To see the other types of publications on this topic, follow the link: RBAC.

Dissertations / Theses on the topic 'RBAC'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'RBAC.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.

Full text
Abstract:
L'obiettivo della tesi è la creazione di un'infrastruttura di tipo RBAC (Role Based Access Control), adibita al controllo degli accessi all'interno del linguaggio di coordinazione TuCSoN. Il punto di partenza si basa sull'analisi del lavoro sviluppato dall'Ing. Galassi: "Modello di sicurezza e controllo di accesso in una infrastruttura di coordinazione: architettura e implementazione". Usando questa come base teorica di partenza, si sono estrapolati i concetti chiave e si è data vita ad un'implementazione funzionante e di semplice utilizzo di RBAC in TuCSoN.
APA, Harvard, Vancouver, ISO, and other styles
4

Darwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.

Full text
Abstract:
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifications. We also suggest algorithms that define the semantics of authorization decisions in CORBA, EJB, and COM+. Using the formalized protection state configurations, we analyze the level of support for
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.

Full text
Abstract:
The problems of identity management inherent in distributed subscription-based resource sharing are investigated in this thesis. The thesis introduces a concept of authentication delegation and distributed RBAC (DRBAC) to support fine granular access control across multiple autonomous resource sites and subscribing sites. The DRBAC model extends the RBAC model to a distributed environment. A prototype system based on the concepts of authentication delegation and distributed role and the distributed RBAC model has been implemented and tested. Access is allowed based on the distributed roles, su
APA, Harvard, Vancouver, ISO, and other styles
6

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases
APA, Harvard, Vancouver, ISO, and other styles
7

Squarcina, Marco <1984&gt. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.

Full text
Abstract:
Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy specifications arising from system administrators' needs, formally verifying that access control systems enforce some defined security invariants is a problem of crucial importance. In a previous work which has been accepted for presentation at IEEE CSF 2012, we developed a framework for the formal verification of Grsecurity RBAC, an access control system developed on top of Unix/Linux systems. In this thesis we improve the framework by considering the intera
APA, Harvard, Vancouver, ISO, and other styles
8

Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.

Full text
Abstract:
Made available in DSpace on 2015-02-04T21:45:26Z (GMT). No. of bitstreams: 1 Vanderlei Costa.pdf: 1535805 bytes, checksum: 1edf57ffedf62a0db7a4c94312b486d6 (MD5) Previous issue date: 2008-10-03<br>Plataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é
APA, Harvard, Vancouver, ISO, and other styles
9

Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.

Full text
Abstract:
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended users can access resources and only the required access to accomplish some task will be given. In this context, Role Based Access Control (RBAC) has been established as one of the most important paradigms of access control. In an organization, users receive responsibilities and privileges through roles and, in AC systems implementing RBAC, permissions are granted through roles assigned to users. Despite the apparent simplicity, mistakes can occur during the development of RBAC systems and lead t
APA, Harvard, Vancouver, ISO, and other styles
10

Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.

Full text
Abstract:
Kontrola pristupa odnosno autorizacija, u &scaron;irem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili
APA, Harvard, Vancouver, ISO, and other styles
11

Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Singh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (leaves 69-71).<br>by Arundhati Singh.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
13

Petrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.

Full text
Abstract:
Tobulėjant mobilioms technologijoms vietos informacija tapo svarbi prieigos valdymui. Šiame darbe analizuojamos vietos informacijos derinimo su autentifikacijos ir prieigos valdymo mechanizmais galimybės. Darbe išskirti vietos informacijos įvedimo į autentifikacijos, prieigos valdymo ir atskaitomybės procesus privalumai. Pristatomas vietos informacija paremtas prieigos prie tinklo resursų valdymo modelis, kuris leidžia padidinti teisingo autentifikavimo tikimybę bei išplėsti prieigos valdymo galimybes. Suprojektuota prieigos prie bevielio tinklo valdymo sistema, pritaikyta veikti kelių aukštų
APA, Harvard, Vancouver, ISO, and other styles
14

Landberg, Fredrik. "Flexible role-handling in command and control systems." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.

Full text
Abstract:
<p>In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.</p><p>This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.</p>
APA, Harvard, Vancouver, ISO, and other styles
15

Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.

Full text
Abstract:
While Role Based Access Control (RBAC) has been a popular topic of research over the last several years, there are some gaps in the literature that have been waiting to be addressed. One of these gaps involves the application of RBAC to free and open source software (FOSS). With the prevalence of FOSS in most information systems growing rapidly, there is a need to be able to provide a level of confidence that the software will not compromise the data integrity of an environment, nor will it enable the violation of established access controls. Additionally, when utilizing FOSS software it is de
APA, Harvard, Vancouver, ISO, and other styles
16

Falkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.

Full text
Abstract:
<p>Nowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in the military world. This information often resides at different locations, creating a distributed system. In order to share information in a secure manner in a distributed system, credentials are often used to attain authorization.</p><p>This thesis examines how such a distributed system for sharing information can be realized, using the technology readily available today. Accounting to the results of this examination a basic system is implemented, a
APA, Harvard, Vancouver, ISO, and other styles
17

Cáceres, Alvarez Luis Marco. "Modelo de segurança multilateral e RBAC em um ambiente de serviço no contexto de gerenciamento de contabilidade TINA." Florianópolis, SC, 2004. http://repositorio.ufsc.br/xmlui/handle/123456789/86854.

Full text
Abstract:
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.<br>Made available in DSpace on 2012-10-21T11:20:15Z (GMT). No. of bitstreams: 1 210977.pdf: 3171815 bytes, checksum: bf83468afb28c3e0d57c2322b1c8f216 (MD5)<br>Na área das telecomunicações, a crescente evolução e o constante desenvolvimento de novas tecnologias, aliado a fatores econômicos, tem proporcionado um grande impacto em praticamente todos os setores da sociedade. Além disso, a inexistência de padrões no setor de telecomunicações evidenciou as diferenças e
APA, Harvard, Vancouver, ISO, and other styles
18

Shi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.

Full text
Abstract:
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the applicati
APA, Harvard, Vancouver, ISO, and other styles
19

Siebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.

Full text
Abstract:
The purpose of this thesis is to investigate the implementation of digital authorization for computer systems, specifically how to implement an efficient and secure authorization engine that uses policies and attributes to calculate authorization. The architecture for the authorization engine is discussed, the efficiency of the engine is characterized by various tests, and the security model is reviewed against other presently existing models. The resulting efforts showed an increase in efficiency of almost two orders of magnitude, along with a reduction in the amount of processing power req
APA, Harvard, Vancouver, ISO, and other styles
20

Albalawi, Talal S. "A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lacroix, Julien. "Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4365.

Full text
Abstract:
Ce document constitue l'aboutissement de trois années de thèse. Après avoir introduit et dégagé la problématique générale se rapportant à mon sujet de thèse, à savoir « comment utiliser les données de provenance pour favoriser un Cloud de confiance ? », je présente une description des concepts, modèles et langages se rapportant à ma thèse et l'état de l'art qui peut répondre en partie à cette problématique. En second lieu, je présente la solution basée sur la provenance que j'apporte aux contrôles d'accès, dans les systèmes distribués comme le Cloud : PBAC². Elle repose sur un système combinan
APA, Harvard, Vancouver, ISO, and other styles
22

Poniszewska, Aneta. "Spécification UML du contrôle d'accès dans les sytèmes d'information : une approche coopérative de la conception des rôles dans un modèle RBAC." Artois, 2003. http://www.theses.fr/2003ARTO0202.

Full text
Abstract:
Nous avons choisi d'aborder le problème du contrôle d'accès d'un problème d'information en proposant un modèle de rôle dès la conception de celui-ci et tout au long de son évolution (i. E. Ajouts de nouvelles applications). Nos objectifs étaient d'une part de faciliter le travail de l'administrateur de sécurité et d'autre part d'avoir une meilleure cohérence entre les contraintes globales de sécurité de l'entreprise et les différents composants de son système d'information. Pour ce faire, nous avons utilisé une conception orientée décrite dans le langage UML. Nous avons montré comment gérer au
APA, Harvard, Vancouver, ISO, and other styles
23

Silva, Edemilson dos Santos da. "Extensão do modelo de restrições do RBAC para suportar obrigações do modelo ABC / Edemilson dos Santos da Silva ; orientador, Altair Olivo Santin." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2004. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=280.

Full text
Abstract:
Dissertação (mestrado) - Pontifícia Universidade Católica do Paraná, Curitiba, 2004<br>Inclui bibliografia<br>Este trabalho apresenta uma proposta de extensão ao modelo de restrição do modelo de controle de acesso baseado em papéis (role-based access control - RBAC) para suportar situações críticas respeitando as regras da política de autorização do sistema. As s
APA, Harvard, Vancouver, ISO, and other styles
24

Gunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.

Full text
Abstract:
<p>Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. </p><p>In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. </p><p>We also investigate some of the
APA, Harvard, Vancouver, ISO, and other styles
25

Andersson, Jerker. "Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet." Thesis, Högskolan Dalarna, Informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700.

Full text
Abstract:
Rollbaserad åtkomstkontroll är en standardiserad och väl etablerad modell för att hantera åtkomsträttigheter i informationssystem. Den vedertagna ANSI-standarden 359-2004 saknar dock stöd för att geografiskt avgränsa rollbehörigheter. Informationssystem som behandlar geografiska data och de senaste årens ökade spridning av mobila enheter påkallar ett behov av att sådana rumsliga aspekter diskuteras inom kontexten av rollbaserad åtkomstkontroll. Arbetet syftar till att bringa klarhet i hur det befintliga kunskapstillståndet inom ämnesområdet rollbaserad åtkomst kontroll med geografisk avgränsni
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.

Full text
Abstract:
The definition of Electronic commerce is the use of electronic transmission mediums to engage in the exchange, including buying and selling, of products and services requiring transportation, either physically or digitally, from location to location. Electronic commerce systems, including mobile e-commerce, are widely used since 1990. The number of world-wide Internet users tripled between 1993 and 1995 to 60 million, and by 2000 there were 250 million users. More than one hundred countries have Internet access. Electronic commerce, especial mobile e-commerce systems, allows their users to acc
APA, Harvard, Vancouver, ISO, and other styles
27

Subedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Full text
Abstract:
One of the most widespread access control model that assigns permissions to a user is Role Based Access Control (RBAC). The basic idea is to limit the access to resources by using the indirection of roles, which are associated both to users and permissions. There has been research conducted with respect to clarifying RBAC and its components, as well as in creating mathematical models describing different aspects of its administrative issues in RBAC. But, till date no work has been done in terms of formalization (Mathematical Modelling) of delegation and revocation of roles in RBAC. Which provi
APA, Harvard, Vancouver, ISO, and other styles
28

Yangui, Rahma. "Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires." Thesis, Ecole centrale de Lille, 2016. http://www.theses.fr/2016ECLI0003/document.

Full text
Abstract:
La sécurité est un enjeu majeur dans le cycle de développement des systèmes critiques, notamment dans le secteur du transport ferroviaire. Cette thèse vise la modélisation, la vérification et la validation des règles d'exploitation ferroviaires au regard des exigences de sécurité. Ces règles ont pour but de définir les autorisations de déplacement des trains sur des lignes ferroviaires nationales équipées du système européen de gestion du trafic ferroviaire (ERTMS). De manière analogue, on trouve les concepts liés aux autorisations dans la description des politiques de contrôle d'accès des sys
APA, Harvard, Vancouver, ISO, and other styles
29

Rondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Negli ultimi anni si è assistito a un incremento dell'uso del cloud, con cambiamenti nel tipo di servizi distribuiti tramite esso e nel tipo di infrastruttura utilizzata per supportare tali servizi. Il comprensibile desiderio di migliorare i servizi offerti, diminuendo però i costi di gestione e manutenzione, sta portando infatti all'utilizzo di infrastrutture cloud eterogenee, spesso distribuite su più aree geografiche. Tale eterogeneità delle infrastrutture rende complicato garantire la sicurezza dei sistemi, in un mondo in cui gli attacchi informatici sono sempre più diffusi ed è sempre più
APA, Harvard, Vancouver, ISO, and other styles
30

Bouriche, Khalid. "Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès." Thesis, Artois, 2013. http://www.theses.fr/2013ARTO0406/document.

Full text
Abstract:
La présente thèse s'intéresse à coder la politique de sécurité SELinux en OrBAC et à proposer une extension de ce modèle. Nous avons commencé par présenter l'état de l'art des différents modèles de contrôles d'accès présents dans la littérature en mettant en exergue les limites de chacun de ces modèles. Ensuite nous avons présenté le modèle OrBAC comme étant une extension du modèle RBAC, car d'une part il a apporté la notion de contexte et d'organisation et d'autre part il permet d'exprimer, en plus des permissions, des interdictions et des obligations. Ensuite, nous avons présenté la solution
APA, Harvard, Vancouver, ISO, and other styles
31

Namli, Tuncay. "Security, Privacy, Identity And Patient Consent Management Across Healthcare Enterprises Inintegrated Healthcare Enterprises (ihe) Cross Enterprise Document Sharing (xds) Affinity Domain." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608463/index.pdf.

Full text
Abstract:
Integrated Healthcare Enterprise (IHE) is an initiative by industry and healthcare professionals to improve knowledge sharing and interoperability between healthcare related enterprises. IHE publishes Integration Profiles on several Healthcare Fields to define how systems can use existing standards and technologies to execute a specific use case in healthcare. Cross Enterprise Document Sharing (XDS) is such a profile which defines the way of sharing Electronic Health Records (EHR) between healthcare enterprises. In this thesis, IHE Cross Enterprise User Authentication, IHE Node Authentication
APA, Harvard, Vancouver, ISO, and other styles
32

Poe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.

Full text
Abstract:
Privacy concerns have always been present in every society. The introduction of information technology information has enabled a reduction in the cost of gathering information, management of that information and the permitted that same information to become increasingly portable. Coupled with these reductions of cost has been an increase in the demand for information as well as the concern that privacy expectations be respected and enforced through security systems that safeguard access to private-type data. Security systems enforce privacy expectations. Unfortunately there is no consensus on
APA, Harvard, Vancouver, ISO, and other styles
33

Boström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.

Full text
Abstract:
<p>In the area of computer network security, standardization work has been conducted for several years. However, the sub area of access control and authorization has so far been left out of major standardizing. </p><p>This thesis explores the ongoing standardization for access control and authorization. In addition, areas and techniques supporting access control are investigated. Access control in its basic forms is described to point out the building blocks that always have to be considered when an access policy is formulated. For readers previously unfamiliar with network security a number o
APA, Harvard, Vancouver, ISO, and other styles
34

Pooda, Herman. "Évaluation et comparaison des modèles de contrôle d'accès." Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/8157.

Full text
Abstract:
La protection des données et de la vie privée des personnes est devenue aujourd’hui un enjeu majeur pour les entreprises et les organisations gouvernementales qui collectent et entreposent les données à caractère personnel. L’adoption d’une politique de sécurité est un impératif. Plusieurs modèles de contrôle d’accès sont proposés dans la littérature pour guider les utilisateurs dans la mise en oeuvre de leurs politiques de sécurité. Chacun de ces modèles a ses forces et faiblesses. Les systèmes de contrôle d’accès mis en place s’érigent souvent en de véritables obstacles, rendant ineffi
APA, Harvard, Vancouver, ISO, and other styles
35

El, Houri Marwa. "Un modèle formel pour exprimer des politiques dynamiques pour contrôle d'accès et négociation dans un environnement distribué." Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00492317.

Full text
Abstract:
L'objectif principal de cette thèse est de définir un langage logique de haut niveau qui permet l'expression de politiques de sécurité complexes au sein d'un modèle de contrôle d'accès. Le développement de ce langage se fait en trois temps. Dans un premier temps nous présentons un modèle dynamique basé sur les rôles. Ainsi, nous considérons que l'évolution de l'état de sécurité d'un service dépend de l'exécution de ses fonctionnalités. Dans un deuxième temps nous définissons un formalisme basé sur les attributs qui offre plus de flexibilité en termes de spécifications des conditions de contrôl
APA, Harvard, Vancouver, ISO, and other styles
36

Frausto, Bernal Paul Axayacatl. "ICARE-S2 : Infrastructure de confiance sur des architectures de réseaux pour les services de signature évoluée." Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000924.

Full text
Abstract:
Actuellement, de plus en plus d'ordinateurs sont interconnectés à l'Internet ou à des réseaux locaux. Il est donc indispensable de partager et de protéger l'information de façon performante. Pour accélérer et favoriser le développement de nouvelles applications et services autour des transactions électroniques, la sécurité devient une priorité. L'infrastructure de gestion de clés (IGC) est une réponse conçue pour assurer la sécurité des transactions électroniques et permettre l'échange de renseignements sensibles entre des parties qui n'ont pas établi au préalable de liens. La signature électr
APA, Harvard, Vancouver, ISO, and other styles
37

Katcharian, Hope. "Risk-Based Corrective Action (RBCA) at petroleum contaminated sites : the rationale for RBCA and natural attenuation." Thesis, Springfield, Va. : Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA339431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kauermann, Richard [Verfasser]. "Sinterformen von reaktionsgebundenem Aluminiumoxid (RBAO) / Richard Kauermann." Aachen : Shaker, 2007. http://d-nb.info/116651238X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Motta, Gustavo Henrique Matos Bezerra. "Um modelo de autorização contextual para o controle de acesso ao prontuário eletrônico do paciente em ambientes abertos e distribuídos." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-05042004-152226/.

Full text
Abstract:
Os recentes avanços nas tecnologias de comunicação e computação viabilizaram o pronto acesso às informações do prontuário eletrônico do paciente (PEP). O potencial de difusão de informações clínicas resultante suscita preocupações acerca da priva-cidade do paciente e da confidencialidade de seus dados. As normas presentes na legislação dispõem que o conteúdo do prontuário deve ser sigiloso, não cabendo o acesso a ele sem a prévia autorização do paciente, salvo quando necessário para be-neficiá-lo. Este trabalho propõe o MACA, um modelo de autorização contextual para o controle de acesso basead
APA, Harvard, Vancouver, ISO, and other styles
40

Báča, Petr. "RBC model - aplikace na ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76667.

Full text
Abstract:
The diploma thesis deals with the basic Real Business Cycle (RBC) model. RBC theory provides pure supply-side explanation of economic fluctuations. Generaly acknowledged contribution of RBC theory is the fact that the model is developed strictly on microeconomic basis. The thesis consists of two basic parts, theoretical and practical. First, historical background of RBC theory is mentioned. Then the basic RBC model is step-by-step derived and all equations are provided with explanations. In the last theoretical part section RBC theory critisism is discussed. In the practical part the derived b
APA, Harvard, Vancouver, ISO, and other styles
41

Simões, David João Apolinário. "Endowing NoSQL DBMS with SQL features through call level interfaces." Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18592.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>Os arquitetos de software usam ferramentas, tais como Call Level Interfaces (CLI), para guardar, atualizar e retirar dados de Sistemas de Gestão de Bases de Dados (SGBD). Estas ferramentas estão desenhadas para efetuarem a junção entre os paradigmas de Base de Dados Relacional e da Programação Orientada a Objetos e fornecem funcionalidades padrão para interagir com SGBD. No entanto, a emergência do paradigma NoSQL, e particularmente de novos fornecedores de SGBD NoSQL, leva a situações onde algumas das funcionalidades padrão forneci
APA, Harvard, Vancouver, ISO, and other styles
42

Law, Boon-Chuan. "UNCERTAINTY ANALYSIS FOR ROCKET-BASED COMBINED CYCLE (RBCC) SYSTEMS TESTING." MSSTATE, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07152003-174339/.

Full text
Abstract:
General uncertainty analysis was used to evaluate the performance of a Rocket-Based Combined Cycle (RBCC) engine system. To estimate the uncertainties of test results, uncertainties of basic measurements such as temperature, pressure, mass flow rate, and thrust were determined. The desired test results of interest included specific impulse and characteristic velocity. Various possible test facilities were reviewed to obtain background information and example test run conditions. Based on the test run conditions, five methods of determining specific impulse were evaluated. Also, theoretical and
APA, Harvard, Vancouver, ISO, and other styles
43

Modebe, Emmanuel Obinna. "Extended Cr-51 RBC combined with Tc-99m RBC for the detection and localisation of occult GIT bleeding." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86509.

Full text
Abstract:
Thesis (MMed)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: Background Occult blood loss from the gastrointestinal tract (GIT), causing iron deficiency often with anaemia, can be diagnostically and therapeutically challenging. This is because the endoscopic and radiologic tests may be negative due to the slow, chronic and intermittent nature of the gastrointestinal bleeding, making timing key in detection and localisation of the bleed. These limitations can be approached using two different radioactive isotopes. Firstly, we tested the sensitivity of extending Cr-51 RBC for 21 days rela
APA, Harvard, Vancouver, ISO, and other styles
44

Lee, Chang Hee. "The competitive effects of RBOC interLATA entry on local telephone markets." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1078943781.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.<br>Title from first page of PDF file. Document formatted into pages; contains xiii, 274 p.; also includes graphics (some col). Includes abstract and vita. Advisor: Douglas N. Jones, Dept. of Public Policy and Management. Includes bibliographical references (p. 275-317).
APA, Harvard, Vancouver, ISO, and other styles
45

Jadidi, Mansoor. "Numerical and Experimental Model of Healthy and Damaged Red Blood Cell Trajectories in Micro-channels." Thesis, Griffith University, 2023. http://hdl.handle.net/10072/421347.

Full text
Abstract:
Motivation: Red blood cells (RBCs) are the most common cells in the blood due to their high concentration. The RBC has a deformable membrane enclosing a jelly-like fluid known as the cytosol. For many years, the dynamics of RBCs has attracted growing interest both numerically and experimentally in various fields of research on biological systems. Owing to their high deformability, RBCs exhibit complex dynamic behaviours in micro-vessels where Reynolds numbers (Re) are less than unity (Re < 1). First, a healthy RBC at a low shear rate or a high viscosity contrast (λ - defined as the ratio of vi
APA, Harvard, Vancouver, ISO, and other styles
46

Carneiro, Dias André Eduardo. "Study of RBC shape transitions induced by nanoparticles." Doctoral thesis, Universitat Rovira i Virgili, 2019. http://hdl.handle.net/10803/668080.

Full text
Abstract:
Aquesta tesi descriu l'estudi de les propietats del medi extracel·lular sobre la criopreservació de glòbuls vermells i la possible aplicació de nanopartícules de sílice com a co-agents per al lliurament intracel·lular de trehalosa, un crioprotector natural. La primera part de l™estudi es va centrar en les condicions de congelació i descongelació i en les propietats del medi extracel·lular per a la congelació. Es van analitzar diferents propietats segons la seva influència en la taxa de supervivència dels glòbuls vermells, que es va avaluar mitjançant l™assaig d™hemòlisi i es va analitzar l™efe
APA, Harvard, Vancouver, ISO, and other styles
47

Mendes, William Corrêa. "ARQUITETURA BASEADA EM ONTOLOGIAS DE UM AGENTE RBC." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/506.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:53:25Z (GMT). No. of bitstreams: 1 dissertacao William.pdf: 3403982 bytes, checksum: cac96344d66257744889562ee1b77235 (MD5) Previous issue date: 2013-11-04<br>Case-Based Reasoning (CBR) is a problem-solving paradigm where it is possible to use knowledge from past experiences to solve new situations. The CBR agent approach that combines agent autonomy with the problem-solving model of CBR has been proven adequate for the development of complex systems. This paper proposes the architecture of a CBR agent whose main differential is the use of ontologi
APA, Harvard, Vancouver, ISO, and other styles
48

Almeida, Sara Cristina Cantarino Valente de. "An RBC model with a rich fiscal sector." Master's thesis, NSBE - UNL, 2013. http://hdl.handle.net/10362/9698.

Full text
Abstract:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics<br>Contributing to the general understanding of fiscal policy e ectiveness, this study consists in the reformulation and estimation of the DSGE model developed in Azevedo and Ercolani (2012), to measure the potential relations between the private sector and the consumption and investment components of government expenditures. The estimation results show that public consumption and capital have both a substitutability e ect on private factors. For
APA, Harvard, Vancouver, ISO, and other styles
49

Morrow, Carl. "Phylogenetic investigations of the African Restionaceae using rbc." Thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/26316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Beppler, Fabiano Duarte. "Emprego de RBC para recuperação inteligente de informações." Florianópolis, SC, 2002. http://repositorio.ufsc.br/xmlui/handle/123456789/82898.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Engenharia de Produção.<br>Made available in DSpace on 2012-10-19T19:18:05Z (GMT). No. of bitstreams: 1 189259.pdf: 2369619 bytes, checksum: 6081c39e99c22484b1465b896722ff2a (MD5)<br>A dimensão do volume de informações disponíveis na Internet e as taxas diárias de crescimento tornam cada vez mais presentes mecanismos eficientes e eficazes de recuperação de informações. A maioria dos métodos pesquisados e aplicados tem por base o tratamento das informações disponíveis nos repositóri
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!