Dissertationen zum Thema „Access control“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Access control" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Der volle Inhalt der QuelleAtkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Der volle Inhalt der QuelleMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Der volle Inhalt der Quellede, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.
Der volle Inhalt der QuelleHoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Der volle Inhalt der QuelleMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Der volle Inhalt der QuelleMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Der volle Inhalt der QuelleSchmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.
Der volle Inhalt der QuelleKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Der volle Inhalt der QuelleLukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.
Der volle Inhalt der QuelleAktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.
Der volle Inhalt der QuelleWithrow, Gary W. "An access control middleware application." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/GWithrow2006.pdf.
Der volle Inhalt der QuellePrasai, Sandesh. "Access control of NUTS uplink." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19209.
Der volle Inhalt der QuelleFisher, Craig. "Network access control disruptive technology? /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/JFisher2007.pdf.
Der volle Inhalt der QuelleGeshan, Susan Carol. "Signature verification for access control." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28533.
Der volle Inhalt der QuelleO'Shea, Gregory Francis Gerard. "Access control in operating systems." Thesis, Birkbeck (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.301025.
Der volle Inhalt der QuelleKlingsbo, Lukas. "Access Control for CDN Assets." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-302091.
Der volle Inhalt der QuelleKlöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.
Der volle Inhalt der QuelleHermansson, Rickard, and Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents." Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.
Der volle Inhalt der QuelleRøstad, Lillian. "Access Control in Healthcare Information Systems." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5130.
Der volle Inhalt der QuelleLi, Cheng. "Fluid model for access control mechanism." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26691.
Der volle Inhalt der QuelleFransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.
Der volle Inhalt der QuelleAndersson, Fredrik, and Stefan Hagström. "Dynamic identities for flexible access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5310.
Der volle Inhalt der QuelleBoberg, Hannes. "Designing and comparing access control systems." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131855.
Der volle Inhalt der QuelleWong, Tung Chong. "Wireless ATM network access and control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0005/NQ44781.pdf.
Der volle Inhalt der QuelleSadighi, Firozabadi Seyd Babak. "Decentralised privilege management for access control." Thesis, Imperial College London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424362.
Der volle Inhalt der QuelleBarker, Steven Graham. "Database access control by logic planning." Thesis, Imperial College London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408732.
Der volle Inhalt der QuelleBelokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Der volle Inhalt der QuellePang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.
Der volle Inhalt der QuelleAllen, Steven D. M. Eng Massachusetts Institute of Technology. "DRACL (Decentralized resource access control list)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/112855.
Der volle Inhalt der QuelleZhu, Jian. "Access Control for Cross Organizational Collaboration." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1334690364.
Der volle Inhalt der QuelleYang, Naikuo. "Formalism of privacy preserving access control." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/formalism-of-privacy-preserving-access-control(ea4a3d37-fcd9-471b-a33e-7414c315aad9).html.
Der volle Inhalt der QuelleZhao, Yining. "Behavioural access control in distributed environments." Thesis, University of York, 2013. http://etheses.whiterose.ac.uk/4640/.
Der volle Inhalt der QuelleSvetlana, Jakšić. "Types for Access and Memory Control." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2016. https://www.cris.uns.ac.rs/record.jsf?recordId=101762&source=NDLTD&language=en.
Der volle Inhalt der QuelleSalim, Farzad. "Approaches to access control under uncertainty." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/58408/1/Farzad_Salim_Thesis.pdf.
Der volle Inhalt der QuelleFerreira, Ana. "Modelling access control for healthcare information systems : how to control access through policies, human processes and legislation." Thesis, University of Kent, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529399.
Der volle Inhalt der QuelleJensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.
Der volle Inhalt der QuelleHu, Wendong. "Medium access control protocols for cognitive radio based dynamics spectrum access networks." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1580792591&sid=28&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Der volle Inhalt der QuellePan, Su, and 潘甦. "Medium access control in packet CDMA systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31245870.
Der volle Inhalt der QuelleHuang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Der volle Inhalt der QuelleRao, Vikhyath Jaeger Trent. "Dynamic mandatory access control for multiple stakeholders." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-3963/index.html.
Der volle Inhalt der QuelleCavallero, Sara. "Medium Access Control Protocols for Terahertz Communication." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Den vollen Inhalt der Quelle findenBrose, Gerald. "Access control management in distributed object systems." [S.l. : s.n.], 2001. http://www.diss.fu-berlin.de/2001/203/index.html.
Der volle Inhalt der QuellePorter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Der volle Inhalt der QuelleBoström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.
Der volle Inhalt der QuelleQazi, Hasham Ud Din. "Comparative Study of Network Access Control Technologies." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.
Der volle Inhalt der QuelleStenbakk, Bjørn-Erik Sæther, and Gunnar René Øie. "Role-Based Information Ranking and Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9236.
Der volle Inhalt der QuelleGarnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.
Der volle Inhalt der QuelleZhuo, Donghui. "On Fine-Grained Access Control for XML." Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1058.
Der volle Inhalt der QuelleBeznosov, Konstantin. "Engineering access control for distributed enterprise applications." FIU Digital Commons, 2000. http://digitalcommons.fiu.edu/etd/1651.
Der volle Inhalt der Quelle