To see the other types of publications on this topic, follow the link: Authorizations.

Dissertations / Theses on the topic 'Authorizations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Authorizations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Firman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.

Full text
Abstract:
The significant increase in mobile data traffc has put a considerable load on the wireless mobile networks. In the current highly competitive market, Mobile Network Operators (MNOs) have to strive to provide additional capacityof their network, by also considering the cost factor to make their business sustainable. Along with advances in spectrum-efficient technologies, small cells deployment have provided cost-efficient methods to provide additional capacity for indoor and outdoor subscribers. The gain of better spectrum utilization and opportunistic spectrum access have motivated the deploym
APA, Harvard, Vancouver, ISO, and other styles
4

Ruan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.

Full text
Abstract:
Access control is a significant issue in any secure computer system. Authorization models provide a formalism and framework for specifying and evaluating access control policies that determine how access is granted and delegated among particular users. The aim of this dissertation is to investigate flexible decentralized authorization model supporting authorization delegation, both positive and negative authorization, and conflict resolution. A graph based authorization framework is proposed which can support authorization delegations and both positive and negative authorizations. In particula
APA, Harvard, Vancouver, ISO, and other styles
5

Pachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.

Full text
Abstract:
The purpose of the author in this article is to outline the main licenses regarding mineral exploration and publicize the usual paperwork and contingencies obtaining these permits.It also presents alternatives to traditional procedures, which are more useful in practice to expedite to start of mining exploration activities in Peru.<br>El fin del autor en este artículo es hacer un esbozo de los principales títulos habilitantes para lo referente a la exploración minera, así como dar a conocer los trámites y usuales contingencias que acarrean la obtención de estos permisos. Asimismo, se presentan
APA, Harvard, Vancouver, ISO, and other styles
6

Crampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Humenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.

Full text
Abstract:
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. The authorization process in enterprise systems follow the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those decisions. The two advantages of this model are (1) the separation between the application and authorization logic (2) reduction of authorization policy administration. However, the authorization proces
APA, Harvard, Vancouver, ISO, and other styles
9

Cabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.

Full text
Abstract:
Social Web of Things (SWoT) is a user centric framework which facilitates interaction between software agents deployed on smart things and in the cloud. Software agents deployed on smart things are remotely accessible, host sensitive resources, and often represent high value targets. SWoT currently does not feature adequate security mechanisms which could protect software agents from unauthorized access. In this thesis, we aim to rectify this deficiency by introducing platform independent, exible, and user centric authorization mechanism inSWoT. We derive requirements and design of abstract au
APA, Harvard, Vancouver, ISO, and other styles
10

Björkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.

Full text
Abstract:
Access control is the central element of computer security and its principal objectives are to implement secure authentication and authorization in a system. Authentication is the verification that the credentials of a user are valid and authorization is the granting of permissions to a user to access system resources. This thesis describes the design and implementation of an authorization plugin, calledFile Authorization Manager, for WordPress built upon an already existing authentication plugin, called privateContent. Due to various factors mentioned in the thesis the implementation of said
APA, Harvard, Vancouver, ISO, and other styles
11

Odyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.

Full text
Abstract:
This work introduces the available authorization frameworks for the purpose of Single Sign-On functionality within an enterprise, along with the fundamental technicalities. The focus of the work is on SAML 2.0 and OAuth 2.0 frame- works. Following the details related to available protocol flows, supported client profiles and security considerations, the two frameworks are compared in accordance with a set of factors given in a criteria. The report discusses the possibilities provided by a Microsoft Windows based infrastructure, as well as different scenarios and their feasibility in an enterpr
APA, Harvard, Vancouver, ISO, and other styles
12

Taskazan, Feyza. "Use Of Pki For Process Authorization." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/1219203/index.pdf.

Full text
Abstract:
Enterprises require an information security solution that provides privacy, integrity, authentication and access controls for processes. License management systems are developed to be a solution for process authorization in different platforms. However, security threats on processes cannot be controlled with existing license management mechanisms. The need is a complete system that is independent from implementation, platform, and application. In this thesis, we design a complete system for process authorization based on Public Key Infrastructure (PKI) technology.
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

James, Malcolm. "The authorization and glorification of plunder." Thesis, Cardiff Metropolitan University, 2015. http://hdl.handle.net/10369/7570.

Full text
Abstract:
Research in taxation often treats it as a branch of law or economics, but in this thesis I argue that this obscures the fact that tax systems are not based on scientific, techno-rational principles, but are socially constructed phenomena, embodying fundamental, value-based decisions imbricated in power relationships. I demonstrate that throughout history tax systems have reflected the prevailing state form and the dominant power relationships underpinning them and that we are currently living in a neoliberal state, in which societal relations are determined by economic principles. I therefore
APA, Harvard, Vancouver, ISO, and other styles
15

Lui, W. C. "Security models for authorization, delegation and accountability." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32053745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.

Full text
Abstract:
The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology shift introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists.
APA, Harvard, Vancouver, ISO, and other styles
17

Lui, W. C., and 雷永祥. "Security models for authorization, delegation and accountability." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32053745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

李妙轉. "論行政授權 =Administrative authorization". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3534548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Siebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.

Full text
Abstract:
The purpose of this thesis is to investigate the implementation of digital authorization for computer systems, specifically how to implement an efficient and secure authorization engine that uses policies and attributes to calculate authorization. The architecture for the authorization engine is discussed, the efficiency of the engine is characterized by various tests, and the security model is reviewed against other presently existing models. The resulting efforts showed an increase in efficiency of almost two orders of magnitude, along with a reduction in the amount of processing power req
APA, Harvard, Vancouver, ISO, and other styles
20

Calzavara, Stefano <1985&gt. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.

Full text
Abstract:
La tesi affronta il problema della verifica e dell'imposizione di politiche di autorizzazione tramite tecniche di analisi statica. I contributi principali sono tre: una semantica formale per grsecurity, che permette di validare in modo efficiente una serie di proprietà di sicurezza desiderabili per una gestione degli accessi basata su ruoli; un'estensione di RCF basata su logica affine per garantire il rispetto di espressive politiche di autorizzazione relative all'utilizzo di risorse; una metodologia di verifica per applicazioni Android atta a garantire una forma di controllo degli accessi pr
APA, Harvard, Vancouver, ISO, and other styles
21

De, Young Paul. "Effect of Medicaid prior authorization on drug utilization." CONNECT TO ELECTRONIC THESIS, 2007. http://dspace.wrlc.org/handle/1961/4249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Witt, Lucas D. "A formal approach toward authenticated authorization without identification." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chaudhary, Nadeem. "Optimizing performance of workflow executions under authorization control." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59642/.

Full text
Abstract:
“Business processes or workflows are often used to model enterprise or scientific applications. It has received considerable attention to automate workflow executions on computing resources. However, many workflow scenarios still involve human activities and consist of a mixture of human tasks and computing tasks. Human involvement introduces security and authorization concerns, requiring restrictions on who is allowed to perform which tasks at what time. Role- Based Access Control (RBAC) is a popular authorization mechanism. In RBAC, the authorization concepts such as roles and permissions ar
APA, Harvard, Vancouver, ISO, and other styles
24

Donchevskaya, E. "REACH (Registration, Evaluation, Authorization and Restriction of Chemicals)." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/13426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.

Full text
Abstract:
Thesis (M.S.)--University of California, San Diego, 2009.<br>Title from first page of PDF file (viewed January 9, 2009). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 94-97).
APA, Harvard, Vancouver, ISO, and other styles
26

Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.

Full text
Abstract:
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
APA, Harvard, Vancouver, ISO, and other styles
28

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1438/1/PhD-Thesis_AnhTuanTruong.pdf.

Full text
Abstract:
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
APA, Harvard, Vancouver, ISO, and other styles
29

Boussemart, Déborah. "La sécurisation des permis de construire contre les recours abusifs." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB124/document.

Full text
Abstract:
La présente thèse s'intéresse à la systématisation des menaces d'annulation des permis de construire. Elle a pour objet d'analyser la réalité des recours abusifs devant le juge administratif français. Le phénomène de multiplication des recours abusifs pose le problème de l'instrumentalisation du juge par des requérants malveillants. Cette instrumentalisation transforme le prétoire en une sorte de marché juridictionnel et se traduit en pratique par des coûts contentieux et transactionnels de plus en plus lourds pour les bénéficiaires d'autorisation d'urbanisme. Des instruments de régulation pro
APA, Harvard, Vancouver, ISO, and other styles
30

Lamotte-Schubert, Manuel [Verfasser], and Christoph [Akademischer Betreuer] Weidenbach. "Automatic authorization analysis / Manuel Lamotte-Schubert. Betreuer: Christoph Weidenbach." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2015. http://d-nb.info/1077211538/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Fernández, Alexis Martínez. "Authorization schema for electronic health-care records : For Uganda." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101165.

Full text
Abstract:
This master’s thesis project began at the Karolinska University Hospital. This thesis discusses how to design an authorization schema focused on ensuring each patient’s data privacy within a hospital information system. It begins with an overview of the current problem, followed by a review of related work. The overall project’s goal is to create and evaluate an authorization schema that can ensure each patient’s data confidentiality. Authorization has currently become a very important aspect in information systems, to the point of being a necessity when implementing a complete system for mana
APA, Harvard, Vancouver, ISO, and other styles
33

Jacobs, David. "An XML Based Authorization Framework for Web-based Applications." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/607.

Full text
Abstract:
The World Wide Web is increasingly being used to deliver services. The file based authorization schemes originally designed into web servers are woefully inadequate for enforcing the security policies needed by these services. This has led to the chaotic situation where each application is forced to develop its own security framework for enforcing the policies it requires. In tum, this has led to more numerous security vulnerabilities and greater maintenance headaches. This dissertation lays out an authorization framework that enforces a wide range of security policies crucial to many web-base
APA, Harvard, Vancouver, ISO, and other styles
34

ROSENDO, Daniel. "A high-level authorization framework for software-defined networks." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25356.

Full text
Abstract:
Submitted by Pedro Barros (pedro.silvabarros@ufpe.br) on 2018-08-01T19:37:51Z No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Daniel Rosendo.pdf: 3709439 bytes, checksum: cfcbfd0960c6e9bae38ba5ff1dc7d748 (MD5)<br>Approved for entry into archive by Alice Araujo (alice.caraujo@ufpe.br) on 2018-08-02T20:45:49Z (GMT) No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Daniel Rosendo.pdf: 3709439 bytes, checksum: cfcbfd0960c6e9bae38ba5ff1dc7d748 (MD5)<br>Made available in DSpace on 2018-0
APA, Harvard, Vancouver, ISO, and other styles
35

Lorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.

Full text
Abstract:
Computational grids and other heterogeneous, large-scale distributed systems require more powerful and more flexible authorization mechanisms to realize fine-grained access-control of resources. Computational grids are increasingly used for collaborative problem-solving and advanced science and engineering applications. Usage scenarios for advanced grids require support for small, dynamic working groups, direct delegation of access privileges among users, procedures for establishing trust relationships without requiring organizational level agreements, precise management by individuals of thei
APA, Harvard, Vancouver, ISO, and other styles
36

Tran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.

Full text
Abstract:
Microservices have emerged as an attractive alternative to more classical monolithic software application architectures. Microservices provides many benefits that help with code base comprehension, deployability, testability, and scalability. As the Information technology (IT) industry has grown ever larger, it makes sense for the technology giants to adopt the microservice architecture to make use of these benefits. However, with new software solutions come new security vulnerabilities, especially when the technology is new and vulnerabilities are yet to be fully mapped out. Authentication an
APA, Harvard, Vancouver, ISO, and other styles
37

Mohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.

Full text
Abstract:
The proposed research is in the area of attribute-based authorization systems. We address two specific research problems in this area. First, evaluating authorization policies in multi-authority systems where there are multiple stakeholders in the disclosure of sensitive data. The research proposes to consider all the relevant policies related to authorization in real time upon the receipt of an access request and to resolve any differences that these individual policies may have in authorization. Second, to enable a lot of entities to participate in the authorization process by asserting attr
APA, Harvard, Vancouver, ISO, and other styles
38

Bai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Full text
Abstract:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the
APA, Harvard, Vancouver, ISO, and other styles
39

Ciordas, Ionut Ovidiu. "Fine-grained authorization in the Great Plains network virtual organization." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4967.

Full text
Abstract:
Thesis (M.S.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on January 3, 2008) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
40

Wei, Qiang. "Towards improving the availability and performance of enterprise authorization systems." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/13853.

Full text
Abstract:
Authorization protects application resources by allowing only authorized entities to access them. Existing authorization solutions are widely based on the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those decisions. This model enables sharing the decision point as an authorization service across multiple applications. But, with many requests and resources, using a remote shared decision point leads to increased latency and presents the risk of introducing a bottleneck
APA, Harvard, Vancouver, ISO, and other styles
41

Aas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.

Full text
Abstract:
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization and authentication on mobile devices. However, recent critics have claimed that OAuth does not provide sufficient security or ease-of-use for developers on mobile devices. In this thesis, I study four approaches to mobile authorization using OAuth 2.0, and suggest an improved solution based on current industry best-practices for security on Android. The end result is a solution which provides a native authorization flow for third-party developers to integrate with an existing API endpoint. However, the th
APA, Harvard, Vancouver, ISO, and other styles
42

Dasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.

Full text
Abstract:
Since computers are relied upon to run critical infrastructures – from nuclear power plants to electronic battlefield simulations – the concept of a “trusted” or tamperproof system has become even more important. Some applications have become so critical that it is imperative that they run as intended, without interference. The consequences of these systems not running as intended could be catastrophic. This research offers a solution for a key element for protecting these critical servers – validating process invocation sequences. The purpose of this research is to increase operating sys
APA, Harvard, Vancouver, ISO, and other styles
44

Whitehead, Nathan. "Combining reason and authority for authorization of proof-carrying code /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2008. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Full text
Abstract:
Logic programming with answer set semantics has been considered appealing rule-based formalism language and applied in information security areas. In this thesis, we investigate the problems of authorization in distributed environments and security protocol verification and update. Authorization decisions are required in large-scale distributed environments, such as electronic commerce, remote resource sharing, etc. We adopt the trust management approach, in which authorization is viewed as a ‘proof of compliance" problem. We develop an authorization language AL with non-monotonic feature as t
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Full text
Abstract:
Thesis (Ph.D.) -- University of Western Sydney, 2008.<br>A thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
APA, Harvard, Vancouver, ISO, and other styles
47

Bai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Full text
Abstract:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the
APA, Harvard, Vancouver, ISO, and other styles
48

Caddick, Andrew Brian. "Critical review of the quality of environmental authorizations in South Africa / Andrew Brian Caddick." Thesis, 2015. http://hdl.handle.net/10394/14480.

Full text
Abstract:
This dissertation critically reviews the quality of South African environmental authorisations through the application of a methodology adopted from the Lee and Colley (1999) environmental impact assessment (EIA) report review package. The literature review shows that to date limited research has been conducted on the quality of environmental authorisations nationally. Anecdotal evidence suggests that environmental authorisations are of weak quality; hence the development of guidelines on the compilation of environmental authorisations by the Department of Environmental Affairs (DEA). In this
APA, Harvard, Vancouver, ISO, and other styles
49

Ruan, Chun. "Models for authorization and conflict resolution." Thesis, 2003. http://handle.uws.edu.au:8081/1959.7/546.

Full text
Abstract:
Access control is a significant issue in any secure computer system. Authorization models provide a formalism and framework for specifying and evaluating access control policies that determine how access is granted and delegated among particular users. The aim of this dissertation is to investigate flexible decentralized authorization model supporting authorization delegation, both positive and negative authorization, and conflict resolution. A graph based authorization framework is proposed which can support authorization delegations and both positive and negative authorizations. In particula
APA, Harvard, Vancouver, ISO, and other styles
50

Narula, Pornthep. "Authorization management framework." 2002. http://hdl.handle.net/1993/21422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!