CAT |a POSPEL  |b 02  |c 20130605  |l MUB01  |h 0736 
CAT |a HANAV  |b 02  |c 20150811  |l MUB01  |h 1138 
CAT |a HANAV  |b 02  |c 20150831  |l MUB01  |h 1541 
CAT |c 20150901  |l MUB01  |h 1439 
CAT |c 20150921  |l MUB01  |h 1359 
CAT |a VACOVAX  |b 02  |c 20151009  |l MUB01  |h 0956 
CAT |a BATCH  |b 00  |c 20151225  |l MUB01  |h 2316 
CAT |c 20170301  |l MUB01  |h 1213 
CAT |c 20170306  |l MUB01  |h 1041 
CAT |c 20210614  |l MUB01  |h 0929 
CAT |c 20210614  |l MUB01  |h 1918 
CAT |a BATCH  |b 00  |c 20210724  |l MUB01  |h 1133 
M53 0 |a cryptographic applications 
M53 0 |a mono-unary algebras 
LOW |a POSLANO DO SKCR  |b 2017-03-06 
994 - 1 |l MUB01  |l MUB01  |m VYSPR  |1 FI  |a Fakulta informatiky  |3 Diz. práce 2007  |5 42005D2563  |8 20080519  |f 72  |f Týdenní  |r 20080519 
AVA |a INF50  |b FI  |d Diz. práce 2007  |e available  |t K dispozici  |f 1  |g 0  |h N  |i 0