Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Identity AND access management). Showing records 1 – 30 of 48 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters


Open Universiteit Nederland

1. Kiewiet, Gert. Technische impact van hybride cloud computing op IAM .

Degree: 2011, Open Universiteit Nederland

 De hoofdvraag van dit onderzoek is: Wat is de technische impact van hybride cloud computing op Identity and Access Management (IAM)? Algemene conclusie: De technische… (more)

Subjects/Keywords: Identity and Access Management; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kiewiet, G. (2011). Technische impact van hybride cloud computing op IAM . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/3966

Chicago Manual of Style (16th Edition):

Kiewiet, Gert. “Technische impact van hybride cloud computing op IAM .” 2011. Masters Thesis, Open Universiteit Nederland. Accessed October 15, 2019. http://hdl.handle.net/1820/3966.

MLA Handbook (7th Edition):

Kiewiet, Gert. “Technische impact van hybride cloud computing op IAM .” 2011. Web. 15 Oct 2019.

Vancouver:

Kiewiet G. Technische impact van hybride cloud computing op IAM . [Internet] [Masters thesis]. Open Universiteit Nederland; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/1820/3966.

Council of Science Editors:

Kiewiet G. Technische impact van hybride cloud computing op IAM . [Masters Thesis]. Open Universiteit Nederland; 2011. Available from: http://hdl.handle.net/1820/3966


Delft University of Technology

2. Spiele, P.A. Role Based Access Control Heineken Netherlands:.

Degree: 2009, Delft University of Technology

 The administration of users and their related permissions in the IT environment is a complex and expensive task. The growing number and variety of applications,… (more)

Subjects/Keywords: IAM; RBAC; Heineken; Role based access control; Identity and Access Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spiele, P. A. (2009). Role Based Access Control Heineken Netherlands:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d

Chicago Manual of Style (16th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Masters Thesis, Delft University of Technology. Accessed October 15, 2019. http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

MLA Handbook (7th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Web. 15 Oct 2019.

Vancouver:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Oct 15]. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

Council of Science Editors:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d


Open Universiteit Nederland

3. Piepers, Tim. Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing .

Degree: 2013, Open Universiteit Nederland

 This research identified critical success factors that enable companies to successfully implement an Identity & Access management (IAM) solution, allowing them to effectively integrate IT… (more)

Subjects/Keywords: identity & access management (IAM); governance; project management; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Piepers, T. (2013). Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/4823

Chicago Manual of Style (16th Edition):

Piepers, Tim. “Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing .” 2013. Masters Thesis, Open Universiteit Nederland. Accessed October 15, 2019. http://hdl.handle.net/1820/4823.

MLA Handbook (7th Edition):

Piepers, Tim. “Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing .” 2013. Web. 15 Oct 2019.

Vancouver:

Piepers T. Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing . [Internet] [Masters thesis]. Open Universiteit Nederland; 2013. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/1820/4823.

Council of Science Editors:

Piepers T. Cloud Identity & Access Management Model: success factors for Identity & Access Management in cloud computing . [Masters Thesis]. Open Universiteit Nederland; 2013. Available from: http://hdl.handle.net/1820/4823


University of Houston

4. -9756-6841. Future of Identity and Access Management: The OpenID Connect Protocol.

Degree: Information and Logistics Technology, Department of, 2018, University of Houston

 As the Internet becomes the standard, and often the only, mechanism for interactions between individuals, private companies, governments and other organizations, digital identity management is… (more)

Subjects/Keywords: OpenID; Connect,Identity; Federation; Authentication; Authorization; OAuth2; OIDC; IAM; Access; Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-9756-6841. (2018). Future of Identity and Access Management: The OpenID Connect Protocol. (Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/3381

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-9756-6841. “Future of Identity and Access Management: The OpenID Connect Protocol.” 2018. Thesis, University of Houston. Accessed October 15, 2019. http://hdl.handle.net/10657/3381.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-9756-6841. “Future of Identity and Access Management: The OpenID Connect Protocol.” 2018. Web. 15 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-9756-6841. Future of Identity and Access Management: The OpenID Connect Protocol. [Internet] [Thesis]. University of Houston; 2018. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10657/3381.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-9756-6841. Future of Identity and Access Management: The OpenID Connect Protocol. [Thesis]. University of Houston; 2018. Available from: http://hdl.handle.net/10657/3381

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

5. Koelewijn, G. Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:.

Degree: 2009, Delft University of Technology

Identity and Access Management (IAM) is about managing “Who has permission to do what on which data and why?” at technical and process level. This… (more)

Subjects/Keywords: Identity and Access Management

…The scope of identity and access management in this paper is the organization. Identities… …Cost reduction. The motivations for identity and access management can be conflicting with… …Prioritizing and balancing business needs is prerequisite for any identity and access management… …control, IT Governance, Security good-practices and identity and access management technology… …In the last 6 years, the term Identity and Access Management became widely used and was a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koelewijn, G. (2009). Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:47e228e5-645e-497c-a5e2-ec3b4df5e299

Chicago Manual of Style (16th Edition):

Koelewijn, G. “Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:.” 2009. Masters Thesis, Delft University of Technology. Accessed October 15, 2019. http://resolver.tudelft.nl/uuid:47e228e5-645e-497c-a5e2-ec3b4df5e299.

MLA Handbook (7th Edition):

Koelewijn, G. “Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:.” 2009. Web. 15 Oct 2019.

Vancouver:

Koelewijn G. Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Oct 15]. Available from: http://resolver.tudelft.nl/uuid:47e228e5-645e-497c-a5e2-ec3b4df5e299.

Council of Science Editors:

Koelewijn G. Identity & Access Management: Get in control: IT Governance, people, permission and technical challenges.:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:47e228e5-645e-497c-a5e2-ec3b4df5e299


University of Plymouth

6. Crume, Jeffery. Advancing user authentication and access management.

Degree: PhD, 2019, University of Plymouth

 In order for online systems to transact business or exchange other sensitive information, there must be an environment where the parties involved can verify that… (more)

Subjects/Keywords: Authentication Identity Management Access Control Man-in-the-Middle Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crume, J. (2019). Advancing user authentication and access management. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14108

Chicago Manual of Style (16th Edition):

Crume, Jeffery. “Advancing user authentication and access management.” 2019. Doctoral Dissertation, University of Plymouth. Accessed October 15, 2019. http://hdl.handle.net/10026.1/14108.

MLA Handbook (7th Edition):

Crume, Jeffery. “Advancing user authentication and access management.” 2019. Web. 15 Oct 2019.

Vancouver:

Crume J. Advancing user authentication and access management. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10026.1/14108.

Council of Science Editors:

Crume J. Advancing user authentication and access management. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14108


Brno University of Technology

7. Sladovník, Lukáš. Návrh identity managementu ve společnosti .

Degree: 2017, Brno University of Technology

 Bakalářská práce se zaobírá problematikou identity managementu ve společnosti. Analyzuje stav, jakým způsobem společnost řídí identity a spravuje přístupy, a jakým způsobem přistupuje k auditu… (more)

Subjects/Keywords: identity management; identita; přístup; autentizace; autorizace; audit; role; heslo; identity management; identity; access; authentication; authorization; audit; role; password

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sladovník, L. (2017). Návrh identity managementu ve společnosti . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/67408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sladovník, Lukáš. “Návrh identity managementu ve společnosti .” 2017. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/67408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sladovník, Lukáš. “Návrh identity managementu ve společnosti .” 2017. Web. 15 Oct 2019.

Vancouver:

Sladovník L. Návrh identity managementu ve společnosti . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/67408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sladovník L. Návrh identity managementu ve společnosti . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/67408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Technical University of Lisbon

8. Marques, Bruno Manuel Rosas. Gestão de identidades corporativas numa empresa de telecomunicações.

Degree: 2012, Technical University of Lisbon

Mestrado em Gestão de Sistemas de Informação

A Gestão de Identidades Corporativas (identificada na literatura como Identity and Access Management ou pelas siglas IAM, I&AM… (more)

Subjects/Keywords: Action Research; Gestão de Identidades Corporativas; Provisão de Acessos; Segurança; Identity and Access Management; Access Provisioning; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marques, B. M. R. (2012). Gestão de identidades corporativas numa empresa de telecomunicações. (Thesis). Technical University of Lisbon. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10972

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marques, Bruno Manuel Rosas. “Gestão de identidades corporativas numa empresa de telecomunicações.” 2012. Thesis, Technical University of Lisbon. Accessed October 15, 2019. http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10972.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marques, Bruno Manuel Rosas. “Gestão de identidades corporativas numa empresa de telecomunicações.” 2012. Web. 15 Oct 2019.

Vancouver:

Marques BMR. Gestão de identidades corporativas numa empresa de telecomunicações. [Internet] [Thesis]. Technical University of Lisbon; 2012. [cited 2019 Oct 15]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10972.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marques BMR. Gestão de identidades corporativas numa empresa de telecomunicações. [Thesis]. Technical University of Lisbon; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10972

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Vokálek, Vojtěch. Návrh změn systému řízení identit ve firmě .

Degree: 2016, Brno University of Technology

 Předmětem diplomové práce je prozkoumat integraci systému správy identit se systémem řízení bezpečnosti informací na základě teoretických poznatků a analýzy současného stavu. Upozornit společnost na… (more)

Subjects/Keywords: Identity management; ISMS; bezpečnost; proces; společnost; role; architektura; přístup; cyklus; heslo; Identity management; ISMS; security; process; company; role; architecture; access; cycle; password

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vokálek, V. (2016). Návrh změn systému řízení identit ve firmě . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/59525

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vokálek, Vojtěch. “Návrh změn systému řízení identit ve firmě .” 2016. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/59525.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vokálek, Vojtěch. “Návrh změn systému řízení identit ve firmě .” 2016. Web. 15 Oct 2019.

Vancouver:

Vokálek V. Návrh změn systému řízení identit ve firmě . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/59525.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vokálek V. Návrh změn systému řízení identit ve firmě . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/59525

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Pentafronimos, George. Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών.

Degree: 2012, University of Piraeus (UNIPI); Πανεπιστήμιο Πειραιώς

With the advent of Web 2.0 applications and social networks, modern services are able to offer advanced capabilities to end-users enabling their active participation in… (more)

Subjects/Keywords: Συνεργατικό περιβάλλον; Διαχείριση ταυτότητας; Έλεγχος προσπέλασης; Προστασία ιδιωτικότητας; Αξιοπιστία χρηστών; Collaborative environment; Identity management; Access control; Privacy protection; User trustworthiness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pentafronimos, G. (2012). Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών. (Thesis). University of Piraeus (UNIPI); Πανεπιστήμιο Πειραιώς. Retrieved from http://hdl.handle.net/10442/hedi/34584

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pentafronimos, George. “Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών.” 2012. Thesis, University of Piraeus (UNIPI); Πανεπιστήμιο Πειραιώς. Accessed October 15, 2019. http://hdl.handle.net/10442/hedi/34584.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pentafronimos, George. “Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών.” 2012. Web. 15 Oct 2019.

Vancouver:

Pentafronimos G. Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών. [Internet] [Thesis]. University of Piraeus (UNIPI); Πανεπιστήμιο Πειραιώς; 2012. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10442/hedi/34584.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pentafronimos G. Έμπιστο περιβάλλον συνεργασίας και παροχής ασφαλών, ιδιωτικών και διαλειτουργικών υπηρεσιών. [Thesis]. University of Piraeus (UNIPI); Πανεπιστήμιο Πειραιώς; 2012. Available from: http://hdl.handle.net/10442/hedi/34584

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Rio Grande do Sul

11. Ribeiro, Matheus Antônio Corrêa. Gerenciamento e autenticação de identidades digitais usando feições faciais.

Degree: 2008, Universidade do Rio Grande do Sul

Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir… (more)

Subjects/Keywords: Biometria; Access control; Identidade digital; Biometric authentication; Biometrics; Processamento de imagens; Imagem digital; Identity management systems; Facial features; User modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ribeiro, M. A. C. (2008). Gerenciamento e autenticação de identidades digitais usando feições faciais. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/15740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ribeiro, Matheus Antônio Corrêa. “Gerenciamento e autenticação de identidades digitais usando feições faciais.” 2008. Thesis, Universidade do Rio Grande do Sul. Accessed October 15, 2019. http://hdl.handle.net/10183/15740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ribeiro, Matheus Antônio Corrêa. “Gerenciamento e autenticação de identidades digitais usando feições faciais.” 2008. Web. 15 Oct 2019.

Vancouver:

Ribeiro MAC. Gerenciamento e autenticação de identidades digitais usando feições faciais. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2008. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10183/15740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ribeiro MAC. Gerenciamento e autenticação de identidades digitais usando feições faciais. [Thesis]. Universidade do Rio Grande do Sul; 2008. Available from: http://hdl.handle.net/10183/15740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Nop, Dominik. Návrh systému správy identit ve firmě .

Degree: 2017, Brno University of Technology

 Předmětem této bakalářské práce je navrhnout novou podobu systému správy identit ve firmě. V úvodní části se práce zabývá teoretickými poznatky z oblasti správy identit,… (more)

Subjects/Keywords: Správa identit; autentizace; autorizace; doména; přístup; SSO; ICT bezpečnost; Identity management; authentication; authorisation; domain; access; SSO; ICT security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nop, D. (2017). Návrh systému správy identit ve firmě . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/67843

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nop, Dominik. “Návrh systému správy identit ve firmě .” 2017. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/67843.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nop, Dominik. “Návrh systému správy identit ve firmě .” 2017. Web. 15 Oct 2019.

Vancouver:

Nop D. Návrh systému správy identit ve firmě . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/67843.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nop D. Návrh systému správy identit ve firmě . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/67843

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

13. Alhaqbani, Bandar Saleh. Privacy and trust management for electronic health records.

Degree: 2010, Queensland University of Technology

 Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the… (more)

Subjects/Keywords: electronic health records; privacy; trust; access control; federated identity management; record linking; inference channels; reputation systems; subjective logic; workflow management systems; work-allocation strategies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alhaqbani, B. S. (2010). Privacy and trust management for electronic health records. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/37635/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alhaqbani, Bandar Saleh. “Privacy and trust management for electronic health records.” 2010. Thesis, Queensland University of Technology. Accessed October 15, 2019. https://eprints.qut.edu.au/37635/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alhaqbani, Bandar Saleh. “Privacy and trust management for electronic health records.” 2010. Web. 15 Oct 2019.

Vancouver:

Alhaqbani BS. Privacy and trust management for electronic health records. [Internet] [Thesis]. Queensland University of Technology; 2010. [cited 2019 Oct 15]. Available from: https://eprints.qut.edu.au/37635/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alhaqbani BS. Privacy and trust management for electronic health records. [Thesis]. Queensland University of Technology; 2010. Available from: https://eprints.qut.edu.au/37635/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Notre Dame

14. Philip W. Snowberger. Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>.

Degree: MSin Computer Science and Engineering, Computer Science and Engineering, 2007, University of Notre Dame

  The operation of modern security systems demands too much sophistication from the average user. Further, in the face of increasingly common malware and spyware,… (more)

Subjects/Keywords: identity model; access control; identity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snowberger, P. W. (2007). Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>. (Masters Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/ft848p60v2w

Chicago Manual of Style (16th Edition):

Snowberger, Philip W.. “Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>.” 2007. Masters Thesis, University of Notre Dame. Accessed October 15, 2019. https://curate.nd.edu/show/ft848p60v2w.

MLA Handbook (7th Edition):

Snowberger, Philip W.. “Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>.” 2007. Web. 15 Oct 2019.

Vancouver:

Snowberger PW. Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>. [Internet] [Masters thesis]. University of Notre Dame; 2007. [cited 2019 Oct 15]. Available from: https://curate.nd.edu/show/ft848p60v2w.

Council of Science Editors:

Snowberger PW. Sub-Identities: A Hierarchical Identity Model for Practical Containment</h1>. [Masters Thesis]. University of Notre Dame; 2007. Available from: https://curate.nd.edu/show/ft848p60v2w


Université de Lorraine

15. Bouchami, Ahmed. Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking.

Degree: Docteur es, Informatique, 2016, Université de Lorraine

 Les réseaux sociaux d’entreprise (RSE) ont révolutionné la collaboration entre les organisations professionnelles. Grâce aux RSEs, les contraintes classiques de mobilité, de procédures compliquées d’échange… (more)

Subjects/Keywords: Sécurité; Fédération d’identité; ABAC; Contrôle d’accès; Délégation; Gestion du risque; Confiance numérique; Security; Identity Federation; ABAC; Access control; Delegation; Risk management; Digital trust; 005.8; 658.472

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bouchami, A. (2016). Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking. (Doctoral Dissertation). Université de Lorraine. Retrieved from http://www.theses.fr/2016LORR0091

Chicago Manual of Style (16th Edition):

Bouchami, Ahmed. “Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking.” 2016. Doctoral Dissertation, Université de Lorraine. Accessed October 15, 2019. http://www.theses.fr/2016LORR0091.

MLA Handbook (7th Edition):

Bouchami, Ahmed. “Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking.” 2016. Web. 15 Oct 2019.

Vancouver:

Bouchami A. Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking. [Internet] [Doctoral dissertation]. Université de Lorraine; 2016. [cited 2019 Oct 15]. Available from: http://www.theses.fr/2016LORR0091.

Council of Science Editors:

Bouchami A. Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise : Collaborative resources security in enterprises social networking. [Doctoral Dissertation]. Université de Lorraine; 2016. Available from: http://www.theses.fr/2016LORR0091


Brno University of Technology

16. Grešša, Pavol. Vícedimenzionální přístup k WWW aplikacím .

Degree: 2011, Brno University of Technology

 Diplomová práce se zabývá analýzou, návrhem a implementací autentizačního a autorizačního subsystému do prostředí webové distribuované aplikace. Unifikuje známe bezpečnostní modely k vytvoření univerzálního bezpečnostního… (more)

Subjects/Keywords: autorizace; autentizace; auditování; správa identit; kontrola přístupu; vícedimenzionální bezpečnostní model; distribuované webové systémy; authorization; authentication; auditing; identity management; access control; multi-dimensional security model; distributed web systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grešša, P. (2011). Vícedimenzionální přístup k WWW aplikacím . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grešša, Pavol. “Vícedimenzionální přístup k WWW aplikacím .” 2011. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/54140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grešša, Pavol. “Vícedimenzionální přístup k WWW aplikacím .” 2011. Web. 15 Oct 2019.

Vancouver:

Grešša P. Vícedimenzionální přístup k WWW aplikacím . [Internet] [Thesis]. Brno University of Technology; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/54140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grešša P. Vícedimenzionální přístup k WWW aplikacím . [Thesis]. Brno University of Technology; 2011. Available from: http://hdl.handle.net/11012/54140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Hruška, David. Návrh změn identity managementu v podniku .

Degree: 2018, Brno University of Technology

 Tato diplomová práce je zaměřena na návrh implementace změn identity managementu do konkrétní společnosti. V teoretické části jsou uvedeny základní pojmy a také podrobný popis… (more)

Subjects/Keywords: Identity management; ISMS; bezpečnost; proces; společnost; architektura; přístup; heslo; analýza rizik; PDCA model; informační systém; normy řady ISO/IEC 27000; Identity Management; ISMS; Security; Process; Company; Architecture; access; password; risk analysis; PDCA model; information system; ISO / IEC 27000 series standards

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hruška, D. (2018). Návrh změn identity managementu v podniku . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hruška, David. “Návrh změn identity managementu v podniku .” 2018. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/82245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hruška, David. “Návrh změn identity managementu v podniku .” 2018. Web. 15 Oct 2019.

Vancouver:

Hruška D. Návrh změn identity managementu v podniku . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/82245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hruška D. Návrh změn identity managementu v podniku . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/82245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Temple University

18. Dixon, LaVarr. Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program.

Degree: 2015, Temple University

Math & Science Education

Ed.D.

This study was designed to investigate the mathematical identity and achievement of one cohort of underrepresented male youth who participated… (more)

Subjects/Keywords: Mathematics education;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, L. (2015). Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program. (Thesis). Temple University. Retrieved from http://digital.library.temple.edu/u?/p245801coll10,314061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dixon, LaVarr. “Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program.” 2015. Thesis, Temple University. Accessed October 15, 2019. http://digital.library.temple.edu/u?/p245801coll10,314061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dixon, LaVarr. “Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program.” 2015. Web. 15 Oct 2019.

Vancouver:

Dixon L. Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program. [Internet] [Thesis]. Temple University; 2015. [cited 2019 Oct 15]. Available from: http://digital.library.temple.edu/u?/p245801coll10,314061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dixon L. Life beyond the Cemetery: The mathematical identity and academic achievement of traditionally underrepresented male AVID participants in an urban pilot program. [Thesis]. Temple University; 2015. Available from: http://digital.library.temple.edu/u?/p245801coll10,314061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


AUT University

19. Ghazi Zadeh, Eghbal. Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing .

Degree: AUT University

 The trust level in Cloud Computing (CC) is a topic that is currently attracting significant interest. Federated clouds with different attributes and secure elements present… (more)

Subjects/Keywords: Cloud Computing; Cloud Identity; Cloud Security; Identity and access management; Trust Computing; Design Science; AHP; Evaluation Theory; IPA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghazi Zadeh, E. (n.d.). Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/11949

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghazi Zadeh, Eghbal. “Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing .” Thesis, AUT University. Accessed October 15, 2019. http://hdl.handle.net/10292/11949.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghazi Zadeh, Eghbal. “Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing .” Web. 15 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Ghazi Zadeh E. Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing . [Internet] [Thesis]. AUT University; [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10292/11949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Ghazi Zadeh E. Evaluating Identity Theft Protections by Trust-based Model for Cloud Computing . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/11949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Virginia Tech

20. Mckee, Katherine Elizabeth. Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice.

Degree: PhD, Agricultural and Extension Education, 2011, Virginia Tech

 This qualitative case study examined the development of doctoral students' professional identities through the negotiation of boundaries among communities of practice and through the social… (more)

Subjects/Keywords: communities of practice; Discourse; legitimacy; access; professional identity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mckee, K. E. (2011). Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/77294

Chicago Manual of Style (16th Edition):

Mckee, Katherine Elizabeth. “Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice.” 2011. Doctoral Dissertation, Virginia Tech. Accessed October 15, 2019. http://hdl.handle.net/10919/77294.

MLA Handbook (7th Edition):

Mckee, Katherine Elizabeth. “Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice.” 2011. Web. 15 Oct 2019.

Vancouver:

Mckee KE. Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice. [Internet] [Doctoral dissertation]. Virginia Tech; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10919/77294.

Council of Science Editors:

Mckee KE. Access to Discourse and Professional Identity Development of Doctoral Students in Communities of Practice. [Doctoral Dissertation]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/77294


Texas A&M University

21. McPherson, Rebecca. The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education.

Degree: 2012, Texas A&M University

 Welfare reform, as a social policy, has implications for higher education policy, because it restricts welfare-reliant women from seeking sufficient post-secondary education for economic mobility.… (more)

Subjects/Keywords: Phenomenology; Life Course; Welfare; Single Mother; Post-secondary Education; Identity Development; Persistence; Access; Adult Development

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McPherson, R. (2012). The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McPherson, Rebecca. “The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education.” 2012. Thesis, Texas A&M University. Accessed October 15, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McPherson, Rebecca. “The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education.” 2012. Web. 15 Oct 2019.

Vancouver:

McPherson R. The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education. [Internet] [Thesis]. Texas A&M University; 2012. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McPherson R. The Life Course of Single Welfare-Reliant Mothers: Experiences in Seeking Access to and Persisting in Post-Secondary Education. [Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Temple University

22. Childs, Davinah Sharnese. EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION.

Degree: PhD, 2017, Temple University

Urban Education

Increasing the number of students of color in Science, Technology, Engineering and Math (STEM) fields is critical for America’s economic, technological and scientific… (more)

Subjects/Keywords: Education; Mathematics education;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Childs, D. S. (2017). EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION. (Doctoral Dissertation). Temple University. Retrieved from http://digital.library.temple.edu/u?/p245801coll10,426029

Chicago Manual of Style (16th Edition):

Childs, Davinah Sharnese. “EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION.” 2017. Doctoral Dissertation, Temple University. Accessed October 15, 2019. http://digital.library.temple.edu/u?/p245801coll10,426029.

MLA Handbook (7th Edition):

Childs, Davinah Sharnese. “EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION.” 2017. Web. 15 Oct 2019.

Vancouver:

Childs DS. EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION. [Internet] [Doctoral dissertation]. Temple University; 2017. [cited 2019 Oct 15]. Available from: http://digital.library.temple.edu/u?/p245801coll10,426029.

Council of Science Editors:

Childs DS. EFFECTS OF MATH IDENTITY AND LEARNING OPPORTUNITIES ON RACIAL DIFFERENCES IN MATH ENGAGEMENT, ADVANCED COURSE-TAKING, AND STEM ASPIRATION. [Doctoral Dissertation]. Temple University; 2017. Available from: http://digital.library.temple.edu/u?/p245801coll10,426029


University of Pretoria

23. de Jager, Gerdi. Opportunities for the development of understanding in Grade 8 mathematics classrooms.

Degree: MEd, Science, Mathematics and Technology Education, 2017, University of Pretoria

 Learner performance in South Africa is poor in comparison with other countries as a result of poor teaching. At the core of the concern about… (more)

Subjects/Keywords: UCTD; TRU Math dimensions; Access to mathematical content; Uses of assessment; Authority and mathematical identity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Jager, G. (2017). Opportunities for the development of understanding in Grade 8 mathematics classrooms. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/60992

Chicago Manual of Style (16th Edition):

de Jager, Gerdi. “Opportunities for the development of understanding in Grade 8 mathematics classrooms.” 2017. Masters Thesis, University of Pretoria. Accessed October 15, 2019. http://hdl.handle.net/2263/60992.

MLA Handbook (7th Edition):

de Jager, Gerdi. “Opportunities for the development of understanding in Grade 8 mathematics classrooms.” 2017. Web. 15 Oct 2019.

Vancouver:

de Jager G. Opportunities for the development of understanding in Grade 8 mathematics classrooms. [Internet] [Masters thesis]. University of Pretoria; 2017. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2263/60992.

Council of Science Editors:

de Jager G. Opportunities for the development of understanding in Grade 8 mathematics classrooms. [Masters Thesis]. University of Pretoria; 2017. Available from: http://hdl.handle.net/2263/60992


The Ohio State University

24. Kulkarni, Shweta Samir. SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING.

Degree: MS, Computer Science and Engineering, 2013, The Ohio State University

 Multi-domain Network performance monitoring (NPM) frameworks such as perfSONAR are being widely deployed in high-performance computing and other communities that support large-scale data movements. These… (more)

Subjects/Keywords: Computer Engineering; multi-domain measurements, secure middleware; federated identity; entitlement service; enterprise access policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kulkarni, S. S. (2013). SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1366333088

Chicago Manual of Style (16th Edition):

Kulkarni, Shweta Samir. “SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING.” 2013. Masters Thesis, The Ohio State University. Accessed October 15, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1366333088.

MLA Handbook (7th Edition):

Kulkarni, Shweta Samir. “SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING.” 2013. Web. 15 Oct 2019.

Vancouver:

Kulkarni SS. SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING. [Internet] [Masters thesis]. The Ohio State University; 2013. [cited 2019 Oct 15]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1366333088.

Council of Science Editors:

Kulkarni SS. SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING. [Masters Thesis]. The Ohio State University; 2013. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1366333088


NSYSU

25. Lin, Chih-Wen. Attribute-based Encryption from Identity-based Encryption.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers… (more)

Subjects/Keywords: Wildcard; Identity-based Encryption; Attribute-based Encryption; Constantsize Ciphertexts/keys; Hidden Access Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2016). Attribute-based Encryption from Identity-based Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Chih-Wen. “Attribute-based Encryption from Identity-based Encryption.” 2016. Thesis, NSYSU. Accessed October 15, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Chih-Wen. “Attribute-based Encryption from Identity-based Encryption.” 2016. Web. 15 Oct 2019.

Vancouver:

Lin C. Attribute-based Encryption from Identity-based Encryption. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Oct 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. Attribute-based Encryption from Identity-based Encryption. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waikato

26. Brooking, Loren Rachel. Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) .

Degree: 2016, University of Waikato

 Secondary education has, in recent years, been recognised globally as a development issue that needs urgent attention. The United Nations released a set of Sustainable… (more)

Subjects/Keywords: Secondary education; Tanzania; Neo-liberalism; Development; Access to education; Dualistic education; Nationalism; National identity; Girls

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brooking, L. R. (2016). Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) . (Masters Thesis). University of Waikato. Retrieved from http://hdl.handle.net/10289/10744

Chicago Manual of Style (16th Edition):

Brooking, Loren Rachel. “Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) .” 2016. Masters Thesis, University of Waikato. Accessed October 15, 2019. http://hdl.handle.net/10289/10744.

MLA Handbook (7th Edition):

Brooking, Loren Rachel. “Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) .” 2016. Web. 15 Oct 2019.

Vancouver:

Brooking LR. Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) . [Internet] [Masters thesis]. University of Waikato; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/10289/10744.

Council of Science Editors:

Brooking LR. Development Agendas and Their Relationship with Secondary Education in Tanzania: (A Historical Analysis from the Late 1800s until the 2000s) . [Masters Thesis]. University of Waikato; 2016. Available from: http://hdl.handle.net/10289/10744


University of Wollongong

27. Chere-Masopha, Mathabo Julia. Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho.

Degree: PhD, Faculty of Education, 2011, University of Wollongong

  This thesis examines the influence of teachers' professional identities on their practices with technology in secondary school classrooms in Lesotho. In this study, teacher… (more)

Subjects/Keywords: educational technology; teacher identity; technology access; technology availablity; technology uses; factors; technology exposure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chere-Masopha, M. J. (2011). Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho. (Doctoral Dissertation). University of Wollongong. Retrieved from 130306 Educational Technology and Computing ; https://ro.uow.edu.au/theses/3543

Chicago Manual of Style (16th Edition):

Chere-Masopha, Mathabo Julia. “Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho.” 2011. Doctoral Dissertation, University of Wollongong. Accessed October 15, 2019. 130306 Educational Technology and Computing ; https://ro.uow.edu.au/theses/3543.

MLA Handbook (7th Edition):

Chere-Masopha, Mathabo Julia. “Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho.” 2011. Web. 15 Oct 2019.

Vancouver:

Chere-Masopha MJ. Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho. [Internet] [Doctoral dissertation]. University of Wollongong; 2011. [cited 2019 Oct 15]. Available from: 130306 Educational Technology and Computing ; https://ro.uow.edu.au/theses/3543.

Council of Science Editors:

Chere-Masopha MJ. Integrating technology in classroom practices: the influence of teacher professional identities in secondary schools in Lesotho. [Doctoral Dissertation]. University of Wollongong; 2011. Available from: 130306 Educational Technology and Computing ; https://ro.uow.edu.au/theses/3543


Brno University of Technology

28. Škoda, Martin. Zabezpečení sdíleného datového úložiště .

Degree: 2012, Brno University of Technology

 Tato práce představuje model cloud computingu. Popisuje modely nasazení a distribuční modely cloud computingu. Distribuční modely software jako služba a infrastruktura jako služba jsou popsány… (more)

Subjects/Keywords: Zabezpečení; sdíleného datového úložiště; Cloud computing; Software jako služba; Infrastruktura jako služba; Kryptografie; Správa identit a přístupu; Ochrana soukromí; Kontrola dat; Bezpečnostní riziko; Model zabezpečení.; Security; Shared data storage; Cloud computing; Aoftware as a service; Infrastructure as a service; Cryptography; Identity and access management; Protection of privacy; Data verification; Security risk; Security model.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Škoda, M. (2012). Zabezpečení sdíleného datového úložiště . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/9723

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Škoda, Martin. “Zabezpečení sdíleného datového úložiště .” 2012. Thesis, Brno University of Technology. Accessed October 15, 2019. http://hdl.handle.net/11012/9723.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Škoda, Martin. “Zabezpečení sdíleného datového úložiště .” 2012. Web. 15 Oct 2019.

Vancouver:

Škoda M. Zabezpečení sdíleného datového úložiště . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/11012/9723.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Škoda M. Zabezpečení sdíleného datového úložiště . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/9723

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Toufanpanah, Monir. Decision Support framework: Reliable Federated Single Sign-on.

Degree: Computer Science, 2017, Luleå University of Technology

Identity management is a critical concept for enterprises, and it has turned to more challenging issue since businesses are significantly moving towards service oriented… (more)

Subjects/Keywords: Identity and Access Management; Decision Support Framework; Single Sign-on; Identity Federation; Authentication Technology; SAML; Shibboleth; OAuth; PRIME; OpenID; Computer Systems; Datorsystem; Communication Systems; Kommunikationssystem

Identity and Access Management Federated Identity Management Federated Single Sign-On Single Sign… …of in search process: Keywords Identity and Access Management Federated Identity Single… …Xplore, Springer, Web of Science, JSTOR Keywords Identity and Access Management, Federated… …clearly shows that the rapid growth of Identity and access management framework popularity among… …enterprises all over the world is validating identity and providing secure access to application to… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Toufanpanah, M. (2017). Decision Support framework: Reliable Federated Single Sign-on. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Toufanpanah, Monir. “Decision Support framework: Reliable Federated Single Sign-on.” 2017. Thesis, Luleå University of Technology. Accessed October 15, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Toufanpanah, Monir. “Decision Support framework: Reliable Federated Single Sign-on.” 2017. Web. 15 Oct 2019.

Vancouver:

Toufanpanah M. Decision Support framework: Reliable Federated Single Sign-on. [Internet] [Thesis]. Luleå University of Technology; 2017. [cited 2019 Oct 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Toufanpanah M. Decision Support framework: Reliable Federated Single Sign-on. [Thesis]. Luleå University of Technology; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Reyes, Urlette. A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students.

Degree: Doctorate in Education, Education, 2013, Loyola Marymount University

  The purpose of this study was to determine the effects of an experiential program on the occupational identity, access, and career maturity of Black… (more)

Subjects/Keywords: Access; Experiential Program; Low Socioeconomic; Minorities; Occupational Identity; STEM; Curriculum and Instruction; Education; Science and Mathematics Education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reyes, U. (2013). A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students. (Doctoral Dissertation). Loyola Marymount University. Retrieved from https://digitalcommons.lmu.edu/etd/217

Chicago Manual of Style (16th Edition):

Reyes, Urlette. “A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students.” 2013. Doctoral Dissertation, Loyola Marymount University. Accessed October 15, 2019. https://digitalcommons.lmu.edu/etd/217.

MLA Handbook (7th Edition):

Reyes, Urlette. “A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students.” 2013. Web. 15 Oct 2019.

Vancouver:

Reyes U. A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students. [Internet] [Doctoral dissertation]. Loyola Marymount University; 2013. [cited 2019 Oct 15]. Available from: https://digitalcommons.lmu.edu/etd/217.

Council of Science Editors:

Reyes U. A Close Look at a STEM-Themed Magnet and its Experiential Program on the Occupational Identities, Career Maturity, and Access Provided to Low Socioeconomic Minority Students. [Doctoral Dissertation]. Loyola Marymount University; 2013. Available from: https://digitalcommons.lmu.edu/etd/217

[1] [2]

.