Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Access Control). Showing records 1 – 30 of 926 total matches.

[1] [2] [3] [4] [5] … [31]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Peixoto, Rafael Pinto. Traceability-based access recommendation.

Degree: 2012, Instituto Politécnico do Porto

Devido à grande quantidade de dados disponíveis na Internet, um dos maiores desafios no mundo virtual é recomendar informação aos seus utilizadores. Por outro lado,… (more)

Subjects/Keywords: Traceability; Access policy recommendation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peixoto, R. P. (2012). Traceability-based access recommendation. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Thesis, Instituto Politécnico do Porto. Accessed March 23, 2019. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Web. 23 Mar 2019.

Vancouver:

Peixoto RP. Traceability-based access recommendation. [Internet] [Thesis]. Instituto Politécnico do Porto; 2012. [cited 2019 Mar 23]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peixoto RP. Traceability-based access recommendation. [Thesis]. Instituto Politécnico do Porto; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

2. Padayachee, Keshnee. An aspect-oriented approach towards enhancing optimistic access control with usage control.

Degree: Computer Science, 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padayachee, K. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26683

Chicago Manual of Style (16th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Doctoral Dissertation, University of Pretoria. Accessed March 23, 2019. http://hdl.handle.net/2263/26683.

MLA Handbook (7th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Web. 23 Mar 2019.

Vancouver:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/2263/26683.

Council of Science Editors:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26683


University of Pretoria

3. [No author]. An aspect-oriented approach towards enhancing optimistic access control with usage control .

Degree: 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07262010-142652/

Chicago Manual of Style (16th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Doctoral Dissertation, University of Pretoria. Accessed March 23, 2019. http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

MLA Handbook (7th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Web. 23 Mar 2019.

Vancouver:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2019 Mar 23]. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

Council of Science Editors:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/


University of Utah

4. Jana, Suman. On fast and accurate detection of unauthorized wireless access points using clock skews.

Degree: MS;, Computing (School of);, 2009, University of Utah

 We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and… (more)

Subjects/Keywords: Wireless LANs; Medium Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jana, S. (2009). On fast and accurate detection of unauthorized wireless access points using clock skews. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837

Chicago Manual of Style (16th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Masters Thesis, University of Utah. Accessed March 23, 2019. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

MLA Handbook (7th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Web. 23 Mar 2019.

Vancouver:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Internet] [Masters thesis]. University of Utah; 2009. [cited 2019 Mar 23]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

Council of Science Editors:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Masters Thesis]. University of Utah; 2009. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837


University of Ontario Institute of Technology

5. Sharghigoorabi, Mohammadhassan. Access control obligation specification and enforcement using behavior pattern language.

Degree: 2018, University of Ontario Institute of Technology

 Increasing the use of Internet-based devices offers novel opportunities for users to access and share resources anywhere and anytime so that such a collaborative environment… (more)

Subjects/Keywords: Access control; Obligation; Behavior; Language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharghigoorabi, M. (2018). Access control obligation specification and enforcement using behavior pattern language. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Thesis, University of Ontario Institute of Technology. Accessed March 23, 2019. http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Web. 23 Mar 2019.

Vancouver:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2012, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Adaptive; Control; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2012). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed March 23, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Web. 23 Mar 2019.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. [cited 2019 Mar 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Control; Frame

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2013). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed March 23, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Web. 23 Mar 2019.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2019 Mar 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Kuninobu, Shigeta. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuninobu, S. (n.d.). Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 23, 2019. http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Web. 23 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

9. Nitta, Naoya. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nitta, N. (n.d.). Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 23, 2019. http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Web. 23 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

10. Ashtaiwi, Abduladhim. MIMO-aware Medium Access Control in IEEE 802.11 Networks .

Degree: Electrical and Computer Engineering, 2009, Queens University

 Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured, where the nodes in the network automatically establish an ad hoc network and maintain mesh connectivity.… (more)

Subjects/Keywords: Wireless LANs; Medium Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ashtaiwi, A. (2009). MIMO-aware Medium Access Control in IEEE 802.11 Networks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/1675

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ashtaiwi, Abduladhim. “MIMO-aware Medium Access Control in IEEE 802.11 Networks .” 2009. Thesis, Queens University. Accessed March 23, 2019. http://hdl.handle.net/1974/1675.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ashtaiwi, Abduladhim. “MIMO-aware Medium Access Control in IEEE 802.11 Networks .” 2009. Web. 23 Mar 2019.

Vancouver:

Ashtaiwi A. MIMO-aware Medium Access Control in IEEE 802.11 Networks . [Internet] [Thesis]. Queens University; 2009. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/1974/1675.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ashtaiwi A. MIMO-aware Medium Access Control in IEEE 802.11 Networks . [Thesis]. Queens University; 2009. Available from: http://hdl.handle.net/1974/1675

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

11. Luo, Bo. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.

Degree: PhD, Information Sciences and Technology, 2008, Penn State University

 As the eXtensible Markup Language (XML) has emerged as the de facto standard for storing and exchanging information in the Internet Age, the needs for… (more)

Subjects/Keywords: XML; Information Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, B. (2008). XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8523

Chicago Manual of Style (16th Edition):

Luo, Bo. “XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.” 2008. Doctoral Dissertation, Penn State University. Accessed March 23, 2019. https://etda.libraries.psu.edu/catalog/8523.

MLA Handbook (7th Edition):

Luo, Bo. “XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.” 2008. Web. 23 Mar 2019.

Vancouver:

Luo B. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2019 Mar 23]. Available from: https://etda.libraries.psu.edu/catalog/8523.

Council of Science Editors:

Luo B. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8523


University of Saskatchewan

12. Jamsrandorj, Tom 1983-. DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN.

Degree: 2017, University of Saskatchewan

 To effectively participate in modern collaborations, member organizations should be able to share digital resources with various partners, while ensuring their digital resources are protected… (more)

Subjects/Keywords: Decentralized access control; blockchain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jamsrandorj, T. 1. (2017). DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/8087

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jamsrandorj, Tom 1983-. “DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN.” 2017. Thesis, University of Saskatchewan. Accessed March 23, 2019. http://hdl.handle.net/10388/8087.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jamsrandorj, Tom 1983-. “DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN.” 2017. Web. 23 Mar 2019.

Vancouver:

Jamsrandorj T1. DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN. [Internet] [Thesis]. University of Saskatchewan; 2017. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10388/8087.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jamsrandorj T1. DECENTRALIZED ACCESS CONTROL USING THE BLOCKCHAIN. [Thesis]. University of Saskatchewan; 2017. Available from: http://hdl.handle.net/10388/8087

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

13. Habibi, Ryan. Consent based privacy for eHealth systems.

Degree: Department of Computer Science, 2018, University of Victoria

Access to Personal Health Information (PHI) is a valuable part of the modern health care model. Timely access to relevant PHI assists care providers in… (more)

Subjects/Keywords: Access Control; eHealth; Consent; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Habibi, R. (2018). Consent based privacy for eHealth systems. (Masters Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/10010

Chicago Manual of Style (16th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Masters Thesis, University of Victoria. Accessed March 23, 2019. https://dspace.library.uvic.ca//handle/1828/10010.

MLA Handbook (7th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Web. 23 Mar 2019.

Vancouver:

Habibi R. Consent based privacy for eHealth systems. [Internet] [Masters thesis]. University of Victoria; 2018. [cited 2019 Mar 23]. Available from: https://dspace.library.uvic.ca//handle/1828/10010.

Council of Science Editors:

Habibi R. Consent based privacy for eHealth systems. [Masters Thesis]. University of Victoria; 2018. Available from: https://dspace.library.uvic.ca//handle/1828/10010


Universidade Nova

14. Pires, Mário Rui Dias. A type system for access control in an object-oriented language.

Degree: 2009, Universidade Nova

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

The need for a… (more)

Subjects/Keywords: Security; Access control; Type system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pires, M. R. D. (2009). A type system for access control in an object-oriented language. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Thesis, Universidade Nova. Accessed March 23, 2019. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Web. 23 Mar 2019.

Vancouver:

Pires MRD. A type system for access control in an object-oriented language. [Internet] [Thesis]. Universidade Nova; 2009. [cited 2019 Mar 23]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pires MRD. A type system for access control in an object-oriented language. [Thesis]. Universidade Nova; 2009. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

15. Cai, Lin. Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks.

Degree: 2009, University of Waterloo

 The next-generation wireless networks are expected to integrate diverse network architectures and various wireless access technologies to provide a robust solution for ubiquitous broadband wireless… (more)

Subjects/Keywords: Medium Access Control; Wireless Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cai, L. (2009). Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4882

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cai, Lin. “Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks.” 2009. Thesis, University of Waterloo. Accessed March 23, 2019. http://hdl.handle.net/10012/4882.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cai, Lin. “Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks.” 2009. Web. 23 Mar 2019.

Vancouver:

Cai L. Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks. [Internet] [Thesis]. University of Waterloo; 2009. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10012/4882.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cai L. Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks. [Thesis]. University of Waterloo; 2009. Available from: http://hdl.handle.net/10012/4882

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

16. Krishnan, Vivek. Relating Declarative Semantics and Usability in Access Control.

Degree: 2012, University of Waterloo

 This thesis addresses the problem of usability in the context of administration of access control systems. We seek to relate the notion of declarative semantics,… (more)

Subjects/Keywords: Usability; Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnan, V. (2012). Relating Declarative Semantics and Usability in Access Control. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Thesis, University of Waterloo. Accessed March 23, 2019. http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Web. 23 Mar 2019.

Vancouver:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

17. Wu, Zhiping. Data Structures for Fast Access Control in ECM Systems.

Degree: 2014, University of Waterloo

 While many access control models have been proposed, little work has been done on the efficiency of access control systems. Because the access control sub-system… (more)

Subjects/Keywords: Access Control; ECM System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Z. (2014). Data Structures for Fast Access Control in ECM Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Thesis, University of Waterloo. Accessed March 23, 2019. http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Web. 23 Mar 2019.

Vancouver:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

18. Huang, Qing. An extension to the Android access control framework.

Degree: Computer and Information Science, 2011, Linköping University

  Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are… (more)

Subjects/Keywords: Android security; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Q. (2011). An extension to the Android access control framework. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Thesis, Linköping University. Accessed March 23, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Web. 23 Mar 2019.

Vancouver:

Huang Q. An extension to the Android access control framework. [Internet] [Thesis]. Linköping University; 2011. [cited 2019 Mar 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Q. An extension to the Android access control framework. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

19. Steenstra, C.T. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.

Degree: 2016, Delft University of Technology

 The widespread adoption of computer technologies fundamentally re-shaped the way companies operate. A deluge of systems and applications now support the daily activities of employees… (more)

Subjects/Keywords: privacy; access control; authorization; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steenstra, C. T. (2016). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d

Chicago Manual of Style (16th Edition):

Steenstra, C T. “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.” 2016. Masters Thesis, Delft University of Technology. Accessed March 23, 2019. http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

MLA Handbook (7th Edition):

Steenstra, C T. “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.” 2016. Web. 23 Mar 2019.

Vancouver:

Steenstra CT. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2019 Mar 23]. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

Council of Science Editors:

Steenstra CT. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d


University of Johannesburg

20. Von Solms, Johan Sebastiaan. MOFAC : model for fine grained access control.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made… (more)

Subjects/Keywords: Computers - Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, J. S. (2014). MOFAC : model for fine grained access control. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Thesis, University of Johannesburg. Accessed March 23, 2019. http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Web. 23 Mar 2019.

Vancouver:

Von Solms JS. MOFAC : model for fine grained access control. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms JS. MOFAC : model for fine grained access control. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

21. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed March 23, 2019. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 23 Mar 2019.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

22. Subramanian, Sonia. Development and study of access control models for semantic networks.

Degree: MS, Computer Science, 2009, University of Southern California

 This work focuses on developing a feasible access control mechanism for Semantic Networks. As the amount of information grows in quantity, it requires becoming machine… (more)

Subjects/Keywords: access control; semantic networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, S. (2009). Development and study of access control models for semantic networks. (Masters Thesis). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916

Chicago Manual of Style (16th Edition):

Subramanian, Sonia. “Development and study of access control models for semantic networks.” 2009. Masters Thesis, University of Southern California. Accessed March 23, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916.

MLA Handbook (7th Edition):

Subramanian, Sonia. “Development and study of access control models for semantic networks.” 2009. Web. 23 Mar 2019.

Vancouver:

Subramanian S. Development and study of access control models for semantic networks. [Internet] [Masters thesis]. University of Southern California; 2009. [cited 2019 Mar 23]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916.

Council of Science Editors:

Subramanian S. Development and study of access control models for semantic networks. [Masters Thesis]. University of Southern California; 2009. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916


California State University – Sacramento

23. Kaja, Krishna Chaitanya. Security policy implementation using graph database.

Degree: MS, Computer Science, 2019, California State University – Sacramento

 Extensible Access Control Markup Language (XACML) is an access control policy language. Typically, an XACML policy has configurable standard extension points to define new functions,… (more)

Subjects/Keywords: XACML; Graph database; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaja, K. C. (2019). Security policy implementation using graph database. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/207824

Chicago Manual of Style (16th Edition):

Kaja, Krishna Chaitanya. “Security policy implementation using graph database.” 2019. Masters Thesis, California State University – Sacramento. Accessed March 23, 2019. http://hdl.handle.net/10211.3/207824.

MLA Handbook (7th Edition):

Kaja, Krishna Chaitanya. “Security policy implementation using graph database.” 2019. Web. 23 Mar 2019.

Vancouver:

Kaja KC. Security policy implementation using graph database. [Internet] [Masters thesis]. California State University – Sacramento; 2019. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10211.3/207824.

Council of Science Editors:

Kaja KC. Security policy implementation using graph database. [Masters Thesis]. California State University – Sacramento; 2019. Available from: http://hdl.handle.net/10211.3/207824


University of Saskatchewan

24. Monir, Samiul 1989-. A Lightweight Attribute-Based Access Control System for IoT.

Degree: 2016, University of Saskatchewan

 The evolution of the Internet of things (IoT) has made a significant impact on our daily and professional life. Home and office automation are now… (more)

Subjects/Keywords: IoT; Access Control; Security; Attribute-based Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monir, S. 1. (2016). A Lightweight Attribute-Based Access Control System for IoT. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Thesis, University of Saskatchewan. Accessed March 23, 2019. http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Web. 23 Mar 2019.

Vancouver:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Internet] [Thesis]. University of Saskatchewan; 2016. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Thesis]. University of Saskatchewan; 2016. Available from: http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

25. Louwrens, Cecil Petrus. Single sign-on in heterogeneous computer environments.

Degree: 2012, University of Johannesburg

M.Sc.

The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO)… (more)

Subjects/Keywords: Computers - Access control.; Computers - Access control - Passwords.; Single sign-on.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). Single sign-on in heterogeneous computer environments. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Thesis, University of Johannesburg. Accessed March 23, 2019. http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Web. 23 Mar 2019.

Vancouver:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

26. Kong, Jiantao. Trusted data path protecting shared data in virtualized distributed systems.

Degree: PhD, Computing, 2010, Georgia Tech

 When sharing data across multiple sites, service applications should not be trusted automatically. Services that are suspected of faulty, erroneous, or malicious behaviors, or that… (more)

Subjects/Keywords: Trusted data path; Context flow control; Trust-based access control; Attribute based access control; Security and privacy; Data protection; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kong, J. (2010). Trusted data path protecting shared data in virtualized distributed systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33820

Chicago Manual of Style (16th Edition):

Kong, Jiantao. “Trusted data path protecting shared data in virtualized distributed systems.” 2010. Doctoral Dissertation, Georgia Tech. Accessed March 23, 2019. http://hdl.handle.net/1853/33820.

MLA Handbook (7th Edition):

Kong, Jiantao. “Trusted data path protecting shared data in virtualized distributed systems.” 2010. Web. 23 Mar 2019.

Vancouver:

Kong J. Trusted data path protecting shared data in virtualized distributed systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Mar 23]. Available from: http://hdl.handle.net/1853/33820.

Council of Science Editors:

Kong J. Trusted data path protecting shared data in virtualized distributed systems. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33820


University of Utah

27. Joseph, Jithu. Cenet – capability enabled networking: towards least-privileged networking.

Degree: MSin Computer Science, School of Computing, 2015, University of Utah

 In today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender… (more)

Subjects/Keywords: Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, J. (2015). Cenet – capability enabled networking: towards least-privileged networking. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409

Chicago Manual of Style (16th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Masters Thesis, University of Utah. Accessed March 23, 2019. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

MLA Handbook (7th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Web. 23 Mar 2019.

Vancouver:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Internet] [Masters thesis]. University of Utah; 2015. [cited 2019 Mar 23]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

Council of Science Editors:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Masters Thesis]. University of Utah; 2015. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409


Rochester Institute of Technology

28. Alshehri, Suhair. Toward Effective Access Control Using Attributes and Pseudoroles.

Degree: PhD, Computer Science (GCCIS), 2014, Rochester Institute of Technology

  Sharing of information is fundamental to modern computing environments across many application domains. Such information sharing, however, raises security and privacy concerns that require… (more)

Subjects/Keywords: Access control; Attribute-based access control; Fine-grained access control; Information security; Role-based security; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshehri, S. (2014). Toward Effective Access Control Using Attributes and Pseudoroles. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7938

Chicago Manual of Style (16th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Doctoral Dissertation, Rochester Institute of Technology. Accessed March 23, 2019. https://scholarworks.rit.edu/theses/7938.

MLA Handbook (7th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Web. 23 Mar 2019.

Vancouver:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2014. [cited 2019 Mar 23]. Available from: https://scholarworks.rit.edu/theses/7938.

Council of Science Editors:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Doctoral Dissertation]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/7938


Delft University of Technology

29. Spiele, P.A. Role Based Access Control Heineken Netherlands:.

Degree: 2009, Delft University of Technology

 The administration of users and their related permissions in the IT environment is a complex and expensive task. The growing number and variety of applications,… (more)

Subjects/Keywords: IAM; RBAC; Heineken; Role based access control; Identity and Access Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spiele, P. A. (2009). Role Based Access Control Heineken Netherlands:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d

Chicago Manual of Style (16th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Masters Thesis, Delft University of Technology. Accessed March 23, 2019. http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

MLA Handbook (7th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Web. 23 Mar 2019.

Vancouver:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Mar 23]. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

Council of Science Editors:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d


University of Notre Dame

30. Timothy Everett Wright. Privacy and Integrity in Collaborative, Virtual Environments</h1>.

Degree: PhD, Computer Science and Engineering, 2009, University of Notre Dame

  Collaborative, virtual environments (CVEs) leverage desktop virtual reality technologies to enable multiple, simultaneous participants to interact and work together. As immersive, multimedia-oriented systems, CVEs… (more)

Subjects/Keywords: virtual reality; access control; discretionary access; collaborative virtual environment; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wright, T. E. (2009). Privacy and Integrity in Collaborative, Virtual Environments</h1>. (Doctoral Dissertation). University of Notre Dame. Retrieved from https://curate.nd.edu/show/jq085h75x6k

Chicago Manual of Style (16th Edition):

Wright, Timothy Everett. “Privacy and Integrity in Collaborative, Virtual Environments</h1>.” 2009. Doctoral Dissertation, University of Notre Dame. Accessed March 23, 2019. https://curate.nd.edu/show/jq085h75x6k.

MLA Handbook (7th Edition):

Wright, Timothy Everett. “Privacy and Integrity in Collaborative, Virtual Environments</h1>.” 2009. Web. 23 Mar 2019.

Vancouver:

Wright TE. Privacy and Integrity in Collaborative, Virtual Environments</h1>. [Internet] [Doctoral dissertation]. University of Notre Dame; 2009. [cited 2019 Mar 23]. Available from: https://curate.nd.edu/show/jq085h75x6k.

Council of Science Editors:

Wright TE. Privacy and Integrity in Collaborative, Virtual Environments</h1>. [Doctoral Dissertation]. University of Notre Dame; 2009. Available from: https://curate.nd.edu/show/jq085h75x6k

[1] [2] [3] [4] [5] … [31]

.