Дисертації з теми "Access control decisions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-17 дисертацій для дослідження на тему "Access control decisions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Misra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.
Повний текст джерелаChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Повний текст джерелаMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Повний текст джерелаRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Giannakopoulos, Theophilos John. "Multi-Decision Policy and Policy Combinator Specifications." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/166.
Повний текст джерелаMetin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.
Повний текст джерелаenterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
Pacheco, Páramo Diego Felipe. "Performance analysis of access control and resource management methods in heterogeneous networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/34782.
Повний текст джерелаPerformance requirements on mobile networks are tighter than ever as a result of the adoption of mobile devices such as smartphones or tablets, and the QoS levels that mobile applications demand for their correct operation. The data traffic volume carried in mobile networks for 2012 is the same as the total internet traffic in 2000, and this exponential growth tendency will continue in years to come. In order to fulfill users¿ expectations, it is imperative for mobile networks to make the best use of the available resources. Heterogeneous networks (Hetnets) have the ability to integrate several technologies in a coherent and efficient manner in order to enhance users¿ experience. The first challenge of heterogeneous networks is to integrate several radio access technologies, which exist as a result of simultaneous technology developments and a paced replacement of legacy technology. A joint management of several RAT¿s enhances network¿s efficiency, and this influences user¿s experience. Another challenge of heterogeneous networks is the improvement of current macrocells through an efficient use of the electromagnetic spectrum. Some approaches aim to optimize the antennas or use higher-order modulation techniques, but a more disruptive approach is the use of dynamic spectrum techniques through a technology known as cognitive radio. Finally, heterogeneous networks should be able to integrate several layers. In addition to the well studied micro and pico cells, a new generation of cheaper and easily configurable small cell networks have been proposed. However, its success is attached to its ability to adapt to the current context of mobile networks.
Pacheco Páramo, DF. (2013). Performance analysis of access control and resource management methods in heterogeneous networks [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/34782
Alfresco
Abdallah, AbouSheaisha Abdallah Sabry. "Cross-layer Control for Adaptive Video Streaming over Wireless Access Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78844.
Повний текст джерелаPh. D.
Cowley, Stephen. "OH&S in small business : influencing the decision makers : the application of a social marketing model to increase the uptake of OHS risk control." University of Ballarat, 2006. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14590.
Повний текст джерелаDoctor of Philosphy
Ngo, Minh Hanh. "Cross-layer adaptive transmission scheduling in wireless networks." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/432.
Повний текст джерелаFriend, Daniel. "Cognitive Networks: Foundations to Applications." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26449.
Повний текст джерелаPh. D.
Arriola, Céspedes Inés Sofía. "Obstáculos en el acceso a la justicia de víctimas de violencia psicológica en el procedimiento de violencia familiar nacional ¿decisiones justas con enfoque de derechos humanos y de género? : análisis de casos con resolución de la Segunda Sala de Familia de Lima entre setiembre-diciembre 2011." Master's thesis, Pontificia Universidad Católica del Perú, 2014. http://tesis.pucp.edu.pe/repositorio/handle/123456789/5814.
Повний текст джерелаKardimis, Théofanis. "La chambre criminelle de la Cour de cassation face à l’article 6 de la Convention européenne des droits de l’homme : étude juridictionnelle comparée (France-Grèce)." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE3004.
Повний текст джерелаThe first party of the study is dedicated to the invocation of the right to a fair trial intra and extra muros and, on this basis, it focuses on the direct applicability of Article 6 and the subsidiarity of the Convention and of the European Court of Human Rights. Because of the fact that the right to a fair trial is a ‘‘judge-made law’’, the study also focuses on the invocability of the judgments of the European Court and more precisely on the direct invocability of the European Court’s judgment finding that there has been a violation of the Convention and on the request for an interpretation in accordance with the European Court’s decisions. The possibility of reviewing the criminal judgment made in violation of the Convention has generated a new right of access to the Court of cassation which particularly concerns the violations of the right to a fair trial and is probably the most important step for the respect of the right to a fair trial after enabling the right of individual petition. As for the weak conventional basis of the authority of res interpretata (“autorité de la chose interprétée”), this fact explains why an indirect dialogue between the ECHR and the Court of cassation is possible but doesn’t affect the applicant’s right to request an interpretation in accordance with the Court’s decisions and the duty of the Court of cassation to explain why it has decided to depart from the (non-binding) precedent.The second party of the study is bigger than the first one and is dedicated to the guarantees of the proper administration of justice (Article 6§1), the presumption of innocence (Article 6§2), the rights which find their conventional basis on the Article 6§1 but their logical explanation to the presumption of innocence and the rights of defence (Article 6§3). More precisely, the second party of the study is analyzing the right to an independent and impartial tribunal established by law, the right to a hearing within a reasonable time, the principle of equality of arms, the right to adversarial proceedings, the right of the defence to the last word, the right to a public hearing and a public pronouncement of the judgement, the judge’s duty to state the reasons for his decision, the presumption of innocence, in both its procedural and personal dimensions, the accused’s right to lie, his right to remain silent, his right against self-incrimination, his right to be informed of the nature and the cause of the accusation and the potential re-characterisation of the facts, his right to have adequate time and facilities for the preparation of the defence, including in particular the access to the case-file and the free and confidential communication with his lawyer, his right to appear in person at the trial, his right to defend either in person or through legal assistance, his right to be represented by his counsel, his right to free legal aid if he hasn’t sufficient means to pay for legal assistance but the interests of justice so require, his right to examine or have examined witnesses against him and to obtain the attendance and examination of witnesses on his behalf under the same conditions as witnesses against him and his right to the free assistance of an interpreter and to the translation of the key documents. The analysis is based on the decisions of the European Court of Human Rights and focuses on the position taken by the French and the Greek Court of Cassation (Areopagus) on each one of the above mentioned rights
You, Mingshan. "An Adaptive Machine Learning Framework for Access Control Decision Making." Thesis, 2022. https://vuir.vu.edu.au/43688/.
Повний текст джерелаLiao, Min-Shu, and 廖敏書. "Applying Fuzzy Multiple Criteria Decision Making to Evaluate Network Access Control System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58557995926327105526.
Повний текст джерела華梵大學
資訊管理學系碩士班
98
In the internal network, the defense demand gradually increased, the Network Access Control (NAC) is able to perform the user’s identity authentication and test the security such as anti-virus software enable and update virus patterns, install the operation system patch(es) and so on before user access internal network. The NAC is able to isolated user until his information equipment repaired to prevent virus or worm if user’s equipment does not meet security policy. For an organization, the pre-deployment assessment of NAC system might includes: the extent of changes to the existing network infrastructure, difficulty of deployment, functional requirements, the user's access control and cost aspects. These assessments is more involved in network management, the user's computer management, access control and many other units. Therefore, the NAC solution evaluation becomes more difficult and complex because of a number of assessment criteria of choice . This study proposes the NAC solution decision-making model which utilize the NAC standards and information technology security products selecting guides to develop evaluation criteria of NAC for criteria evaluation questionnaires. The questionnaires were conducted on experts. We utilized the Analytic Hierarchy Process (AHP) to determine the weighted values of various principles and to find out the important principles of the evaluation criteria and utilized Fuzzy Synthetic Decision method to determine the NAC solution selection priority as an organization select NAC solution reference basis. The results show that the system integrity and the cost of attention are most import to decision-makers. Therefore, the most in need of consideration of issues for the NAC implement are risk reducing and implement cost to an organization.
Marinho, José Manuel Meireles. "Medium Access Control-Level Solutions for Optimized Spectrum Decision in Distributed Cognitive Radio Scenarios." Doctoral thesis, 2015. http://hdl.handle.net/10316/28986.
Повний текст джерелаO espectro rádio tem vindo a ser regulado de um modo estático. Ou seja, este encontra-se essencialmente dividido em bandas de frequência licenciadas, com utilização restringida a um número limitado de utilizadores autorizados, e em algumas bandas de frequência não licenciadas para utilização livre. Devido à falta de flexibilidade resultante desta abordagem, partes significativas do espectro rádio encontram-se subutilizadas. Em simultâneo, outras bandas de frequência estão a ficar cada vez mais saturadas, nomeadamente as não licenciadas em áreas densamente povoadas. O Rádio Cognitivo é um paradigma recente cujo objetivo é melhorar o nível de eficiência na utilização do espectro rádio. Os seus princípios gerais consistem em permitir que dispositivos sem fios não licenciados (os denominados Utilizadores Secundários) possam aceder às bandas de frequência licenciadas desde que estes não interferiram de forma prejudicial com os utilizadores licenciados (os denominados Utilizadores Primários). A abordagem preponderante na área de Rádio Cognitivo consiste em ter utilizadores secundários com capacidade para, de um modo dinâmico, detetar e aceder a oportunidades espectrais, ou seja, bandas de frequência que não estão a ser acedidas pelos respetivos utilizadores primários num determinado momento numa determinada localização. Neste contexto, os utilizadores secundários devem ser capazes de analisar o espectro rádio com precisão e, de preferência, possuírem mecanismos de aprendizagem baseados em observação local e experiência passada. Apesar da área de Rádio Cognitivo ter implicações na totalidade das camadas das pilhas protocolares de comunicação, os seus problemas fundamentais localizam-se nos níveis físico (PHY) e de controlo de acesso ao meio (MAC). Em particular, os protocolos de controlo de acesso ao meio desempenham um papel fundamental no âmbito de operações de controlo de acesso ao espectro rádio e de suporte à cooperação entre utilizadores secundários. Os utilizadores primários, quanto a eles, devem manter-se abstraídos das operações de Rádio Cognitivo e, em consequência, não estarem sujeitos a qualquer tipo de alteração em cenários de Rádio Cognitivo. Esta tese apresenta cinco contribuições, essencialmente relacionadas com o nível do controlo de acesso ao meio, com o objetivo de incrementar os níveis de proteção dos utilizadores primários e de desempenho dos utilizadores secundários em redes de Rádio Cognitivo distribuídas, especialmente quando os utilizadores secundários não têm antecipadamente acesso a qualquer tipo de informação, tal como a localização de utilizadores primários. Neste tipo de cenário, não existe qualquer entidade central responsável por recolher e processar dados de origem diversa ou tomar decisões de acesso ao espectro rádio. Ou seja, as soluções propostas adequam-se a utilizadores secundários que operam de um modo autónomo e cooperativo. Estes tomam as suas decisões baseando-se, essencialmente, em observações locais, em eventuais resultados de aprendizagem e em dados trocados entre si. A primeira contribuição desta tese consiste numa descrição da área de Rádio Cognitivo através de um estado da arte detalhado. A segunda contribuição resulta na definição de um protocolo de controlo de acesso ao meio apoiado num mecanismo inovador, designado COSBET (Cooperative Sense-Before-Transmit), que oferece um nível superior de proteção dos utilizadores primários em cenários de Rádio Cognitivo distribuídos sujeitos ao problema do utilizador primário oculto. Este tipo de anomalia ocorre quando um utilizador secundário é incapaz de detetar as atividades de um determinado utilizador primário apesar de poder provocar interferências na respetiva área de abrangência. Tal como já foi referido, na área de Rádio Cognitivo, é considerado desejável os utilizadores secundários terem capacidades de aprendizagem baseadas em observação local e experiência passada. No entanto, em cenários distribuídos, o problema do utilizador primário oculto afeta negativamente a qualidade dos resultados de aprendizagem obtidos e, em consequência, o nível efetivamente alcançado em termos de proteção dos utilizadores primários. Sendo assim, esta tese também analisa esta questão e propõe uma solução destinada a tratá-la, estando esta terceira contribuição baseada num conceito chave designado FIBASC (Filtering Based on Suspicious Channels). A troca de informação de controlo em redes de Rádio Cognitivo distribuídas é frequentemente suportada por um canal partilhado e acessível à globalidade dos utilizadores secundários. Este é o designado canal de controlo comum (CCC), sendo igualmente esta a abordagem seguida pelo protocolo COSBET-MAC proposto. No entanto, os CCC estão sujeitos a problemas de saturação. A ocorrência deste tipo de problema impede os utilizadores secundários de tirarem pleno proveito das potencialidades oferecidas pelo Rádio Cognitivo, acabando por limitar os níveis de desempenho de comunicação alcançáveis. Sendo assim, nesta tese também analisamos esta questão e propomos uma solução destinada a abordá-la, correspondendo esta à nossa quarta contribuição. A solução proposta, designada CORHYS (Cognitive Radio Hybrid Signalling), baseia-se num esquema de sinalização híbrido que recorre simultaneamente a um CCC e aos canais de dados que vão sendo alocados de forma dinâmica. A quinta e última contribuição desta tese consiste na definição de uma estratégia adicional, igualmente localizada no nível do controlo de acesso ao meio, destinada a melhorar o desempenho dos utilizadores secundários em cenários de Rádio Cognitivo distribuídos em que se recorre a um CCC. Fazem parte das suas linhas orientadoras a otimização da reutilização espacial do espectro rádio e a redução do tráfego de controlo gerado entre utilizadores secundários. As soluções de Rádio Cognitivo propostas no âmbito desta tese foram avaliadas em ambiente de simulação, sendo esta uma prática comum, nomeadamente devido a limitações de tempo e de outros tipos de recursos. Para o efeito, recorreu-se ao OMNET++ (Objective Modular Network Testbed in C++), um simulador baseado em eventos discretos e de código aberto. A totalidade das contribuições da presente tese podem ser aplicadas em conjunto. A integração destas deu origem a uma solução única e otimizada de controlo de acesso ao meio destinada a cenários de Rádio Cognitivo distribuídos. Esta aborda as duas principais preocupações existentes em cenários de Rádio Cognitivo: proteger os utilizadores primários de qualquer tipo de interferência prejudicial; e melhorar o desempenho de comunicação dos utilizadores secundários. Tanto quanto sabemos, as várias soluções propostas e o nível de completude que a utilização conjunta destas permite não são oferecidos por qualquer outra proposta de controlo de acesso ao meio existente para cenários de Rádio Cognitivo distribuídos. As contribuições desta tese também apontam direções que podem ser seguidas no âmbito de outros protocolos de controlo de acesso ao meio, especialmente aqueles que se destinam a redes de Rádio Cognitivo distribuídas.
The radio spectrum has been statically regulated, i.e., essentially partitioned into licensed frequency bands, which are accessed exclusively by authorized users, and unlicensed frequency bands that can be freely accessed. Due to this inflexible policy, large portions of the entire radio spectrum remain unused independently of time and location in the world, while some frequency bands suffer from increasing levels of saturation, particularly the unlicensed ones in densely populated areas. Cognitive Radio (CR) is a recent paradigm that aims at improving efficiency regarding spectrum utilization. Its principles consist in allowing unlicensed wireless devices (i.e., secondary users) to access licensed frequency bands provided that the respective incumbent users (i.e., primary users) do not suffer any harmful interference. The most preponderant CR approach consists in having a secondary user (SU) dynamically locating and accessing spectrum opportunities, i.e., frequency bands that are not being accessed by any primary user (PU) at a given time and location. Consequently, sensing the spectrum and learning through local observation and past experience, which enables proactive spectrum decision, are key CR issues. Despite CR has implications in all the layers of the communication protocol stack, its fundamentals are mainly related to the physical (PHY) and medium access control (MAC) levels. In fact, CR MAC protocols are at the heart of spectrum access control and cooperation between SUs. PUs are expected to be unware of CR operations and, consequently, should not suffer any modification under CR scenarios. This thesis provides five contributions, essentially related to the MAC level, with the aim of improving the protection of PUs and the communication performance of SUs in cooperative distributed CR networks, particularly when there is no access to any a priori known information, such as the locations of primary transmitters. In this type of scenario, there are no central entities that collect and fuse data, or take spectrum decisions. That is, the proposed solutions fit into totally autonomous and cooperating SUs, i.e., SUs that take their own decisions based on local observation, on learning outcomes if any is available, and on data they exchange with each other. The first contribution of this thesis consists in a description of the CR area through an indepth state of the art. The second contribution lies in the definition of a CR MAC protocol that follows a novel approach, named Cooperative Sense-Before-Transmit (COSBET), which provides a higher protection of PUs in distributed CR scenarios that suffer from the hidden PU problem. This issue occurs when a SU cannot sense the activities of a given PU despite it can cause harmful interference to its coverage area. As already mentioned, CR considers that the SUs might have learning capabilities based on local observation and past experience. However, in distributed scenarios, the hidden PU problem affects the accuracy of learning and, therefore, the effectiveness of PU protection. For that reason, in this thesis we also discuss this issue and propose a novel solution that addresses it. This solution is based on a key concept named FIBASC (Filtering Based on Suspicious Channels). Utilizing a common control channel (CCC), i.e., a channel that is available to all the SUs in a CR network, for signalling purposes is a frequent practice concerning existing distributed CR MAC solutions. It is also the solution adopted by COSBET-MAC. However, a CCC is susceptible to saturation and can, therefore, become a performance bottleneck that inhibits the SUs from taking full advantage of CR potentialities. Consequently, the fourth contribution of this thesis consists in analysing this issue and addressing it through a novel solution, which we named CORHYS (Cognitive Radio Hybrid Signalling). CORHYS is based on a hybrid signalling approach that performs signalling over the CCC and over the allocated data channels simultaneously. The fifth and last contribution of this thesis consists in a MAC-level strategy that aims at further improving the performance of SUs in distributed CR scenarios that are based on a CCC. The key guidelines for this strategy are optimizing the spatial reuse of the radio spectrum and reducing control traffic. The CR solutions that resulted from this thesis were evaluated through simulation, which is a common practice, particularly due to time and other resource restrictions. For this purpose, we used OMNET++ (Objective Modular Network Testbed in C++), an open source discrete event simulator. The contributions of this thesis can be applied jointly and were successfully integrated with each other, which resulted in an optimized CR MAC solution that addresses the two main concerns in distributed CR scenarios: protecting the PUs from harmful interference; and improving the communication performance of the SUs. To the best of our knowledge, the proposed solutions and the level of completeness that they jointly achieve are not found in any other existing distributed CR MAC proposal. We also note that they define directions that can be followed by other CR MAC protocols, particularly those that target distributed CR networks.
"Automated Testing for RBAC Policies." Master's thesis, 2014. http://hdl.handle.net/2286/R.I.24933.
Повний текст джерелаDissertation/Thesis
M.S. Computer Science 2014
Rypina, Mariusz. "Udostępnianie informacji publicznej przez podmioty prywatne." Doctoral thesis, 2020. https://depotuw.ceon.pl/handle/item/3728.
Повний текст джерелаAlthough the issue of sharing public information has been the subject of many research and non-research publications, the issue of sharing such information by private entities has not yet been comprehensively discussed. Therefore, the purpose of this dissertation is to comprehensively research and analyse the issue of sharing public information by private entities, starting from international law through constitutional law, and ending with practical aspects of application of statutory regulations. After a short introduction, the dissertation begins with a historical outline of international regulations on access to public information and the analysis of the legislation applicable in selected foreign countries (i.e. Germany, France, UK and USA) as regards sharing such information by private entities. Further, the scope of obliged entities, the concept of public information, the methods of its sharing and the possibility of refusing to share the information requested are examined under the Polish regulations. The concept of the private entity is also explained in the dissertation. Typical private entities obliged to share public information due to providing public services (e.g. energy undertakings, telecommunications undertakings, public transport operators, municipal economy undertakings, schools and educational establishments, universities, universal health care providers, NGOs) are discussed in detail, and other obliged entities are specified. The dissertation studies in detail the procedural issues related to sharing the requested information as well as the refusal to share such information, including the issuing of administrative decisions by private entities and appealing against the decisions or inaction of private entities to administrative courts. The abuse of the right to public information and aspects of criminal liability for failure to share public information are also analysed. Although private entities participate in the activities of the broadly understood state (public law community), their role will never be the same as the role played by the authorities or other public entities in this regard. Therefore, the scope of social control over the activities of private entities cannot be the same as the one over the activities of the authorities and public entities. The studies indicate that even though private entities are obliged to share public information, this obligation is limited to the activities in which they perform public functions. These should be understood as providing services of general interests (SGI) under specific public/universal service obligation (PSO/USO) imposed on a private entity by the law, administrative decision or contract concluded with the competent public authority. Imposing obligations on private entities regarding the access to public information must respect the fundamental freedoms and rights of these entities, including their privacy, their information autonomy and economic freedom. It must be proportional to the functions that a particular private entity performs in a public community life. The last chapter presents the de lege lata and de lege ferenda conclusions. De lege lata conclusions indicate the direction of interpretation of the binding provisions which is closer to the purpose of the regulation on access to public information, i.e. the transparency of the activities of the broadly defined state, and provides protection for the interests of private entities. The main de lege ferenda conclusions indicate the need for remodelling of the current statutory regulation, not only to clarify it, but also to adapt it to the normative framework outlined by the constitution-maker.