To see the other types of publications on this topic, follow the link: User Access Control.

Dissertations / Theses on the topic 'User Access Control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'User Access Control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Full text
Abstract:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UB
APA, Harvard, Vancouver, ISO, and other styles
2

Qiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.

Full text
Abstract:
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0)
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 55-60).<br>Modern web services rob users of low-level control over cloud storage; a user's single logical data set is scattered across multiple storage silos whose access controls are set by the web services, not users. The res
APA, Harvard, Vancouver, ISO, and other styles
4

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Full text
Abstract:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we fo
APA, Harvard, Vancouver, ISO, and other styles
6

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Full text
Abstract:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart
APA, Harvard, Vancouver, ISO, and other styles
7

Beattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.

Full text
Abstract:
This thesis examines the informational needs of historians researching women as a subject in archives. The research methodology employed combines two types of user studies, the questionnaire and the reference analysis, in order to determine both the use and usefulness of archival materials and finding aids for historians researching women. This study begins with an overview of the literature on user studies. The thesis then outlines both the kinds of materials and the information historians researching women require. Finally, this study looks at the way historians researching women locate rele
APA, Harvard, Vancouver, ISO, and other styles
8

Bhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 99. Thesis directors: Ravi Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 94-98). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Maw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further d
APA, Harvard, Vancouver, ISO, and other styles
10

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
11

Ali, Waqas Liaqat. "Securing Safebook : Secure Data Access Control and Key Management for Safebook." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-126987.

Full text
Abstract:
Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. This has raised concerns about how the users’ contents are protected and how the privacy of users is preserved by the service providers. Moreover, current social networks have been subject to much criticism over their privacy settings and access control mechanism. The providers own the users’ contents and these contents
APA, Harvard, Vancouver, ISO, and other styles
12

Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code." Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.

Full text
Abstract:
This thesis evaluates the use of a loadtime metaobject protocol as a practical mechanism for enforcing access control policies upon applications distributed as user-level compiled code. Enforcing access control policies upon user-level compiled code is necessary because there are many situations where users are vulnerable to security breaches because they download and run potentially untrustworthy applications provided in the form of user-level compiled code. These applications might be distributed applications so access control for both local and distributed resources is required. Examples of
APA, Harvard, Vancouver, ISO, and other styles
13

Zeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.

Full text
Abstract:
Säkerhet och användbarhet beskrivs ofta som motpoler. I detta examensarbete så undersöks möjligheterna till att inkorporera både säkerhet och användbarhet i ett passagekontrollsgränssnitt. Forskningen är fokuserad på den del av passagekontrollen som benämns som händelseloggen. Loggens ändamål är att lagra och presentera information om händelser som sker i övervakade entréer. Syftet med forskningen är att undersöka i vilken utsträckning det är möjligt att implementera användarkrav och samtidigt uppfylla säkerhets- och användbarhetsheuristik. En klassisk interaktionsdesignsprocess utförs. Semi-s
APA, Harvard, Vancouver, ISO, and other styles
14

French, David James. "Understanding and Addressing Collaboration Challenges for the Effective Use of Multi-User CAD." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6229.

Full text
Abstract:
Multi-user computer-aided design (CAD) is an emerging technology that promises to facilitate collaboration, enhance product quality, and reduce product development lead times by allowing multiple engineers to work on the same design at the same time. The BYU site of the NSF Center for e-Design has developed advanced multi-user CAD prototypes that have demonstrated the feasibility and value of this technology. Despite the possibilities that this software opens up for enhanced collaboration, there are now a new variety of challenges and opportunities to understand and address. For multi-user CAD
APA, Harvard, Vancouver, ISO, and other styles
15

Binbusayyis, Adel. "Achieving secure and efficient access control of personal health records in a storage cloud." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/achieving-secure-and-efficient-access-control-of-personal-health-records-in-a-storage-cloud(008e42d3-a620-4c10-af1b-d26715a1c014).html.

Full text
Abstract:
A personal health record (PHR) contains health data about a patient, which is maintained by the patient. Patients may share their PHR data with a wide range of users such as healthcare providers and researchers through the use of a third party such as a cloud service provider. To protect the confidentiality of the data and to facilitate access by authorized users, patients use Attribute-Based Encryption (ABE) to encrypt the data before uploading it onto the cloud servers. With ABE, an access policy is defined based on users' attributes such as a doctor in a particular hospital, or a researcher
APA, Harvard, Vancouver, ISO, and other styles
16

Ma, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.

Full text
Abstract:
Thesis (M.S.)--Georgia State University, 2007.<br>Title from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
APA, Harvard, Vancouver, ISO, and other styles
17

Lachmund, Sven L. [Verfasser]. "Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition / Sven Lachmund." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009095412/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Petersson, Lantz Robert, and Andreas Alvarsson. "Creating access control maps and defining a security policy for a healthcare communication system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-121131.

Full text
Abstract:
This report handles the creation of an access control map and the dening of asecurity policy for a healthcare communication system. An access control mapis a graphical way to describe the access controls of the subjects and objects ina system. We use a three step method to produce a graphical overview of theparts in the system, the interactions between them and the permissions of thesubjects. Regarding the security policy we create a read up and read down policylike the so called Ring policy, but adapt a write sideways approach. We alsoapply a mandatory access control which has a centralized a
APA, Harvard, Vancouver, ISO, and other styles
19

Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.

Full text
Abstract:
Usage of locational data is getting more popular day by day. Location-aware application, context aware application and Ubiquities applications are some of the major categories of applications which are based on locational data. One of the most concerning issues regarding such applications is how to protect user’s privacy against malicious attackers. Failing in this task would result in a total failure for the project, considering how privacy concerns are getting more and more important for the end users. In this project, we will propose a theoretical solution for protecting user privacy in loc
APA, Harvard, Vancouver, ISO, and other styles
20

Monteleone, Salvatore. "Security and Privacy Policy Management in Dynamic and Context-Aware User-Centric Systems." Doctoral thesis, Università di Catania, 2014. http://hdl.handle.net/10761/1495.

Full text
Abstract:
Considering user-centric systems, the problem of controlling the access to reserved resources is still open, especially due to the big amount of personal data generated every day by users. These data come primarily from mobile devices that became the main repository of personal information and source of user-generated contents as well as the principal controller of our social networked life. These data comes also from other connected devices of the everyday life, belonging to different domains (eg. in-car systems, TVs). In a multi-domain cross-platform scenario, in which web browsers represent
APA, Harvard, Vancouver, ISO, and other styles
21

Huang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Koriťák, Jan. "Automatická tvorba grafického rozhraní pro vzdálený přístup." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237075.

Full text
Abstract:
This thesis explores the possibilities of abstraction of graphical user interface and automation of its design and development process at runtime. Emphasis is placed on possibility of remote control over computer network and accordingly on delegation of the interface creation on the human operated remote machine. The thesis analyzes contemporary approaches to and methods of interface generation. As a goal of the thesis a system for automatic user interface generation for remote applications was designed and implemented. The generation is based on specified data model.
APA, Harvard, Vancouver, ISO, and other styles
23

Butun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.

Full text
Abstract:
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy resources and also restricted by the ad-hoc network operational environment. They pose unique challenges, due to limited power supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security appl
APA, Harvard, Vancouver, ISO, and other styles
24

Erpek, Tugba. "Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102705.

Full text
Abstract:
This dissertation addresses multi-layer optimization aspects of multiple input multiple output (MIMO) and deep learning-based communication systems. The initial focus is on the rate optimization for multi-user MIMO (MU-MIMO) configurations; specifically, multiple access channel (MAC) and interference channel (IC). First, the ergodic sum rates of MIMO MAC and IC configurations are determined by jointly integrating the error and overhead effects due to channel estimation (training) and feedback into the rate optimization. Then, we investigated methods that will increase the achievable rate fo
APA, Harvard, Vancouver, ISO, and other styles
25

Ntsham, Xolile. "Information flows in the social development grant process: a user experience perspective." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Information Technology in the Faculty of Informatics and design at the Cape Peninsula University of Technology 2014<br>This study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an incr
APA, Harvard, Vancouver, ISO, and other styles
26

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos com
APA, Harvard, Vancouver, ISO, and other styles
27

Fiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.

Full text
Abstract:
Este trabalho investiga diferentes estratégias e técnicas de autenticação de usuários visando determinar quais podem ser integradas em um ambiente de educação a distância. Diversas soluções de autenticação existentes no mercado foram analisadas para se determinar as mais adequadas. Buscou-se as soluções consideradas factíveis de utilização, seja pelo custo ou quantidade de equipamentos extras envolvidos, seja pela simplicidade operacional ou pelo grau de certeza das medidas efetuadas. A partir desta análise foi delineado um modelo de autenticação que integra várias técnicas de autenticação a f
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Full text
Abstract:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks--
APA, Harvard, Vancouver, ISO, and other styles
29

Misra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.

Full text
Abstract:
Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy problems faced by social media users can be categorized into institutional privacy (related to the social
APA, Harvard, Vancouver, ISO, and other styles
30

Salaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006/document.

Full text
Abstract:
Cette thèse souhaite fournir des outils pour qu’un utilisateur puisse contribuer activement à la sécurité de son usage d’un système informatique. Les activités de sensibilités différentes d’un utilisateur nécessitent tout d’abord d’être cloisonnées dans des domaines dédiés, par un contrôle d’accès s’ajustant aux besoins de l’utilisateur. Afin de conserver ce cloisonnement, celui-ci doit être en mesure d’identifier de manière fiable les domaines avec lesquels il interagit, à partir de l’interface de sa machine. Dans une première partie, nous proposons un nouveau mécanisme de cloisonnement qui p
APA, Harvard, Vancouver, ISO, and other styles
31

Salaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006.

Full text
Abstract:
Cette thèse souhaite fournir des outils pour qu’un utilisateur puisse contribuer activement à la sécurité de son usage d’un système informatique. Les activités de sensibilités différentes d’un utilisateur nécessitent tout d’abord d’être cloisonnées dans des domaines dédiés, par un contrôle d’accès s’ajustant aux besoins de l’utilisateur. Afin de conserver ce cloisonnement, celui-ci doit être en mesure d’identifier de manière fiable les domaines avec lesquels il interagit, à partir de l’interface de sa machine. Dans une première partie, nous proposons un nouveau mécanisme de cloisonnement qui p
APA, Harvard, Vancouver, ISO, and other styles
32

Kelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.

Full text
Abstract:
For the past 70 years, the Federal Communications Commission (FCC) has been the licensing authority for wireless spectrum. Traditionally, spectrum was commercially licensed to primary users with defined uses. With the growth of personal communication systems in the 1990''s, unallocated spectrum has become a scarce commodity. However, since most primary users are active only at certain times and places, much of the allocated spectrum remains underutilized. Substantial holes exist in the spatio-temporal spectrum that could be opportunistically used by unlicensed secondary users. As a result, the
APA, Harvard, Vancouver, ISO, and other styles
33

Friedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.

Full text
Abstract:
The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and profe
APA, Harvard, Vancouver, ISO, and other styles
34

Azad, Md Saiful. "Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3423364.

Full text
Abstract:
The journey of underwater communication which began from Leonardo’s era took four and a half centuries to find practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assi
APA, Harvard, Vancouver, ISO, and other styles
35

Farietta, Thalia Paola. "Trends in US Youth Tobacco Use, Access and Media Exposure from 2004 to 2011." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1374069945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.

Full text
Abstract:
This thesis describes scenarios in which a mobile user needs various services, such as Internet telephony, secure printing and online data services in a number of places. From these scenarios we summarize the requirements for quality of service control, service discovery, user authentication and authorization, service access control, and user privacy. In order to implement a prototype to support service discovery, we studied different technologies including Bluetooth, Jini, and Web Services. SDPtool from BlueZ was chosen to limit the search range within the user's local area while using minima
APA, Harvard, Vancouver, ISO, and other styles
39

Persson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.

Full text
Abstract:
Today, companies are spending millions of dollars on cybersecurity, but compromised systems and stealing sensitive information are still huge problems. Protecting sensitive information has always been of vital importance. However, the struggle today is that digital information can be distributed to an endless amount of users, everywhere in the world. Security solutions today focus on role-based access control and "the principle of the least privilege". They can affect the productivity of employees, which is also a key aspect to be considered when it comes to security. Privilege users are the o
APA, Harvard, Vancouver, ISO, and other styles
40

Reuben, Jenni. "Privacy-aware Use of Accountability Evidence." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48550.

Full text
Abstract:
This thesis deals with the evidence that enable accountability, the privacy risks involved in using them and a privacy-aware solution to the problem of unauthorized evidence disclosure.  Legal means to protect privacy of an individual is anchored on the data protection perspective i.e., on the responsible collection and use of personal data. Accountability plays a crucial role in such legal privacy frameworks for assuring an individual’s privacy. In the European context, accountability principle is pervasive in the measures that are mandated by the General Data Protection Regulation. In genera
APA, Harvard, Vancouver, ISO, and other styles
41

Cook, Donovan W. "The effect of computer use and Logo instruction on third and fourth grade students' perceived control." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/50000.

Full text
Abstract:
In this study, the effect of computer use and Logo instruction on students' perceived control of computers and generalized perceived control was examined. Third and fourth grade students (<u>N</u>=90) in four intact groups, consisting of one treatment and one control group for each grade level, were pre- and posttested, using the computer control survey (CCS) and the Chi1dren's Nowicki-Strickland Locus of Control Scale (CNS-IE). A posttest measure of Logo achievement was obtained from the treatment students. Three way analyses of covariance, using the pretest scores as the covariate, were use
APA, Harvard, Vancouver, ISO, and other styles
42

Casali, Sherry Perdue. "An empirically developed system for the selection of input devices for users with physical disabilities." Diss., This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-07282008-134932/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

van, Coppenhagen Robert Lindenberg, and robert vancoppenhagen@dsto defence gov au. "On the Coordinated Use of a Sleep Mode in Wireless Sensor Networks: Ripple Rendezvous." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.145741.

Full text
Abstract:
It is widely accepted that low energy consumption is the most important requirement when designing components and systems for a wireless sensor network (WSN). The greatest energy consumer of each node within a WSN is the radio transceiver and as such, it is important that this component be used in an extremely energy e±cient manner. One method of reducing the amount of energy consumed by the radio transceiver is to turn it off and allow nodes to enter a sleep mode. The algorithms that directly control the radio transceiver are traditionally grouped into the Medium Access Control
APA, Harvard, Vancouver, ISO, and other styles
44

Kgomotso, Phemo Karen. "Global environmental agreements and local livelihoods : how the internationalisation of environmental resources shapes access to and control over wetland resources in the Okavango Delta, Botswana." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/38451/.

Full text
Abstract:
This thesis examines how global environmental crisis narratives and discourses have influenced environmental policy and practice in conservation programmes for the Okavango Delta, Botswana. In particular, it highlights the contested nature of biodiversity conservation and the embedded power relations in the framing, definition and crafting of solutions to the problem of biodiversity degradation at local, national and international levels. The thesis therefore examines, based on these framings, the consequences of global environmental agreements, such as the Ramsar Convention and the UN Convent
APA, Harvard, Vancouver, ISO, and other styles
45

Ngomane, Thandi Susan. "Land as an economic empowerment tool: access, control and ownership of land by rural women in the Mpumalanga Province,South Africa." Thesis, University of Limpopo, 2016. http://hdl.handle.net/10386/1614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Alemany, Bordera José. "Measures of Privacy Protection on Social Environments." Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.

Full text
Abstract:
[EN] Nowadays, online social networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. Social networks are an ideal environment for generating all kinds of social benefits for users. Users share experiences, keep in touch with their family, friends and acquaintances, and earn economic benefits from the power of their influence (which is translated into new job opportunities). However, the use of social networks and the action of sharing information imply the loss of the users’ privacy. Recently, a great interest in protecting the privacy of users has em
APA, Harvard, Vancouver, ISO, and other styles
47

Muhammad, Murtala. "Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of steerable directional antenna." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/46756/.

Full text
Abstract:
Energy efficiency contributes to the survival of nodes in Mobile Ad Hoc Networks (MANETs). The use of directional antennas can conserve energy due to the increased gain and directed transmission towards specific point in space. Directional antennas also resolve many issues associated with interference from different points within the network. Despite the vast body of work in this area, research on the way directional antennas access the wireless medium specific to Ultra-WideBand (UWB) systems have not gained wide attention. The aim of this research is to design, implement and test an improved
APA, Harvard, Vancouver, ISO, and other styles
48

Boushaki, Mohamed Nassim. "Optimisation de la conception et commande de robot à tubes concentriques pour la chirurgie laparoscopique par accès unique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT294/document.

Full text
Abstract:
Les robots à tubes concentriques deviennent de plus en plus populaires dans la communauté de la robotique médicale. Dans cette thèse, un état de l’art général des travaux existants et qui couvre les thématiques de recherche en robots à tubes concentriques (RTC) est présenté dans un premier temps. Les modélisations géométrique (directe et inverse) et cinématique des RTC sont détaillées car elles servent de base pour les contributions de cette thèse. La première contribution consiste en une étude de concept d’utilisation des RTCs pour la résection des tumeurs profondes situées au niveau du lobe
APA, Harvard, Vancouver, ISO, and other styles
49

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Chern-Muh, and 陳春木. "Access Control Systems with User Authentication." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83409934126622114655.

Full text
Abstract:
碩士<br>東吳大學<br>資訊科學系<br>91<br>It is necessary to appropriately manage the computer system resources that are only accessed by the authorized users. The servers use the user’s identifier and password for user authentication, and achieve the purpose of access control. The computer system environment of single machine operation is simple and easy to maintain, and its user has complete access right of all files. As the network is quick growth, some computer systems do not operate by alone, and they are linked to be a distributed computer system, in which the users can access the data by a remote co
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!