Dissertations / Theses on the topic 'RBAC (Role-Based Access Control)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'RBAC (Role-Based Access Control).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Full textSingh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Full textFalkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.
Full textSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Full textManning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Full textRondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textGunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.
Full textShi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.
Full textPoe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Full textWang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.
Full textBoström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.
Full textLandberg, Fredrik. "Flexible role-handling in command and control systems." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.
Full textDamasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.
Full textRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Full textPetrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.
Full textMotta, Gustavo Henrique Matos Bezerra. "Um modelo de autorização contextual para o controle de acesso ao prontuário eletrônico do paciente em ambientes abertos e distribuídos." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-05042004-152226/.
Full textAshley, Paul. "Security technologies for intranet computing." Thesis, Queensland University of Technology, 1999.
Find full textMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Full textBelokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Full textMontrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.
Full textMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Full textStenbakk, Bjørn-Erik Sæther, and Gunnar René Øie. "Role-Based Information Ranking and Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9236.
Full textQiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.
Full textChen, Liang. "Analyzing and developing role-based access control models." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/1de9694d-de0f-c437-5a35-82a813abdd1a/10/.
Full textDavuluri, Chowdary Venkata Ram Mohan. "Role-Based Access Control in Collaborative Research Environments." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1285036690.
Full textRohrer, Felix. "DR BACA: dynamic role based access control for Android." Thesis, Boston University, 2013. https://hdl.handle.net/2144/12203.
Full textKugblenu, Francis M., and Memon Asim. "Separation of Duty in Role Based Access." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4662.
Full textManian, Vijay. "Voting enabled role-based access control model for distributed collaboration." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011941.
Full textZhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.
Full textMuppavarapu, Vineela. "Semantic and Role-Based Access Control for Data Grid Systems." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1258569101.
Full textHelal, Mohammad Rahat. "Efficient Isolation Enabled Role-Based Access Control for Database Systems." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501627843916302.
Full textRhodes, Anthony William. "Distributed information systems security through extended role based access control." Thesis, Queensland University of Technology, 2002.
Find full textAli, Asad. "Enforcing role-based and category-based access control in Java : a hybrid approach." Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/enforcing-rolebased-and-categorybased-access-control-in-java(fcad2ae5-71e9-4edf-8c49-391344358505).html.
Full textMcDaniel, Christopher R. Tardy Matthew L. "Role-based access control for coalition partners in maritime domain awareness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FMcDaniel.pdf.
Full textHammoudi, Faouzi, and Greg L. Nygard. "Role-based access control for loosely coupled distributed database management systems." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/6058.
Full textTorabian, Hajaralsadat. "Protecting sensitive data using differential privacy and role-based access control." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26580.
Full textTardy, Matthew L. "Role-based access control for coalition partners in maritime domain awareness." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1925.
Full textGao, Shu. "An aspect-oriented approach to designing role-based access control services." FIU Digital Commons, 2005. https://digitalcommons.fiu.edu/etd/3626.
Full textBhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.
Full textPereira, Anil L. "Role-based Access Control for the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI)." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1176331524.
Full textKhandavilli, Ambica Pawan. "A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION." 2012. http://hdl.handle.net/10222/14604.
Full textYu, Jin-Shyan, and 余俊賢. "Construction of RBAC-based Web Pages Access Control Mechanism." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/25570522902980781696.
Full textZitouni, Toufik. "A Statistically Rigorous Evaluation of the Cascade Bloom Filter for Distributed Access Enforcement in Role-Based Access Control (RBAC) Systems." Thesis, 2010. http://hdl.handle.net/10012/5747.
Full textKomlenovic, Marko. "A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation." Thesis, 2011. http://hdl.handle.net/10012/5731.
Full text"Automated Testing for RBAC Policies." Master's thesis, 2014. http://hdl.handle.net/2286/R.I.24933.
Full text何冠儒. "A Two-Phase Web Services Access Control Mechanism based on RBAC and Reputation Management." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/19962405369233064012.
Full textLiu, Yi-Han, and 劉義漢. "Using RBAC to Design the Access Control Model of XML-Based Electronic Financial Service Portal." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/51047625156187555981.
Full textBiswas, Arnab Kumar. "Securing Multiprocessor Systems-on-Chip." Thesis, 2016. https://etd.iisc.ac.in/handle/2005/2554.
Full textBiswas, Arnab Kumar. "Securing Multiprocessor Systems-on-Chip." Thesis, 2016. http://etd.iisc.ernet.in/handle/2005/2554.
Full textMAXA, Karel. "Systém správy identit pro malé a střední firmy." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-180579.
Full text