Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Access control.

Rozprawy doktorskie na temat „Access control”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Access control”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Pełny tekst źródła
Streszczenie:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam
Style APA, Harvard, Vancouver, ISO itp.
2

Atkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

de, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Professional Access Control (PAC) is a self-administrating access control model for professional users which employs a peer review process and oversight by system administrators. It is characterised by the existence of ethical controls on the relationships between the users (those accessing data or granting access privileges to others) and data owners. Investigations revealed that the issue of availability was crucial to users in the hospital domain studied, and that to minimise the administrative burden on system administrators, the users needed to take some of the load. These factors led to
Style APA, Harvard, Vancouver, ISO itp.
5

Hoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.

Pełny tekst źródła
Streszczenie:
When classified data of different classifications are stored in a database, it is necessary for a contemporary database system to pass through other classified data to find the properly classified data. Although the user of the system may only see data classified at the user's level, the database system itself has breached the security by bringing the other classified data into the main memory from secondary storage. Additionally, the system is not efficient as it could be because unnecessary material has been retrieved. This is a problem in access precision. This thesis proposes a solution to
Style APA, Harvard, Vancouver, ISO itp.
6

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Pełny tekst źródła
Streszczenie:
<p>Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant acce
Style APA, Harvard, Vancouver, ISO itp.
7

Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.

Pełny tekst źródła
Streszczenie:
In this thesis we propose two semantic ontological role-based access control (RBAC) reasoning processes. These processes infer user authorisations according to a set of role permission and denial assignments, together with user role assignments. The first process, SO-RBAC (Semantic Ontological Role-Based Access Control) uses OWL-DL to store the ontology, and SWRL to perform reasoning. It is based mainly on RBAC models previously described using Prolog. This demonstrates the feasibility of writing an RBAC model in OWL and performing reasoning inside it, but is still tied closely to descriptive
Style APA, Harvard, Vancouver, ISO itp.
8

Schmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Lukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited<br>As networks grow in complexity and data breaches become more costly, network administrators need better tools to help design networks that provide service-level availability while restricting unauthorized access. Current research, specifically in declarative network management, has sought to address this problem but fails to bridge the gap between service-level requirements and low-level configuration directives. We introduce service-oriented access control, an approach that frames the problem in terms of maintaining service-level paths
Style APA, Harvard, Vancouver, ISO itp.
11

Aktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.

Pełny tekst źródła
Streszczenie:
Relationship Based Access Control (ReBAC) has emerged as a popular alternative to traditional access control models, such as Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). However, some of the model's aspects, such as its expression language and delegation abilities have not been studied in depth. Further-more, existing ReBAC models cater to single policy control, thus not taking into account cases were many access control policies might apply to a single access control object. We propose a ReBAC model, set theoretic ReBac (STReBAC), which bases its expression lang
Style APA, Harvard, Vancouver, ISO itp.
12

Withrow, Gary W. "An access control middleware application." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/GWithrow2006.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Prasai, Sandesh. "Access control of NUTS uplink." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19209.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Fisher, Craig. "Network access control disruptive technology? /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/JFisher2007.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Geshan, Susan Carol. "Signature verification for access control." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28533.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

O'Shea, Gregory Francis Gerard. "Access control in operating systems." Thesis, Birkbeck (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.301025.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Klingsbo, Lukas. "Access Control for CDN Assets." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-302091.

Pełny tekst źródła
Streszczenie:
This work presents a technique for implementing Copy-on-Write on top of a persistent storage. The method was developed from the needs of a se curity management system, but the technique and conclusions drawn are general enough to be applicable to any system with vaguely similar consistency requirements. The scalability of the security management system is tested and the technique is evaluated with load testing and model checking. The implementation is shown to be scalable for up to &gt;6.000 simultaneous active users per node, but based on our experience a better solution is suggested in the c
Style APA, Harvard, Vancouver, ISO itp.
18

Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Hermansson, Rickard, and Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents." Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.

Pełny tekst źródła
Streszczenie:
A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments.This paper shows different systems and models for access control, version control,and distribution of the documents that can be used to create asystem that solves theseproblems.One requirement for this system was a user interface where users can upload, down-load and manage access to their documents. Another requirement was a service thathan
Style APA, Harvard, Vancouver, ISO itp.
20

Røstad, Lillian. "Access Control in Healthcare Information Systems." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5130.

Pełny tekst źródła
Streszczenie:
Access control is a key feature of healthcare information systems. Access control is about enforcing rules to ensure that only authorized users get access to resources in a system. In healthcare systems this means protecting patient privacy. However, the top priority is always to provide the best possible care for a patient. This depends on the clinicians having access to the information they need to make the best, most informed, care decisions. Care processes are often unpredictable and hard to map to strict access control rules. As a result, in emergency or otherwise unexpected situations, c
Style APA, Harvard, Vancouver, ISO itp.
21

Li, Cheng. "Fluid model for access control mechanism." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26691.

Pełny tekst źródła
Streszczenie:
In this thesis, we develop two distinct traffic models: one based on Brownian motion and the other based on fractional Brownian motion. The later model captures the self-similarity and the long-range dependence (LRD) properties. The aggregate model is composed of a drift part and of a fluctuation (diffusion) part. With this model, traffic from several seconds to 24 hours can be simulated. Applying the Token Bucket (TB) mechanism, a continuous time (state-space) dynamic system model is developed based on the ideas of recent papers [1,2]. Incoming traffic from each user is policed at the TBs and
Style APA, Harvard, Vancouver, ISO itp.
22

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Pełny tekst źródła
Streszczenie:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
Style APA, Harvard, Vancouver, ISO itp.
23

Andersson, Fredrik, and Stefan Hagström. "Dynamic identities for flexible access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5310.

Pełny tekst źródła
Streszczenie:
This thesis will analyse the pros and cons of a module-based approach versus the currently existing certificate schemes and the proposed requirements for a module-based certificate scheme to serve as a plausible identity verification system. We will present a possible model and evaluate it in respect to the existing solutions and our set of identified requirements.
Style APA, Harvard, Vancouver, ISO itp.
24

Boberg, Hannes. "Designing and comparing access control systems." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131855.

Pełny tekst źródła
Streszczenie:
Access control systems are an important concept in the area of computer security. In this master thesis different solutions are analyzed. The focus is on a tool called DW Access. DW Access is developed by Pdb Datasystem AB. A comparison was done that showed that DW Access is lacking some important functionality. After the comparison a base model for an access control system was designed. The new design includes concepts like relation- ships, replacements and time limited access. It also works for generic subjects and objects in the system. This design was later partly implemented in DW Access.
Style APA, Harvard, Vancouver, ISO itp.
25

Wong, Tung Chong. "Wireless ATM network access and control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0005/NQ44781.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Sadighi, Firozabadi Seyd Babak. "Decentralised privilege management for access control." Thesis, Imperial College London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424362.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Barker, Steven Graham. "Database access control by logic planning." Thesis, Imperial College London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408732.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Belokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Pang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaf 46).<br>by Kenneth K. Pang.<br>B.S.<br>M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
30

Allen, Steven D. M. Eng Massachusetts Institute of Technology. "DRACL (Decentralized resource access control list)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/112855.

Pełny tekst źródła
Streszczenie:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 132-135).<br>DRACL is a privacy-preserving, scalable, secure, and developer and user friendly federated access control system. It allows producers to manage, through a single authentication provider, which consumers can access what content across all content hosts that support the DRACL protocol. It preserves user privacy by not revealing the producers' social networks to content hosts and
Style APA, Harvard, Vancouver, ISO itp.
31

Zhu, Jian. "Access Control for Cross Organizational Collaboration." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1334690364.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Yang, Naikuo. "Formalism of privacy preserving access control." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/formalism-of-privacy-preserving-access-control(ea4a3d37-fcd9-471b-a33e-7414c315aad9).html.

Pełny tekst źródła
Streszczenie:
There is often a misalignment between requirements for keeping data owners' information private and real data processing practices, and this can lead to violations of privacy. Specifying and implementing appropriate policies to control a user's access to a system and its resource is critical for keeping data owners' information private. Traditionally, policy specification is isolated from requirements analysis, which often results in data processing practices that are not in compliance with data owners' requirements. This thesis investigates a development scheme that integrates policy specific
Style APA, Harvard, Vancouver, ISO itp.
33

Zhao, Yining. "Behavioural access control in distributed environments." Thesis, University of York, 2013. http://etheses.whiterose.ac.uk/4640/.

Pełny tekst źródła
Streszczenie:
Applications and services in distributed environments are an increasingly important topic. Hence approaches to security issues in such applications are also becoming essential. Crucial information is needed to be protected properly and mechanisms must be developed for this protection. Access control is one of the topics that underline security problems. It concerns assuring that data or resources are accessed by the correct entities. A commonly used access control approach is called access control lists, which is widely applied in most operating systems. However, this approach has some weaknes
Style APA, Harvard, Vancouver, ISO itp.
34

Svetlana, Jakšić. "Types for Access and Memory Control." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2016. https://www.cris.uns.ac.rs/record.jsf?recordId=101762&source=NDLTD&language=en.

Pełny tekst źródła
Streszczenie:
Three issues will be elaborated and disussed in the proposed thesis. The first isadministration and control of data access rights in networks with XML data, withemphasis on data security. The second is the administration and control ofaccess rights to data in computer networks with RDF data, with emphasis ondata privacy. The third is prevention of errors and memory leaks, as well ascommunication errors, generated by programs written in Sing # language in thepresence of exceptions. For all three issues, there will be presented formalmodels with corresponding type systems and showed the absence
Style APA, Harvard, Vancouver, ISO itp.
35

Salim, Farzad. "Approaches to access control under uncertainty." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/58408/1/Farzad_Salim_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis inves
Style APA, Harvard, Vancouver, ISO itp.
36

Ferreira, Ana. "Modelling access control for healthcare information systems : how to control access through policies, human processes and legislation." Thesis, University of Kent, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529399.

Pełny tekst źródła
Streszczenie:
The introduction of Electronic Medical Records (EMR) within healthcare organizations has the main goal of integrating heterogeneous patient information that is usually scattered over different locations. However, there are some barriers that impede the effective integration of EMR within the healthcare practice (e.g., educational, time/costs, security). A focus in improving access control definition and implementation is fundamental to define proper system workflow and access. The main objectives of this research are: to involve end users in the definition of access control rules; to determine
Style APA, Harvard, Vancouver, ISO itp.
37

Jensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.

Pełny tekst źródła
Streszczenie:
<p>The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient w
Style APA, Harvard, Vancouver, ISO itp.
38

Hu, Wendong. "Medium access control protocols for cognitive radio based dynamics spectrum access networks." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1580792591&sid=28&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Pan, Su, and 潘甦. "Medium access control in packet CDMA systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31245870.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Huang, Qing. "An extension to the Android access control framework." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Pełny tekst źródła
Streszczenie:
Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. For instance, one of thosehardware functionalities, SIM-card authentication is able to offer stronger andmore convenient way of authentication when compared to the traditional approach.Replacing the username-password combination with the SIM-card authentication,users are freed from memorizin
Style APA, Harvard, Vancouver, ISO itp.
41

Rao, Vikhyath Jaeger Trent. "Dynamic mandatory access control for multiple stakeholders." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-3963/index.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Cavallero, Sara. "Medium Access Control Protocols for Terahertz Communication." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Znajdź pełny tekst źródła
Streszczenie:
This thesis proposes and studies a Medium Access Control (MAC) protocol for networks of tags deployed over an industrial machine using THz communications. Despite the great advantages of these frequencies, there are drawbacks that cannot be ignored, such as propagation delays that, even at small distances, are of the same order of magnitude as packet transmission times. For this reason, the mathematical models developed for Contention-Free and Contention-Based protocols take into account the propagation delay. The main focus of this thesis is on the CSMA/CA protocol, which introduces channel
Style APA, Harvard, Vancouver, ISO itp.
43

Brose, Gerald. "Access control management in distributed object systems." [S.l. : s.n.], 2001. http://www.diss.fu-berlin.de/2001/203/index.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Porter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Boström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.

Pełny tekst źródła
Streszczenie:
<p>In the area of computer network security, standardization work has been conducted for several years. However, the sub area of access control and authorization has so far been left out of major standardizing. </p><p>This thesis explores the ongoing standardization for access control and authorization. In addition, areas and techniques supporting access control are investigated. Access control in its basic forms is described to point out the building blocks that always have to be considered when an access policy is formulated. For readers previously unfamiliar with network security a number o
Style APA, Harvard, Vancouver, ISO itp.
46

Qazi, Hasham Ud Din. "Comparative Study of Network Access Control Technologies." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.

Pełny tekst źródła
Streszczenie:
<p>This thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s Unified Access Control, Microsoft Corp.’s Network Access Protection, and Cisco Systems Inc.’s Network Admission Control. NAC is a vision, which utilizes existing solutions and new technologies to provide assurance that any device connecting to a network policy domain is authenticated and is subject to the network’s policy enforcement. Non-compliant devices are isolated until they have been brought back to a complaint sta
Style APA, Harvard, Vancouver, ISO itp.
47

Stenbakk, Bjørn-Erik Sæther, and Gunnar René Øie. "Role-Based Information Ranking and Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9236.

Pełny tekst źródła
Streszczenie:
<p>This thesis presents a formal role-model based on a combination of approaches towards rolebased access control. This model is used both for access control and information ranking. Purpose: Healthcare information is required by law to be strictly secured. Thus an access control policy is needed, especially when this information is stored in a computer system. Roles, instead of just users, have been used for enforcing access control in computer systems. When a healthcare employee is granted access to information, only the relevant information should be presented by the system, providing bette
Style APA, Harvard, Vancouver, ISO itp.
48

Garnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.

Pełny tekst źródła
Streszczenie:
<p>Large data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, comput
Style APA, Harvard, Vancouver, ISO itp.
49

Zhuo, Donghui. "On Fine-Grained Access Control for XML." Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1058.

Pełny tekst źródła
Streszczenie:
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification algorithm is correct under a language-independent semantics for secure query evaluation. The second problem is to provide a compact, yet useful, representation of the access matrix. Since determi
Style APA, Harvard, Vancouver, ISO itp.
50

Beznosov, Konstantin. "Engineering access control for distributed enterprise applications." FIU Digital Commons, 2000. http://digitalcommons.fiu.edu/etd/1651.

Pełny tekst źródła
Streszczenie:
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of A
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!