Rozprawy doktorskie na temat „Authorizations”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Authorizations”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Pełny tekst źródłaLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Pełny tekst źródłaFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Pełny tekst źródłaRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Pełny tekst źródłaPachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Pełny tekst źródłaCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Pełny tekst źródłaHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Pełny tekst źródłaKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Pełny tekst źródłaCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Pełny tekst źródłaBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Pełny tekst źródłaOdyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.
Pełny tekst źródłaTaskazan, Feyza. "Use Of Pki For Process Authorization." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/1219203/index.pdf.
Pełny tekst źródłaLin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.
Pełny tekst źródłaJames, Malcolm. "The authorization and glorification of plunder." Thesis, Cardiff Metropolitan University, 2015. http://hdl.handle.net/10369/7570.
Pełny tekst źródłaLui, W. C. "Security models for authorization, delegation and accountability." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32053745.
Pełny tekst źródłaHakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.
Pełny tekst źródłaLui, W. C., and 雷永祥. "Security models for authorization, delegation and accountability." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32053745.
Pełny tekst źródła李妙轉. "論行政授權 =Administrative authorization". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3534548.
Pełny tekst źródłaSiebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.
Pełny tekst źródłaCalzavara, Stefano <1985>. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Pełny tekst źródłaDe, Young Paul. "Effect of Medicaid prior authorization on drug utilization." CONNECT TO ELECTRONIC THESIS, 2007. http://dspace.wrlc.org/handle/1961/4249.
Pełny tekst źródłaWitt, Lucas D. "A formal approach toward authenticated authorization without identification." [Ames, Iowa : Iowa State University], 2008.
Znajdź pełny tekst źródłaChaudhary, Nadeem. "Optimizing performance of workflow executions under authorization control." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59642/.
Pełny tekst źródłaDonchevskaya, E. "REACH (Registration, Evaluation, Authorization and Restriction of Chemicals)." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/13426.
Pełny tekst źródłaHamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.
Pełny tekst źródłaYao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.
Pełny tekst źródłaTruong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Pełny tekst źródłaTruong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1438/1/PhD-Thesis_AnhTuanTruong.pdf.
Pełny tekst źródłaBoussemart, Déborah. "La sécurisation des permis de construire contre les recours abusifs." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB124/document.
Pełny tekst źródłaLamotte-Schubert, Manuel [Verfasser], and Christoph [Akademischer Betreuer] Weidenbach. "Automatic authorization analysis / Manuel Lamotte-Schubert. Betreuer: Christoph Weidenbach." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2015. http://d-nb.info/1077211538/34.
Pełny tekst źródłaChatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Pełny tekst źródłaFernández, Alexis Martínez. "Authorization schema for electronic health-care records : For Uganda." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101165.
Pełny tekst źródłaJacobs, David. "An XML Based Authorization Framework for Web-based Applications." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/607.
Pełny tekst źródłaROSENDO, Daniel. "A high-level authorization framework for software-defined networks." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25356.
Pełny tekst źródłaLorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.
Pełny tekst źródłaTran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.
Pełny tekst źródłaMohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.
Pełny tekst źródłaBai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Pełny tekst źródłaCiordas, Ionut Ovidiu. "Fine-grained authorization in the Great Plains network virtual organization." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4967.
Pełny tekst źródłaWei, Qiang. "Towards improving the availability and performance of enterprise authorization systems." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/13853.
Pełny tekst źródłaAas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.
Pełny tekst źródłaDasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.
Pełny tekst źródłaDahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.
Pełny tekst źródłaWhitehead, Nathan. "Combining reason and authority for authorization of proof-carrying code /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2008. http://uclibs.org/PID/11984.
Pełny tekst źródłaWang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Pełny tekst źródłaWang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Pełny tekst źródłaBai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Pełny tekst źródłaCaddick, Andrew Brian. "Critical review of the quality of environmental authorizations in South Africa / Andrew Brian Caddick." Thesis, 2015. http://hdl.handle.net/10394/14480.
Pełny tekst źródłaRuan, Chun. "Models for authorization and conflict resolution." Thesis, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Pełny tekst źródłaNarula, Pornthep. "Authorization management framework." 2002. http://hdl.handle.net/1993/21422.
Pełny tekst źródła