To see the other types of publications on this topic, follow the link: Data access control policies.

Dissertations / Theses on the topic 'Data access control policies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Data access control policies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Scheffler, Thomas. "Privacy enforcement with data owner-defined policies." Phd thesis, Universität Potsdam, 2013. http://opus.kobv.de/ubp/volltexte/2013/6793/.

Full text
Abstract:
This thesis proposes a privacy protection framework for the controlled distribution and use of personal private data. The framework is based on the idea that privacy policies can be set directly by the data owner and can be automatically enforced against the data user. Data privacy continues to be a very important topic, as our dependency on electronic communication maintains its current growth, and private data is shared between multiple devices, users and locations. The growing amount and the ubiquitous availability of personal private data increases the likelihood of data misuse. Early pr
APA, Harvard, Vancouver, ISO, and other styles
2

Salim, Farzad. "Detecting and resolving redundancies in EP3P policies." Thesis, Faculty of Computer Science and Software Engineering, University of Wollongong, 2006. https://eprints.qut.edu.au/28175/1/c28175.pdf.

Full text
Abstract:
Current regulatory requirements on data privacy make it increasingly important for enterprises to be able to verify and audit their compliance with their privacy policies. Traditionally, a privacy policy is written in a natural language. Such policies inherit the potential ambiguity, inconsistency and mis-interpretation of natural text. Hence, formal languages are emerging to allow a precise specification of enforceable privacy policies that can be verified. The EP3P language is one such formal language. An EP3P privacy policy of an enterprise consists of many rules. Given the semantics of
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Leilei. "Authoring access control policies with controlled natural language." Thesis, University of Kent, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590001.

Full text
Abstract:
This thesis is based on the research carried out under the EPSRC-funded EEAP project and the EC-funded TAS3 project. The research aimed to develop a technique enabling users to write access control policies in natural language. One of the main intentions of the research was to help non- technical users overcome the difficulty of understanding the security policy authoring within computer languages. Policies are relatively easy for humans to specify in natural language, but are much more difficult for them to specify in computer based languages e.g. XML. Consequently humans usually need some so
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Nan. "Generating verified access control policies through model-checking." Thesis, University of Birmingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Slaymaker, Mark Arthur. "The formalisation and transformation of access control policies." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb.

Full text
Abstract:
Increasing amounts of data are being collected and stored relating to every aspect of an individual's life, ranging from shopping habits to medical conditions. This data is increasingly being shared for a variety of reasons, from providing vast quantities of data to validate the latest medical hypothesis, to supporting companies in targeting advertising and promotions to individuals that fit a certain profile. In such cases, the data being used often comes from multiple sources --- with each of the contributing parties owning, and being legally responsible for, their own data. Within such mode
APA, Harvard, Vancouver, ISO, and other styles
6

Steffinlongo, Enrico <1987&gt. "Efficient security analysis of administrative access control policies." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12917.

Full text
Abstract:
In recent years access control has been a crucial aspect of computer systems, since it is the component responsible for giving users specific permissions enforcing a administrator-defined policy. This lead to the formation of a wide literature proposing and implementing access control models reflecting different system perspectives. Moreover, many analysis techniques have been developed with special attention to scalability, since many security properties have been proved hard to verify. In this setting the presented work provides two main contributions. In the first, we study the security of
APA, Harvard, Vancouver, ISO, and other styles
7

Munari, Andrea. "Cooperative Medium Access Control Policies in Wireless Networks." Doctoral thesis, Università degli studi di Padova, 2010. http://hdl.handle.net/11577/3421552.

Full text
Abstract:
Broadly speaking, wireless ad hoc networks are permeated by cooperative behaviors. In such systems, indeed, nodes have to continuously pool their resources to achieve goals that are of general interest, such as routing packets towards a destination that would otherwise be out of reach for an information source, or coordinating medium access so as to successfully share a common spectrum. Recently, however, the idea of collaboration has gathered a renewed and increasing deal of attention in the research community thanks to the development of innovative concepts, most notably the idea of cooperat
APA, Harvard, Vancouver, ISO, and other styles
8

Kolovski, Vladimir. "A logic-based framework for Web access control policies." College Park, Md. : University of Maryland, 2008. http://hdl.handle.net/1903/8180.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.<br>Thesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
9

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ferreira, Ana. "Modelling access control for healthcare information systems : how to control access through policies, human processes and legislation." Thesis, University of Kent, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529399.

Full text
Abstract:
The introduction of Electronic Medical Records (EMR) within healthcare organizations has the main goal of integrating heterogeneous patient information that is usually scattered over different locations. However, there are some barriers that impede the effective integration of EMR within the healthcare practice (e.g., educational, time/costs, security). A focus in improving access control definition and implementation is fundamental to define proper system workflow and access. The main objectives of this research are: to involve end users in the definition of access control rules; to determine
APA, Harvard, Vancouver, ISO, and other styles
11

Graisithikul, Gunyarat. "Comparing Access Control Security Policies : A Case Study Using SBVR." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306.

Full text
Abstract:
Companies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has been raised. Can a comparison of two access control policies made through Semantic of Business Vocabulary and Business Rules (SBVR) be more appropriate than the traditional way of intuitively comparing two information security policies? In this research, a case study has been conducted along with t
APA, Harvard, Vancouver, ISO, and other styles
12

Nelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.

Full text
Abstract:
As our society grows more dependent on digital systems, policies that regulate access to electronic resources are becoming more common. However, such policies are notoriously difficult to configure properly, even for trained professionals. An incorrectly written access-control policy can result in inconvenience, financial damage, or even physical danger. The difficulty is more pronounced when multiple types of policy interact with each other, such as in routers on a network. This thesis presents a policy-analysis tool called Margrave. Given a query about a set of policies, Margrave returns
APA, Harvard, Vancouver, ISO, and other styles
13

Sans, Thierry. "Beyond access control - specifying and deploying security policies in information systems." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0040.

Full text
Abstract:
Les services multimédia de type " streaming ", exigent classiquement des performances élevées du réseau (haut débit, faible taux d'erreur et délai bref), en contradiction avec les importantes contraintes que subissent les réseaux sans fil (bande passante limitée, canaux souvent bruités et états de réseau très changeants). Dans cette thèse, nous étudions l'hypothèse que cet environnement subissant des contraintes importantes exige des architectures spécifiques à l'application, plutôt que des architectures généralistes, afin d'augmenter l'efficacité d'utilisation des ressources du réseau. Plus p
APA, Harvard, Vancouver, ISO, and other styles
14

Howard, Matthew. "Learning control policies from constrained motion." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/3972.

Full text
Abstract:
Many everyday human skills can be framed in terms of performing some task subject to constraints imposed by the task or the environment. Constraints are usually unobservable and frequently change between contexts. In this thesis, we explore the problem of learning control policies from data containing variable, dynamic and non-linear constraints on motion. We show that an effective approach for doing this is to learn the unconstrained policy in a way that is consistent with the constraints. We propose several novel algorithms for extracting these policies from movement data, where observations
APA, Harvard, Vancouver, ISO, and other styles
15

Mends, Diana. "Access Control and Storage of Distributed IoT Data." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37356.

Full text
Abstract:
There has been a growth of a class of databases known as the Not only SQL (NoSQL) databases in recent years. Its quick growth has been fueled by a high demand by businesses as it offers a convenient way to store data and is significantly different from our traditional relational databases. It is easy to process unstructured data, offers a cloud-friendly ap- proach and grows through the distribution of data over lots of commodity computers. Most of these NoSQL databases are distributed in several different locations, spanning countries and are known as geo-distributed cloud datastores. We work
APA, Harvard, Vancouver, ISO, and other styles
16

Kong, Jiantao. "Trusted data path protecting shared data in virtualized distributed systems." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33820.

Full text
Abstract:
When sharing data across multiple sites, service applications should not be trusted automatically. Services that are suspected of faulty, erroneous, or malicious behaviors, or that run on systems that may be compromised, should not be able to gain access to protected data or entrusted with the same data access rights as others. This thesis proposes a context flow model that controls the information flow in a distributed system. Each service application along with its surrounding context in a distributed system is treated as a controllable principal. This thesis defines a trust-based access co
APA, Harvard, Vancouver, ISO, and other styles
17

Clark, Paul C. "A Linux-based approach to low-cost support of access control policies." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA370814.

Full text
Abstract:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Cynthia E. Irvine. Includes bibliographical references (p. 169-171). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
18

Qunoo, Hasan Najib Yousif. "Modelling and verifying dynamic access control policies using knowledge-based model checking." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3501/.

Full text
Abstract:
This thesis advances the modelling and verification of access control policies by using automated knowledge-based symbolic model checking techniques. The key contributions of this thesis are threefold: firstly, a modelling language that expresses dynamic access control policies with compound actions that update multiple variables; secondly, a knowledge-based verification algorithm that verifies properties over an access control policy that has compound actions; and finally, an automated tool, called X-Policy, which implements the algorithm. This research enables us to model and verify access c
APA, Harvard, Vancouver, ISO, and other styles
19

Kayem, Anne Voluntas dei Massah. "Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments." Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Haddad, Mehdi. "Access control and inference problem in data integration systems." Thesis, Lyon, INSA, 2014. http://www.theses.fr/2014ISAL0107/document.

Full text
Abstract:
Dans cette thèse nous nous intéressons au contrôle d’accès dans un système issu d’une intégration de données. Dans un système d’intégration de données un médiateur est défini. Ce médiateur a pour objectif d’offrir un point d’entrée unique à un ensemble de sources hétérogènes. Dans ce type d’architecture, l’aspect sécurité, et en particulier le contrôle d’accès, pose un défi majeur. En effet, chaque source, ayant été construite indépendamment, définit sa propre politique de contrôle d’accès. Le problème qui émerge de ce contexte est alors le suivant : "Comment définir une politique représentati
APA, Harvard, Vancouver, ISO, and other styles
21

Sitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for gener
APA, Harvard, Vancouver, ISO, and other styles
22

Denis, Sitenkov. "Access Control in the Internet of Things." Thesis, SICS, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24325.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for gener
APA, Harvard, Vancouver, ISO, and other styles
23

Jensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.

Full text
Abstract:
<p>The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient w
APA, Harvard, Vancouver, ISO, and other styles
24

Galland, Alban. "Distributed data management with access control : social Networks and Data of the Web." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00640725.

Full text
Abstract:
The amount of information on the Web is spreading very rapidly. Users as well as companies bring data to the network and are willing to share with others. They quickly reach a situation where their information is hosted on many machines they own and on a large number of autonomous systems where they have accounts. Management of all this information is rapidly becoming beyond human expertise. We introduce WebdamExchange, a novel distributed knowledge-base model that includes logical statements for specifying information, access control, secrets, distribution, and knowledge about other peers. Th
APA, Harvard, Vancouver, ISO, and other styles
25

Zhou, Xiaoming. "Congestion management and medium access control in satellite data networks." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2137.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2004.<br>Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.

Full text
Abstract:
Security of data is tightly coupled to its access policy. However, in practice, a data owner has control of his data’s access policies only as far as the boundaries of his own systems. We introduce graduated access control, which provides mobile, programmable, and dynamically-resolving policies for access control that extends a data owner’s policies across system boundaries. We realize this through a novel data-centric abstraction called trusted capsules and its associated system, the trusted data monitor. A trusted capsule couples data and policy into a single mobile unit. A capsule is backwa
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 55-60).<br>Modern web services rob users of low-level control over cloud storage; a user's single logical data set is scattered across multiple storage silos whose access controls are set by the web services, not users. The res
APA, Harvard, Vancouver, ISO, and other styles
28

Mohamed, Abdelrahim. "Efficient radio access network with separated control and data functions." Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/813133/.

Full text
Abstract:
Future cellular systems need to cope with a huge amount of data and diverse service requirements in a flexible, sustainable, green and efficient way with minimal signalling overhead. This calls for network densification, a short length wireless link, efficient and proactive control signalling and the ability to switch off the power consuming devices when they are not in use. In this direction, the conventional always-on service and worst-case design approach has been identified as the main source of inefficiency, and a paradigm shift towards adaptive and on-demand systems is seen as a promisin
APA, Harvard, Vancouver, ISO, and other styles
29

Muppavarapu, Vineela. "Semantic and Role-Based Access Control for Data Grid Systems." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1258569101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Moré, Andre, and Ermias Gebremeskel. "HopsWorks : A project-based access control model for Hadoop." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175742.

Full text
Abstract:
The growth in the global data gathering capacity is producing a vast amount of data which is getting vaster at an increasingly faster rate. This data properly analyzed can represent great opportunity for businesses, but processing it is a resource-intensive task. Sharing can increase efficiency due to reusability but there are legal and ethical questions that arise when data is shared. The purpose of this thesis is to gain an in depth understanding of the different access control methods that can be used to facilitate sharing, and choose one to implement on a platform that lets user analyze, s
APA, Harvard, Vancouver, ISO, and other styles
31

Bai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Full text
Abstract:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the
APA, Harvard, Vancouver, ISO, and other styles
32

Pereira, Anil L. "Role-based Access Control for the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI)." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1176331524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rigby, Simon. "Key management in secure data networks." Thesis, Queensland University of Technology, 1987. https://eprints.qut.edu.au/36825/1/36825_Rigby_1987.pdf.

Full text
Abstract:
Key management is one of the major proolem areas in today's secure data communications networks. Many of the problems may be solved with a device known as a security module. The security module must be designed to meet the requirements of a key management system, and also be capable of preventing abuses of it. It has been discovered that rule-based programming languages are particularly suited to modelling the functionality of security modules and their role in cryptographic key management. In this work automated techniques for analyzing security systems which employ security modules are prese
APA, Harvard, Vancouver, ISO, and other styles
34

Zafar, Saad. "Integration of Access Control Requirements into System Specifications." Thesis, Griffith University, 2009. http://hdl.handle.net/10072/368100.

Full text
Abstract:
The reliance on computer‐based systems is growing steadily. Information systems span many aspects of our lives. Due to increased reliance on computer‐based systems there is a growing concern about the security and privacy of information available in these systems. As a result, the complexity of data protection and availability requirements of most of the modern applications has also increased. An access control mechanism is one of the key security elements in the implementation of data protection and availability requirements. The effective implementation of access control requirements into th
APA, Harvard, Vancouver, ISO, and other styles
35

Estlund, Mark J. "A survey and analysis of access control architectures for XML data." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FEstlund.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Cynthia E. Irvine, Timothy E. Levin. "March 2006." Includes bibliographical references (p. 43-45). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
36

Rabbath, Jean-Pierre. "Flow control for packet data in an integrated wireless access network." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0006/MQ44037.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ali, Waqas Liaqat. "Securing Safebook : Secure Data Access Control and Key Management for Safebook." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-126987.

Full text
Abstract:
Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. This has raised concerns about how the users’ contents are protected and how the privacy of users is preserved by the service providers. Moreover, current social networks have been subject to much criticism over their privacy settings and access control mechanism. The providers own the users’ contents and these contents
APA, Harvard, Vancouver, ISO, and other styles
38

Torabian, Hajaralsadat. "Protecting sensitive data using differential privacy and role-based access control." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26580.

Full text
Abstract:
Dans le monde d'aujourd'hui où la plupart des aspects de la vie moderne sont traités par des systèmes informatiques, la vie privée est de plus en plus une grande préoccupation. En outre, les données ont été générées massivement et traitées en particulier dans les deux dernières années, ce qui motive les personnes et les organisations à externaliser leurs données massives à des environnements infonuagiques offerts par des fournisseurs de services. Ces environnements peuvent accomplir les tâches pour le stockage et l'analyse de données massives, car ils reposent principalement sur Hadoop MapRedu
APA, Harvard, Vancouver, ISO, and other styles
39

Kockan, Sinem. "Admission control and profitability analysis in dynamic spectrum access data networks." Thesis, Boston University, 2013. https://hdl.handle.net/2144/21194.

Full text
Abstract:
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.<br>Recent regulations by the Federal Communication Commission (FCC) enable network service providers to lease their spectrum to short-term leased secondary users for opportunistic usage. Driven by earlier studies on spectrum leas
APA, Harvard, Vancouver, ISO, and other styles
40

ROSA, Marco. "Data-at-Rest Protection and Efficient Access Control in the Cloud." Doctoral thesis, Università degli studi di Bergamo, 2020. http://hdl.handle.net/10446/181509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.

Full text
Abstract:
A new access control model incorporating the notion of time and events is introduced. It allows the specification of fine-grained and flexible security policies which are sensitive to the operating environment. The system constraints, expressed in terms of access windows and obligations, are stored in extended access control lists. The addition of a capability mechanism gives another dimension of protection and added flexibility, so that the flexibility and expressive power of the system constraints is fully supported by the underlying mechanism. The approach is compared to several existing mo
APA, Harvard, Vancouver, ISO, and other styles
42

Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code." Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.

Full text
Abstract:
This thesis evaluates the use of a loadtime metaobject protocol as a practical mechanism for enforcing access control policies upon applications distributed as user-level compiled code. Enforcing access control policies upon user-level compiled code is necessary because there are many situations where users are vulnerable to security breaches because they download and run potentially untrustworthy applications provided in the form of user-level compiled code. These applications might be distributed applications so access control for both local and distributed resources is required. Examples of
APA, Harvard, Vancouver, ISO, and other styles
43

Kibwage, Stephen Sakawa. "Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.

Full text
Abstract:
Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administr
APA, Harvard, Vancouver, ISO, and other styles
44

Kasinath, Gautham. "Fine grained access control of ODF documents using XACML." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/276.

Full text
Abstract:
Whilst existing research addresses protection or information contained in generic XML formats, none address the protection of information in document formats based on XML. This research addresses this void by suggesting an innovative scheme to protect contents of ODF documents using the XACML access control model. This study is significant to those conducting studying mechanisms of document security, members of the standardization community and information security providers of enterprises. The study conducted in this research may also have commercial value as a product developed to secure ODF
APA, Harvard, Vancouver, ISO, and other styles
45

Salim, Farzad. "Approaches to access control under uncertainty." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/58408/1/Farzad_Salim_Thesis.pdf.

Full text
Abstract:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis inves
APA, Harvard, Vancouver, ISO, and other styles
46

Øslebø, Arne. "A diagrammatic notation for modeling access control in tree-based data structures." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-2195.

Full text
Abstract:
This thesis describe two graphical modeling languages that can be used for specifying the access control setup in most systems that store information in a tree based structure. The Tree-based Access control Modeling Language (TACOMA) is the simplest language that is defined. It is easy to learn and use as it has only 8 symbols and two relations. With this language it is possible to define the exact access control rules for users using a graphical notation. The simplicity of the language do however come at a cost: it is best suited for small or medium sized tasks where the number of users and o
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Full text
Abstract:
Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. For instance, one of thosehardware functionalities, SIM-card authentication is able to offer stronger andmore convenient way of authentication when compared to the traditional approach.Replacing the username-password combination with the SIM-card authentication,users are freed from memorizin
APA, Harvard, Vancouver, ISO, and other styles
48

Sheng, Wei. "Cross-layer design of admission control policies in code division multiple access communications systems utilizing beamforming." Thesis, Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Koeppen, Kyle Bruce. "Virtual access hydraulics experiment for system dynamics and control education." Thesis, Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Truter, J. N. J. "Using CAMAC hardware for access to a particle accelerator." Master's thesis, University of Cape Town, 1988. http://hdl.handle.net/11427/17049.

Full text
Abstract:
Includes bibliographical references and index.<br>The design and implementation of a method to software interface high level applications programs used for the control and monitoring of a Particle Accelerator is described. Effective methods of interfacing the instrumentation bus system with a Real time multitasking computer operating system were examined and optimized for efficient utilization of the operating system software and available hardware. Various methods of accessing the instrumentation bus are implemented as well as demand response servicing of the instruments on the bus.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!