Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Authorizations.

Rozprawy doktorskie na temat „Authorizations”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Authorizations”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Firman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.

Pełny tekst źródła
Streszczenie:
The significant increase in mobile data traffc has put a considerable load on the wireless mobile networks. In the current highly competitive market, Mobile Network Operators (MNOs) have to strive to provide additional capacityof their network, by also considering the cost factor to make their business sustainable. Along with advances in spectrum-efficient technologies, small cells deployment have provided cost-efficient methods to provide additional capacity for indoor and outdoor subscribers. The gain of better spectrum utilization and opportunistic spectrum access have motivated the deploym
Style APA, Harvard, Vancouver, ISO itp.
4

Ruan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.

Pełny tekst źródła
Streszczenie:
Access control is a significant issue in any secure computer system. Authorization models provide a formalism and framework for specifying and evaluating access control policies that determine how access is granted and delegated among particular users. The aim of this dissertation is to investigate flexible decentralized authorization model supporting authorization delegation, both positive and negative authorization, and conflict resolution. A graph based authorization framework is proposed which can support authorization delegations and both positive and negative authorizations. In particula
Style APA, Harvard, Vancouver, ISO itp.
5

Pachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.

Pełny tekst źródła
Streszczenie:
The purpose of the author in this article is to outline the main licenses regarding mineral exploration and publicize the usual paperwork and contingencies obtaining these permits.It also presents alternatives to traditional procedures, which are more useful in practice to expedite to start of mining exploration activities in Peru.<br>El fin del autor en este artículo es hacer un esbozo de los principales títulos habilitantes para lo referente a la exploración minera, así como dar a conocer los trámites y usuales contingencias que acarrean la obtención de estos permisos. Asimismo, se presentan
Style APA, Harvard, Vancouver, ISO itp.
6

Crampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Humenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.

Pełny tekst źródła
Streszczenie:
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. The authorization process in enterprise systems follow the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those decisions. The two advantages of this model are (1) the separation between the application and authorization logic (2) reduction of authorization policy administration. However, the authorization proces
Style APA, Harvard, Vancouver, ISO itp.
9

Cabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.

Pełny tekst źródła
Streszczenie:
Social Web of Things (SWoT) is a user centric framework which facilitates interaction between software agents deployed on smart things and in the cloud. Software agents deployed on smart things are remotely accessible, host sensitive resources, and often represent high value targets. SWoT currently does not feature adequate security mechanisms which could protect software agents from unauthorized access. In this thesis, we aim to rectify this deficiency by introducing platform independent, exible, and user centric authorization mechanism inSWoT. We derive requirements and design of abstract au
Style APA, Harvard, Vancouver, ISO itp.
10

Björkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.

Pełny tekst źródła
Streszczenie:
Access control is the central element of computer security and its principal objectives are to implement secure authentication and authorization in a system. Authentication is the verification that the credentials of a user are valid and authorization is the granting of permissions to a user to access system resources. This thesis describes the design and implementation of an authorization plugin, calledFile Authorization Manager, for WordPress built upon an already existing authentication plugin, called privateContent. Due to various factors mentioned in the thesis the implementation of said
Style APA, Harvard, Vancouver, ISO itp.
11

Odyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.

Pełny tekst źródła
Streszczenie:
This work introduces the available authorization frameworks for the purpose of Single Sign-On functionality within an enterprise, along with the fundamental technicalities. The focus of the work is on SAML 2.0 and OAuth 2.0 frame- works. Following the details related to available protocol flows, supported client profiles and security considerations, the two frameworks are compared in accordance with a set of factors given in a criteria. The report discusses the possibilities provided by a Microsoft Windows based infrastructure, as well as different scenarios and their feasibility in an enterpr
Style APA, Harvard, Vancouver, ISO itp.
12

Taskazan, Feyza. "Use Of Pki For Process Authorization." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/1219203/index.pdf.

Pełny tekst źródła
Streszczenie:
Enterprises require an information security solution that provides privacy, integrity, authentication and access controls for processes. License management systems are developed to be a solution for process authorization in different platforms. However, security threats on processes cannot be controlled with existing license management mechanisms. The need is a complete system that is independent from implementation, platform, and application. In this thesis, we design a complete system for process authorization based on Public Key Infrastructure (PKI) technology.
Style APA, Harvard, Vancouver, ISO itp.
13

Lin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

James, Malcolm. "The authorization and glorification of plunder." Thesis, Cardiff Metropolitan University, 2015. http://hdl.handle.net/10369/7570.

Pełny tekst źródła
Streszczenie:
Research in taxation often treats it as a branch of law or economics, but in this thesis I argue that this obscures the fact that tax systems are not based on scientific, techno-rational principles, but are socially constructed phenomena, embodying fundamental, value-based decisions imbricated in power relationships. I demonstrate that throughout history tax systems have reflected the prevailing state form and the dominant power relationships underpinning them and that we are currently living in a neoliberal state, in which societal relations are determined by economic principles. I therefore
Style APA, Harvard, Vancouver, ISO itp.
15

Lui, W. C. "Security models for authorization, delegation and accountability." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32053745.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Hakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.

Pełny tekst źródła
Streszczenie:
The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology shift introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists.
Style APA, Harvard, Vancouver, ISO itp.
17

Lui, W. C., and 雷永祥. "Security models for authorization, delegation and accountability." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32053745.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

李妙轉. "論行政授權 =Administrative authorization". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3534548.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Siebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.

Pełny tekst źródła
Streszczenie:
The purpose of this thesis is to investigate the implementation of digital authorization for computer systems, specifically how to implement an efficient and secure authorization engine that uses policies and attributes to calculate authorization. The architecture for the authorization engine is discussed, the efficiency of the engine is characterized by various tests, and the security model is reviewed against other presently existing models. The resulting efforts showed an increase in efficiency of almost two orders of magnitude, along with a reduction in the amount of processing power req
Style APA, Harvard, Vancouver, ISO itp.
20

Calzavara, Stefano <1985&gt. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.

Pełny tekst źródła
Streszczenie:
La tesi affronta il problema della verifica e dell'imposizione di politiche di autorizzazione tramite tecniche di analisi statica. I contributi principali sono tre: una semantica formale per grsecurity, che permette di validare in modo efficiente una serie di proprietà di sicurezza desiderabili per una gestione degli accessi basata su ruoli; un'estensione di RCF basata su logica affine per garantire il rispetto di espressive politiche di autorizzazione relative all'utilizzo di risorse; una metodologia di verifica per applicazioni Android atta a garantire una forma di controllo degli accessi pr
Style APA, Harvard, Vancouver, ISO itp.
21

De, Young Paul. "Effect of Medicaid prior authorization on drug utilization." CONNECT TO ELECTRONIC THESIS, 2007. http://dspace.wrlc.org/handle/1961/4249.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Witt, Lucas D. "A formal approach toward authenticated authorization without identification." [Ames, Iowa : Iowa State University], 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Chaudhary, Nadeem. "Optimizing performance of workflow executions under authorization control." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59642/.

Pełny tekst źródła
Streszczenie:
“Business processes or workflows are often used to model enterprise or scientific applications. It has received considerable attention to automate workflow executions on computing resources. However, many workflow scenarios still involve human activities and consist of a mixture of human tasks and computing tasks. Human involvement introduces security and authorization concerns, requiring restrictions on who is allowed to perform which tasks at what time. Role- Based Access Control (RBAC) is a popular authorization mechanism. In RBAC, the authorization concepts such as roles and permissions ar
Style APA, Harvard, Vancouver, ISO itp.
24

Donchevskaya, E. "REACH (Registration, Evaluation, Authorization and Restriction of Chemicals)." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/13426.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Hamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of California, San Diego, 2009.<br>Title from first page of PDF file (viewed January 9, 2009). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 94-97).
Style APA, Harvard, Vancouver, ISO itp.
26

Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.

Pełny tekst źródła
Streszczenie:
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
Style APA, Harvard, Vancouver, ISO itp.
28

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1438/1/PhD-Thesis_AnhTuanTruong.pdf.

Pełny tekst źródła
Streszczenie:
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
Style APA, Harvard, Vancouver, ISO itp.
29

Boussemart, Déborah. "La sécurisation des permis de construire contre les recours abusifs." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB124/document.

Pełny tekst źródła
Streszczenie:
La présente thèse s'intéresse à la systématisation des menaces d'annulation des permis de construire. Elle a pour objet d'analyser la réalité des recours abusifs devant le juge administratif français. Le phénomène de multiplication des recours abusifs pose le problème de l'instrumentalisation du juge par des requérants malveillants. Cette instrumentalisation transforme le prétoire en une sorte de marché juridictionnel et se traduit en pratique par des coûts contentieux et transactionnels de plus en plus lourds pour les bénéficiaires d'autorisation d'urbanisme. Des instruments de régulation pro
Style APA, Harvard, Vancouver, ISO itp.
30

Lamotte-Schubert, Manuel [Verfasser], and Christoph [Akademischer Betreuer] Weidenbach. "Automatic authorization analysis / Manuel Lamotte-Schubert. Betreuer: Christoph Weidenbach." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2015. http://d-nb.info/1077211538/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Chatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Fernández, Alexis Martínez. "Authorization schema for electronic health-care records : For Uganda." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101165.

Pełny tekst źródła
Streszczenie:
This master’s thesis project began at the Karolinska University Hospital. This thesis discusses how to design an authorization schema focused on ensuring each patient’s data privacy within a hospital information system. It begins with an overview of the current problem, followed by a review of related work. The overall project’s goal is to create and evaluate an authorization schema that can ensure each patient’s data confidentiality. Authorization has currently become a very important aspect in information systems, to the point of being a necessity when implementing a complete system for mana
Style APA, Harvard, Vancouver, ISO itp.
33

Jacobs, David. "An XML Based Authorization Framework for Web-based Applications." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/607.

Pełny tekst źródła
Streszczenie:
The World Wide Web is increasingly being used to deliver services. The file based authorization schemes originally designed into web servers are woefully inadequate for enforcing the security policies needed by these services. This has led to the chaotic situation where each application is forced to develop its own security framework for enforcing the policies it requires. In tum, this has led to more numerous security vulnerabilities and greater maintenance headaches. This dissertation lays out an authorization framework that enforces a wide range of security policies crucial to many web-base
Style APA, Harvard, Vancouver, ISO itp.
34

ROSENDO, Daniel. "A high-level authorization framework for software-defined networks." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25356.

Pełny tekst źródła
Streszczenie:
Submitted by Pedro Barros (pedro.silvabarros@ufpe.br) on 2018-08-01T19:37:51Z No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Daniel Rosendo.pdf: 3709439 bytes, checksum: cfcbfd0960c6e9bae38ba5ff1dc7d748 (MD5)<br>Approved for entry into archive by Alice Araujo (alice.caraujo@ufpe.br) on 2018-08-02T20:45:49Z (GMT) No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Daniel Rosendo.pdf: 3709439 bytes, checksum: cfcbfd0960c6e9bae38ba5ff1dc7d748 (MD5)<br>Made available in DSpace on 2018-0
Style APA, Harvard, Vancouver, ISO itp.
35

Lorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.

Pełny tekst źródła
Streszczenie:
Computational grids and other heterogeneous, large-scale distributed systems require more powerful and more flexible authorization mechanisms to realize fine-grained access-control of resources. Computational grids are increasingly used for collaborative problem-solving and advanced science and engineering applications. Usage scenarios for advanced grids require support for small, dynamic working groups, direct delegation of access privileges among users, procedures for establishing trust relationships without requiring organizational level agreements, precise management by individuals of thei
Style APA, Harvard, Vancouver, ISO itp.
36

Tran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.

Pełny tekst źródła
Streszczenie:
Microservices have emerged as an attractive alternative to more classical monolithic software application architectures. Microservices provides many benefits that help with code base comprehension, deployability, testability, and scalability. As the Information technology (IT) industry has grown ever larger, it makes sense for the technology giants to adopt the microservice architecture to make use of these benefits. However, with new software solutions come new security vulnerabilities, especially when the technology is new and vulnerabilities are yet to be fully mapped out. Authentication an
Style APA, Harvard, Vancouver, ISO itp.
37

Mohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.

Pełny tekst źródła
Streszczenie:
The proposed research is in the area of attribute-based authorization systems. We address two specific research problems in this area. First, evaluating authorization policies in multi-authority systems where there are multiple stakeholders in the disclosure of sensitive data. The research proposes to consider all the relevant policies related to authorization in real time upon the receipt of an access request and to resolve any differences that these individual policies may have in authorization. Second, to enable a lot of entities to participate in the authorization process by asserting attr
Style APA, Harvard, Vancouver, ISO itp.
38

Bai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Pełny tekst źródła
Streszczenie:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the
Style APA, Harvard, Vancouver, ISO itp.
39

Ciordas, Ionut Ovidiu. "Fine-grained authorization in the Great Plains network virtual organization." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4967.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on January 3, 2008) Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
40

Wei, Qiang. "Towards improving the availability and performance of enterprise authorization systems." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/13853.

Pełny tekst źródła
Streszczenie:
Authorization protects application resources by allowing only authorized entities to access them. Existing authorization solutions are widely based on the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those decisions. This model enables sharing the decision point as an authorization service across multiple applications. But, with many requests and resources, using a remote shared decision point leads to increased latency and presents the risk of introducing a bottleneck
Style APA, Harvard, Vancouver, ISO itp.
41

Aas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.

Pełny tekst źródła
Streszczenie:
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization and authentication on mobile devices. However, recent critics have claimed that OAuth does not provide sufficient security or ease-of-use for developers on mobile devices. In this thesis, I study four approaches to mobile authorization using OAuth 2.0, and suggest an improved solution based on current industry best-practices for security on Android. The end result is a solution which provides a native authorization flow for third-party developers to integrate with an existing API endpoint. However, the th
Style APA, Harvard, Vancouver, ISO itp.
42

Dasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.

Pełny tekst źródła
Streszczenie:
Since computers are relied upon to run critical infrastructures – from nuclear power plants to electronic battlefield simulations – the concept of a “trusted” or tamperproof system has become even more important. Some applications have become so critical that it is imperative that they run as intended, without interference. The consequences of these systems not running as intended could be catastrophic. This research offers a solution for a key element for protecting these critical servers – validating process invocation sequences. The purpose of this research is to increase operating sys
Style APA, Harvard, Vancouver, ISO itp.
44

Whitehead, Nathan. "Combining reason and authority for authorization of proof-carrying code /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2008. http://uclibs.org/PID/11984.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Wang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Pełny tekst źródła
Streszczenie:
Logic programming with answer set semantics has been considered appealing rule-based formalism language and applied in information security areas. In this thesis, we investigate the problems of authorization in distributed environments and security protocol verification and update. Authorization decisions are required in large-scale distributed environments, such as electronic commerce, remote resource sharing, etc. We adopt the trust management approach, in which authorization is viewed as a ‘proof of compliance" problem. We develop an authorization language AL with non-monotonic feature as t
Style APA, Harvard, Vancouver, ISO itp.
46

Wang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.) -- University of Western Sydney, 2008.<br>A thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
Style APA, Harvard, Vancouver, ISO itp.
47

Bai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Pełny tekst źródła
Streszczenie:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the
Style APA, Harvard, Vancouver, ISO itp.
48

Caddick, Andrew Brian. "Critical review of the quality of environmental authorizations in South Africa / Andrew Brian Caddick." Thesis, 2015. http://hdl.handle.net/10394/14480.

Pełny tekst źródła
Streszczenie:
This dissertation critically reviews the quality of South African environmental authorisations through the application of a methodology adopted from the Lee and Colley (1999) environmental impact assessment (EIA) report review package. The literature review shows that to date limited research has been conducted on the quality of environmental authorisations nationally. Anecdotal evidence suggests that environmental authorisations are of weak quality; hence the development of guidelines on the compilation of environmental authorisations by the Department of Environmental Affairs (DEA). In this
Style APA, Harvard, Vancouver, ISO itp.
49

Ruan, Chun. "Models for authorization and conflict resolution." Thesis, 2003. http://handle.uws.edu.au:8081/1959.7/546.

Pełny tekst źródła
Streszczenie:
Access control is a significant issue in any secure computer system. Authorization models provide a formalism and framework for specifying and evaluating access control policies that determine how access is granted and delegated among particular users. The aim of this dissertation is to investigate flexible decentralized authorization model supporting authorization delegation, both positive and negative authorization, and conflict resolution. A graph based authorization framework is proposed which can support authorization delegations and both positive and negative authorizations. In particula
Style APA, Harvard, Vancouver, ISO itp.
50

Narula, Pornthep. "Authorization management framework." 2002. http://hdl.handle.net/1993/21422.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!