Dissertations / Theses on the topic 'Authorizations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Authorizations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Full textLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Full textFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Full textRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Full textPachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Full textCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Full textHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Full textKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Full textCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Full textBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Full textOdyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.
Full textTaskazan, Feyza. "Use Of Pki For Process Authorization." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/1219203/index.pdf.
Full textLin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.
Full textJames, Malcolm. "The authorization and glorification of plunder." Thesis, Cardiff Metropolitan University, 2015. http://hdl.handle.net/10369/7570.
Full textLui, W. C. "Security models for authorization, delegation and accountability." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32053745.
Full textHakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.
Full textLui, W. C., and 雷永祥. "Security models for authorization, delegation and accountability." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32053745.
Full text李妙轉. "論行政授權 =Administrative authorization". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3534548.
Full textSiebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.
Full textCalzavara, Stefano <1985>. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Full textDe, Young Paul. "Effect of Medicaid prior authorization on drug utilization." CONNECT TO ELECTRONIC THESIS, 2007. http://dspace.wrlc.org/handle/1961/4249.
Full textWitt, Lucas D. "A formal approach toward authenticated authorization without identification." [Ames, Iowa : Iowa State University], 2008.
Find full textChaudhary, Nadeem. "Optimizing performance of workflow executions under authorization control." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59642/.
Full textDonchevskaya, E. "REACH (Registration, Evaluation, Authorization and Restriction of Chemicals)." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/13426.
Full textHamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.
Full textYao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.
Full textTruong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Full textTruong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1438/1/PhD-Thesis_AnhTuanTruong.pdf.
Full textBoussemart, Déborah. "La sécurisation des permis de construire contre les recours abusifs." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB124/document.
Full textLamotte-Schubert, Manuel [Verfasser], and Christoph [Akademischer Betreuer] Weidenbach. "Automatic authorization analysis / Manuel Lamotte-Schubert. Betreuer: Christoph Weidenbach." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2015. http://d-nb.info/1077211538/34.
Full textChatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Full textFernández, Alexis Martínez. "Authorization schema for electronic health-care records : For Uganda." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101165.
Full textJacobs, David. "An XML Based Authorization Framework for Web-based Applications." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/607.
Full textROSENDO, Daniel. "A high-level authorization framework for software-defined networks." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25356.
Full textLorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.
Full textTran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.
Full textMohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.
Full textBai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Full textCiordas, Ionut Ovidiu. "Fine-grained authorization in the Great Plains network virtual organization." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4967.
Full textWei, Qiang. "Towards improving the availability and performance of enterprise authorization systems." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/13853.
Full textAas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.
Full textDasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.
Full textDahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.
Full textWhitehead, Nathan. "Combining reason and authority for authorization of proof-carrying code /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2008. http://uclibs.org/PID/11984.
Full textWang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Full textWang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Full textBai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Full textCaddick, Andrew Brian. "Critical review of the quality of environmental authorizations in South Africa / Andrew Brian Caddick." Thesis, 2015. http://hdl.handle.net/10394/14480.
Full textRuan, Chun. "Models for authorization and conflict resolution." Thesis, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Full textNarula, Pornthep. "Authorization management framework." 2002. http://hdl.handle.net/1993/21422.
Full text