Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: User Access Control.

Rozprawy doktorskie na temat „User Access Control”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „User Access Control”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Pełny tekst źródła
Streszczenie:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UB
Style APA, Harvard, Vancouver, ISO itp.
2

Qiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.

Pełny tekst źródła
Streszczenie:
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0)
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.

Pełny tekst źródła
Streszczenie:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 55-60).<br>Modern web services rob users of low-level control over cloud storage; a user's single logical data set is scattered across multiple storage silos whose access controls are set by the web services, not users. The res
Style APA, Harvard, Vancouver, ISO itp.
4

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Pełny tekst źródła
Streszczenie:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we fo
Style APA, Harvard, Vancouver, ISO itp.
6

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Pełny tekst źródła
Streszczenie:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart
Style APA, Harvard, Vancouver, ISO itp.
7

Beattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.

Pełny tekst źródła
Streszczenie:
This thesis examines the informational needs of historians researching women as a subject in archives. The research methodology employed combines two types of user studies, the questionnaire and the reference analysis, in order to determine both the use and usefulness of archival materials and finding aids for historians researching women. This study begins with an overview of the literature on user studies. The thesis then outlines both the kinds of materials and the information historians researching women require. Finally, this study looks at the way historians researching women locate rele
Style APA, Harvard, Vancouver, ISO itp.
8

Bhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 99. Thesis directors: Ravi Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 94-98). Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
9

Maw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further d
Style APA, Harvard, Vancouver, ISO itp.
10

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Pełny tekst źródła
Streszczenie:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
Style APA, Harvard, Vancouver, ISO itp.
11

Ali, Waqas Liaqat. "Securing Safebook : Secure Data Access Control and Key Management for Safebook." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-126987.

Pełny tekst źródła
Streszczenie:
Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. This has raised concerns about how the users’ contents are protected and how the privacy of users is preserved by the service providers. Moreover, current social networks have been subject to much criticism over their privacy settings and access control mechanism. The providers own the users’ contents and these contents
Style APA, Harvard, Vancouver, ISO itp.
12

Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code." Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.

Pełny tekst źródła
Streszczenie:
This thesis evaluates the use of a loadtime metaobject protocol as a practical mechanism for enforcing access control policies upon applications distributed as user-level compiled code. Enforcing access control policies upon user-level compiled code is necessary because there are many situations where users are vulnerable to security breaches because they download and run potentially untrustworthy applications provided in the form of user-level compiled code. These applications might be distributed applications so access control for both local and distributed resources is required. Examples of
Style APA, Harvard, Vancouver, ISO itp.
13

Zeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.

Pełny tekst źródła
Streszczenie:
Säkerhet och användbarhet beskrivs ofta som motpoler. I detta examensarbete så undersöks möjligheterna till att inkorporera både säkerhet och användbarhet i ett passagekontrollsgränssnitt. Forskningen är fokuserad på den del av passagekontrollen som benämns som händelseloggen. Loggens ändamål är att lagra och presentera information om händelser som sker i övervakade entréer. Syftet med forskningen är att undersöka i vilken utsträckning det är möjligt att implementera användarkrav och samtidigt uppfylla säkerhets- och användbarhetsheuristik. En klassisk interaktionsdesignsprocess utförs. Semi-s
Style APA, Harvard, Vancouver, ISO itp.
14

French, David James. "Understanding and Addressing Collaboration Challenges for the Effective Use of Multi-User CAD." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6229.

Pełny tekst źródła
Streszczenie:
Multi-user computer-aided design (CAD) is an emerging technology that promises to facilitate collaboration, enhance product quality, and reduce product development lead times by allowing multiple engineers to work on the same design at the same time. The BYU site of the NSF Center for e-Design has developed advanced multi-user CAD prototypes that have demonstrated the feasibility and value of this technology. Despite the possibilities that this software opens up for enhanced collaboration, there are now a new variety of challenges and opportunities to understand and address. For multi-user CAD
Style APA, Harvard, Vancouver, ISO itp.
15

Binbusayyis, Adel. "Achieving secure and efficient access control of personal health records in a storage cloud." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/achieving-secure-and-efficient-access-control-of-personal-health-records-in-a-storage-cloud(008e42d3-a620-4c10-af1b-d26715a1c014).html.

Pełny tekst źródła
Streszczenie:
A personal health record (PHR) contains health data about a patient, which is maintained by the patient. Patients may share their PHR data with a wide range of users such as healthcare providers and researchers through the use of a third party such as a cloud service provider. To protect the confidentiality of the data and to facilitate access by authorized users, patients use Attribute-Based Encryption (ABE) to encrypt the data before uploading it onto the cloud servers. With ABE, an access policy is defined based on users' attributes such as a doctor in a particular hospital, or a researcher
Style APA, Harvard, Vancouver, ISO itp.
16

Ma, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Georgia State University, 2007.<br>Title from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Style APA, Harvard, Vancouver, ISO itp.
17

Lachmund, Sven L. [Verfasser]. "Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition / Sven Lachmund." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009095412/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Petersson, Lantz Robert, and Andreas Alvarsson. "Creating access control maps and defining a security policy for a healthcare communication system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-121131.

Pełny tekst źródła
Streszczenie:
This report handles the creation of an access control map and the dening of asecurity policy for a healthcare communication system. An access control mapis a graphical way to describe the access controls of the subjects and objects ina system. We use a three step method to produce a graphical overview of theparts in the system, the interactions between them and the permissions of thesubjects. Regarding the security policy we create a read up and read down policylike the so called Ring policy, but adapt a write sideways approach. We alsoapply a mandatory access control which has a centralized a
Style APA, Harvard, Vancouver, ISO itp.
19

Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.

Pełny tekst źródła
Streszczenie:
Usage of locational data is getting more popular day by day. Location-aware application, context aware application and Ubiquities applications are some of the major categories of applications which are based on locational data. One of the most concerning issues regarding such applications is how to protect user’s privacy against malicious attackers. Failing in this task would result in a total failure for the project, considering how privacy concerns are getting more and more important for the end users. In this project, we will propose a theoretical solution for protecting user privacy in loc
Style APA, Harvard, Vancouver, ISO itp.
20

Monteleone, Salvatore. "Security and Privacy Policy Management in Dynamic and Context-Aware User-Centric Systems." Doctoral thesis, Università di Catania, 2014. http://hdl.handle.net/10761/1495.

Pełny tekst źródła
Streszczenie:
Considering user-centric systems, the problem of controlling the access to reserved resources is still open, especially due to the big amount of personal data generated every day by users. These data come primarily from mobile devices that became the main repository of personal information and source of user-generated contents as well as the principal controller of our social networked life. These data comes also from other connected devices of the everyday life, belonging to different domains (eg. in-car systems, TVs). In a multi-domain cross-platform scenario, in which web browsers represent
Style APA, Harvard, Vancouver, ISO itp.
21

Huang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Koriťák, Jan. "Automatická tvorba grafického rozhraní pro vzdálený přístup." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237075.

Pełny tekst źródła
Streszczenie:
This thesis explores the possibilities of abstraction of graphical user interface and automation of its design and development process at runtime. Emphasis is placed on possibility of remote control over computer network and accordingly on delegation of the interface creation on the human operated remote machine. The thesis analyzes contemporary approaches to and methods of interface generation. As a goal of the thesis a system for automatic user interface generation for remote applications was designed and implemented. The generation is based on specified data model.
Style APA, Harvard, Vancouver, ISO itp.
23

Butun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy resources and also restricted by the ad-hoc network operational environment. They pose unique challenges, due to limited power supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security appl
Style APA, Harvard, Vancouver, ISO itp.
24

Erpek, Tugba. "Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102705.

Pełny tekst źródła
Streszczenie:
This dissertation addresses multi-layer optimization aspects of multiple input multiple output (MIMO) and deep learning-based communication systems. The initial focus is on the rate optimization for multi-user MIMO (MU-MIMO) configurations; specifically, multiple access channel (MAC) and interference channel (IC). First, the ergodic sum rates of MIMO MAC and IC configurations are determined by jointly integrating the error and overhead effects due to channel estimation (training) and feedback into the rate optimization. Then, we investigated methods that will increase the achievable rate fo
Style APA, Harvard, Vancouver, ISO itp.
25

Ntsham, Xolile. "Information flows in the social development grant process: a user experience perspective." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.

Pełny tekst źródła
Streszczenie:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Information Technology in the Faculty of Informatics and design at the Cape Peninsula University of Technology 2014<br>This study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an incr
Style APA, Harvard, Vancouver, ISO itp.
26

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Pełny tekst źródła
Streszczenie:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos com
Style APA, Harvard, Vancouver, ISO itp.
27

Fiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.

Pełny tekst źródła
Streszczenie:
Este trabalho investiga diferentes estratégias e técnicas de autenticação de usuários visando determinar quais podem ser integradas em um ambiente de educação a distância. Diversas soluções de autenticação existentes no mercado foram analisadas para se determinar as mais adequadas. Buscou-se as soluções consideradas factíveis de utilização, seja pelo custo ou quantidade de equipamentos extras envolvidos, seja pela simplicidade operacional ou pelo grau de certeza das medidas efetuadas. A partir desta análise foi delineado um modelo de autenticação que integra várias técnicas de autenticação a f
Style APA, Harvard, Vancouver, ISO itp.
28

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Pełny tekst źródła
Streszczenie:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks--
Style APA, Harvard, Vancouver, ISO itp.
29

Misra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.

Pełny tekst źródła
Streszczenie:
Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy problems faced by social media users can be categorized into institutional privacy (related to the social
Style APA, Harvard, Vancouver, ISO itp.
30

Salaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006/document.

Pełny tekst źródła
Streszczenie:
Cette thèse souhaite fournir des outils pour qu’un utilisateur puisse contribuer activement à la sécurité de son usage d’un système informatique. Les activités de sensibilités différentes d’un utilisateur nécessitent tout d’abord d’être cloisonnées dans des domaines dédiés, par un contrôle d’accès s’ajustant aux besoins de l’utilisateur. Afin de conserver ce cloisonnement, celui-ci doit être en mesure d’identifier de manière fiable les domaines avec lesquels il interagit, à partir de l’interface de sa machine. Dans une première partie, nous proposons un nouveau mécanisme de cloisonnement qui p
Style APA, Harvard, Vancouver, ISO itp.
31

Salaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006.

Pełny tekst źródła
Streszczenie:
Cette thèse souhaite fournir des outils pour qu’un utilisateur puisse contribuer activement à la sécurité de son usage d’un système informatique. Les activités de sensibilités différentes d’un utilisateur nécessitent tout d’abord d’être cloisonnées dans des domaines dédiés, par un contrôle d’accès s’ajustant aux besoins de l’utilisateur. Afin de conserver ce cloisonnement, celui-ci doit être en mesure d’identifier de manière fiable les domaines avec lesquels il interagit, à partir de l’interface de sa machine. Dans une première partie, nous proposons un nouveau mécanisme de cloisonnement qui p
Style APA, Harvard, Vancouver, ISO itp.
32

Kelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.

Pełny tekst źródła
Streszczenie:
For the past 70 years, the Federal Communications Commission (FCC) has been the licensing authority for wireless spectrum. Traditionally, spectrum was commercially licensed to primary users with defined uses. With the growth of personal communication systems in the 1990''s, unallocated spectrum has become a scarce commodity. However, since most primary users are active only at certain times and places, much of the allocated spectrum remains underutilized. Substantial holes exist in the spatio-temporal spectrum that could be opportunistically used by unlicensed secondary users. As a result, the
Style APA, Harvard, Vancouver, ISO itp.
33

Friedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.

Pełny tekst źródła
Streszczenie:
The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and profe
Style APA, Harvard, Vancouver, ISO itp.
34

Azad, Md Saiful. "Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3423364.

Pełny tekst źródła
Streszczenie:
The journey of underwater communication which began from Leonardo’s era took four and a half centuries to find practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assi
Style APA, Harvard, Vancouver, ISO itp.
35

Farietta, Thalia Paola. "Trends in US Youth Tobacco Use, Access and Media Exposure from 2004 to 2011." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1374069945.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Hirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Zhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.

Pełny tekst źródła
Streszczenie:
This thesis describes scenarios in which a mobile user needs various services, such as Internet telephony, secure printing and online data services in a number of places. From these scenarios we summarize the requirements for quality of service control, service discovery, user authentication and authorization, service access control, and user privacy. In order to implement a prototype to support service discovery, we studied different technologies including Bluetooth, Jini, and Web Services. SDPtool from BlueZ was chosen to limit the search range within the user's local area while using minima
Style APA, Harvard, Vancouver, ISO itp.
39

Persson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.

Pełny tekst źródła
Streszczenie:
Today, companies are spending millions of dollars on cybersecurity, but compromised systems and stealing sensitive information are still huge problems. Protecting sensitive information has always been of vital importance. However, the struggle today is that digital information can be distributed to an endless amount of users, everywhere in the world. Security solutions today focus on role-based access control and "the principle of the least privilege". They can affect the productivity of employees, which is also a key aspect to be considered when it comes to security. Privilege users are the o
Style APA, Harvard, Vancouver, ISO itp.
40

Reuben, Jenni. "Privacy-aware Use of Accountability Evidence." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48550.

Pełny tekst źródła
Streszczenie:
This thesis deals with the evidence that enable accountability, the privacy risks involved in using them and a privacy-aware solution to the problem of unauthorized evidence disclosure.  Legal means to protect privacy of an individual is anchored on the data protection perspective i.e., on the responsible collection and use of personal data. Accountability plays a crucial role in such legal privacy frameworks for assuring an individual’s privacy. In the European context, accountability principle is pervasive in the measures that are mandated by the General Data Protection Regulation. In genera
Style APA, Harvard, Vancouver, ISO itp.
41

Cook, Donovan W. "The effect of computer use and Logo instruction on third and fourth grade students' perceived control." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/50000.

Pełny tekst źródła
Streszczenie:
In this study, the effect of computer use and Logo instruction on students' perceived control of computers and generalized perceived control was examined. Third and fourth grade students (<u>N</u>=90) in four intact groups, consisting of one treatment and one control group for each grade level, were pre- and posttested, using the computer control survey (CCS) and the Chi1dren's Nowicki-Strickland Locus of Control Scale (CNS-IE). A posttest measure of Logo achievement was obtained from the treatment students. Three way analyses of covariance, using the pretest scores as the covariate, were use
Style APA, Harvard, Vancouver, ISO itp.
42

Casali, Sherry Perdue. "An empirically developed system for the selection of input devices for users with physical disabilities." Diss., This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-07282008-134932/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

van, Coppenhagen Robert Lindenberg, and robert vancoppenhagen@dsto defence gov au. "On the Coordinated Use of a Sleep Mode in Wireless Sensor Networks: Ripple Rendezvous." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.145741.

Pełny tekst źródła
Streszczenie:
It is widely accepted that low energy consumption is the most important requirement when designing components and systems for a wireless sensor network (WSN). The greatest energy consumer of each node within a WSN is the radio transceiver and as such, it is important that this component be used in an extremely energy e±cient manner. One method of reducing the amount of energy consumed by the radio transceiver is to turn it off and allow nodes to enter a sleep mode. The algorithms that directly control the radio transceiver are traditionally grouped into the Medium Access Control
Style APA, Harvard, Vancouver, ISO itp.
44

Kgomotso, Phemo Karen. "Global environmental agreements and local livelihoods : how the internationalisation of environmental resources shapes access to and control over wetland resources in the Okavango Delta, Botswana." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/38451/.

Pełny tekst źródła
Streszczenie:
This thesis examines how global environmental crisis narratives and discourses have influenced environmental policy and practice in conservation programmes for the Okavango Delta, Botswana. In particular, it highlights the contested nature of biodiversity conservation and the embedded power relations in the framing, definition and crafting of solutions to the problem of biodiversity degradation at local, national and international levels. The thesis therefore examines, based on these framings, the consequences of global environmental agreements, such as the Ramsar Convention and the UN Convent
Style APA, Harvard, Vancouver, ISO itp.
45

Ngomane, Thandi Susan. "Land as an economic empowerment tool: access, control and ownership of land by rural women in the Mpumalanga Province,South Africa." Thesis, University of Limpopo, 2016. http://hdl.handle.net/10386/1614.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Alemany, Bordera José. "Measures of Privacy Protection on Social Environments." Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.

Pełny tekst źródła
Streszczenie:
[EN] Nowadays, online social networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. Social networks are an ideal environment for generating all kinds of social benefits for users. Users share experiences, keep in touch with their family, friends and acquaintances, and earn economic benefits from the power of their influence (which is translated into new job opportunities). However, the use of social networks and the action of sharing information imply the loss of the users’ privacy. Recently, a great interest in protecting the privacy of users has em
Style APA, Harvard, Vancouver, ISO itp.
47

Muhammad, Murtala. "Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of steerable directional antenna." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/46756/.

Pełny tekst źródła
Streszczenie:
Energy efficiency contributes to the survival of nodes in Mobile Ad Hoc Networks (MANETs). The use of directional antennas can conserve energy due to the increased gain and directed transmission towards specific point in space. Directional antennas also resolve many issues associated with interference from different points within the network. Despite the vast body of work in this area, research on the way directional antennas access the wireless medium specific to Ultra-WideBand (UWB) systems have not gained wide attention. The aim of this research is to design, implement and test an improved
Style APA, Harvard, Vancouver, ISO itp.
48

Boushaki, Mohamed Nassim. "Optimisation de la conception et commande de robot à tubes concentriques pour la chirurgie laparoscopique par accès unique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT294/document.

Pełny tekst źródła
Streszczenie:
Les robots à tubes concentriques deviennent de plus en plus populaires dans la communauté de la robotique médicale. Dans cette thèse, un état de l’art général des travaux existants et qui couvre les thématiques de recherche en robots à tubes concentriques (RTC) est présenté dans un premier temps. Les modélisations géométrique (directe et inverse) et cinématique des RTC sont détaillées car elles servent de base pour les contributions de cette thèse. La première contribution consiste en une étude de concept d’utilisation des RTCs pour la résection des tumeurs profondes situées au niveau du lobe
Style APA, Harvard, Vancouver, ISO itp.
49

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Pełny tekst źródła
Streszczenie:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
Style APA, Harvard, Vancouver, ISO itp.
50

Chen, Chern-Muh, and 陳春木. "Access Control Systems with User Authentication." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83409934126622114655.

Pełny tekst źródła
Streszczenie:
碩士<br>東吳大學<br>資訊科學系<br>91<br>It is necessary to appropriately manage the computer system resources that are only accessed by the authorized users. The servers use the user’s identifier and password for user authentication, and achieve the purpose of access control. The computer system environment of single machine operation is simple and easy to maintain, and its user has complete access right of all files. As the network is quick growth, some computer systems do not operate by alone, and they are linked to be a distributed computer system, in which the users can access the data by a remote co
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!