Rozprawy doktorskie na temat „User Access Control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „User Access Control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Pełny tekst źródłaQiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.
Pełny tekst źródłaWang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.
Pełny tekst źródłaLow, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Pełny tekst źródłaChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Pełny tekst źródłaShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Pełny tekst źródłaBeattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.
Pełny tekst źródłaBhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.
Pełny tekst źródłaMaw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.
Pełny tekst źródłaDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Pełny tekst źródłaAli, Waqas Liaqat. "Securing Safebook : Secure Data Access Control and Key Management for Safebook." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-126987.
Pełny tekst źródłaWelch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code." Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.
Pełny tekst źródłaZeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.
Pełny tekst źródłaFrench, David James. "Understanding and Addressing Collaboration Challenges for the Effective Use of Multi-User CAD." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6229.
Pełny tekst źródłaBinbusayyis, Adel. "Achieving secure and efficient access control of personal health records in a storage cloud." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/achieving-secure-and-efficient-access-control-of-personal-health-records-in-a-storage-cloud(008e42d3-a620-4c10-af1b-d26715a1c014).html.
Pełny tekst źródłaMa, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Pełny tekst źródłaLachmund, Sven L. [Verfasser]. "Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition / Sven Lachmund." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009095412/34.
Pełny tekst źródłaPetersson, Lantz Robert, and Andreas Alvarsson. "Creating access control maps and defining a security policy for a healthcare communication system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-121131.
Pełny tekst źródłaChini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.
Pełny tekst źródłaMonteleone, Salvatore. "Security and Privacy Policy Management in Dynamic and Context-Aware User-Centric Systems." Doctoral thesis, Università di Catania, 2014. http://hdl.handle.net/10761/1495.
Pełny tekst źródłaHuang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.
Pełny tekst źródłaKoriťák, Jan. "Automatická tvorba grafického rozhraní pro vzdálený přístup." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237075.
Pełny tekst źródłaButun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.
Pełny tekst źródłaErpek, Tugba. "Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102705.
Pełny tekst źródłaNtsham, Xolile. "Information flows in the social development grant process: a user experience perspective." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.
Pełny tekst źródłaRibeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.
Pełny tekst źródłaFiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.
Pełny tekst źródłaChen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Pełny tekst źródłaMisra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.
Pełny tekst źródłaSalaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006/document.
Pełny tekst źródłaSalaün, Mickaël. "Intégration de l’utilisateur au contrôle d’accès : du processus cloisonné à l’interface homme-machine de confiance." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0006.
Pełny tekst źródłaKelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.
Pełny tekst źródłaFriedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.
Pełny tekst źródłaAzad, Md Saiful. "Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3423364.
Pełny tekst źródłaFarietta, Thalia Paola. "Trends in US Youth Tobacco Use, Access and Media Exposure from 2004 to 2011." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1374069945.
Pełny tekst źródłaHirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.
Pełny tekst źródłaLaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Pełny tekst źródłaZhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.
Pełny tekst źródłaPersson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.
Pełny tekst źródłaReuben, Jenni. "Privacy-aware Use of Accountability Evidence." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48550.
Pełny tekst źródłaCook, Donovan W. "The effect of computer use and Logo instruction on third and fourth grade students' perceived control." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/50000.
Pełny tekst źródłaCasali, Sherry Perdue. "An empirically developed system for the selection of input devices for users with physical disabilities." Diss., This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-07282008-134932/.
Pełny tekst źródłavan, Coppenhagen Robert Lindenberg, and robert vancoppenhagen@dsto defence gov au. "On the Coordinated Use of a Sleep Mode in Wireless Sensor Networks: Ripple Rendezvous." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.145741.
Pełny tekst źródłaKgomotso, Phemo Karen. "Global environmental agreements and local livelihoods : how the internationalisation of environmental resources shapes access to and control over wetland resources in the Okavango Delta, Botswana." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/38451/.
Pełny tekst źródłaNgomane, Thandi Susan. "Land as an economic empowerment tool: access, control and ownership of land by rural women in the Mpumalanga Province,South Africa." Thesis, University of Limpopo, 2016. http://hdl.handle.net/10386/1614.
Pełny tekst źródłaAlemany, Bordera José. "Measures of Privacy Protection on Social Environments." Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.
Pełny tekst źródłaMuhammad, Murtala. "Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of steerable directional antenna." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/46756/.
Pełny tekst źródłaBoushaki, Mohamed Nassim. "Optimisation de la conception et commande de robot à tubes concentriques pour la chirurgie laparoscopique par accès unique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT294/document.
Pełny tekst źródłaScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Pełny tekst źródłaChen, Chern-Muh, and 陳春木. "Access Control Systems with User Authentication." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83409934126622114655.
Pełny tekst źródła