Dissertations / Theses on the topic 'User Access Control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'User Access Control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Full textQiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.
Full textWang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.
Full textLow, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Full textChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Full textShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Full textBeattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.
Full textBhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.
Full textMaw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.
Full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textAli, Waqas Liaqat. "Securing Safebook : Secure Data Access Control and Key Management for Safebook." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-126987.
Full textWelch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code." Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.
Full textZeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.
Full textFrench, David James. "Understanding and Addressing Collaboration Challenges for the Effective Use of Multi-User CAD." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6229.
Full textBinbusayyis, Adel. "Achieving secure and efficient access control of personal health records in a storage cloud." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/achieving-secure-and-efficient-access-control-of-personal-health-records-in-a-storage-cloud(008e42d3-a620-4c10-af1b-d26715a1c014).html.
Full textMa, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Full textLachmund, Sven L. [Verfasser]. "Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition / Sven Lachmund." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009095412/34.
Full textPetersson, Lantz Robert, and Andreas Alvarsson. "Creating access control maps and defining a security policy for a healthcare communication system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-121131.
Full textChini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.
Full textMonteleone, Salvatore. "Security and Privacy Policy Management in Dynamic and Context-Aware User-Centric Systems." Doctoral thesis, Università di Catania, 2014. http://hdl.handle.net/10761/1495.
Full textHuang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.
Full textKoriťák, Jan. "Automatická tvorba grafického rozhraní pro vzdálený přístup." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237075.
Full textButun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.
Full textErpek, Tugba. "Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102705.
Full textNtsham, Xolile. "Information flows in the social development grant process: a user experience perspective." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.
Full textRibeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.
Full textFiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.
Full textChen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Full textMisra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.
Full textSalaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006/document.
Full textSalaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006.
Full textKelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.
Full textFriedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.
Full textAzad, Md Saiful. "Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3423364.
Full textFarietta, Thalia Paola. "Trends in US Youth Tobacco Use, Access and Media Exposure from 2004 to 2011." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1374069945.
Full textHirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.
Full textLaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Full textZhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.
Full textPersson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.
Full textReuben, Jenni. "Privacy-aware Use of Accountability Evidence." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48550.
Full textCook, Donovan W. "The effect of computer use and Logo instruction on third and fourth grade students' perceived control." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/50000.
Full textCasali, Sherry Perdue. "An empirically developed system for the selection of input devices for users with physical disabilities." Diss., This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-07282008-134932/.
Full textvan, Coppenhagen Robert Lindenberg, and robert vancoppenhagen@dsto defence gov au. "On the Coordinated Use of a Sleep Mode in Wireless Sensor Networks: Ripple Rendezvous." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.145741.
Full textKgomotso, Phemo Karen. "Global environmental agreements and local livelihoods : how the internationalisation of environmental resources shapes access to and control over wetland resources in the Okavango Delta, Botswana." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/38451/.
Full textNgomane, Thandi Susan. "Land as an economic empowerment tool: access, control and ownership of land by rural women in the Mpumalanga Province,South Africa." Thesis, University of Limpopo, 2016. http://hdl.handle.net/10386/1614.
Full textAlemany, Bordera José. "Measures of Privacy Protection on Social Environments." Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.
Full textMuhammad, Murtala. "Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of steerable directional antenna." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/46756/.
Full textBoushaki, Mohamed Nassim. "Optimisation de la conception et commande de robot à tubes concentriques pour la chirurgie laparoscopique par accès unique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT294/document.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textChen, Chern-Muh, and 陳春木. "Access Control Systems with User Authentication." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83409934126622114655.
Full text