Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Access Control). Showing records 1 – 30 of 1070 total matches.

[1] [2] [3] [4] [5] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rutgers University

1. Badar, Nazia, 1983-. Towards automatic configuration of access control.

Degree: PhD, Business and Science, 2016, Rutgers University

Access control provide means to implement organizational security policies to both of its physical and electronic resources. To date, several access control mechanisms, including Role… (more)

Subjects/Keywords: Computers – Access control; Computer networks – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badar, Nazia, 1. (2016). Towards automatic configuration of access control. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

Chicago Manual of Style (16th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Doctoral Dissertation, Rutgers University. Accessed March 01, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

MLA Handbook (7th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Web. 01 Mar 2021.

Vancouver:

Badar, Nazia 1. Towards automatic configuration of access control. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2021 Mar 01]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

Council of Science Editors:

Badar, Nazia 1. Towards automatic configuration of access control. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

2. Peixoto, Rafael Pinto. Traceability-based access recommendation.

Degree: 2012, Instituto Politécnico do Porto

Devido à grande quantidade de dados disponíveis na Internet, um dos maiores desafios no mundo virtual é recomendar informação aos seus utilizadores. Por outro lado,… (more)

Subjects/Keywords: Traceability; Access policy recommendation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peixoto, R. P. (2012). Traceability-based access recommendation. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Thesis, Instituto Politécnico do Porto. Accessed March 01, 2021. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Web. 01 Mar 2021.

Vancouver:

Peixoto RP. Traceability-based access recommendation. [Internet] [Thesis]. Instituto Politécnico do Porto; 2012. [cited 2021 Mar 01]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peixoto RP. Traceability-based access recommendation. [Thesis]. Instituto Politécnico do Porto; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

3. [No author]. An aspect-oriented approach towards enhancing optimistic access control with usage control .

Degree: 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07262010-142652/

Chicago Manual of Style (16th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Doctoral Dissertation, University of Pretoria. Accessed March 01, 2021. http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

MLA Handbook (7th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Web. 01 Mar 2021.

Vancouver:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2021 Mar 01]. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

Council of Science Editors:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/


University of Pretoria

4. Padayachee, Keshnee. An aspect-oriented approach towards enhancing optimistic access control with usage control.

Degree: Computer Science, 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padayachee, K. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26683

Chicago Manual of Style (16th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Doctoral Dissertation, University of Pretoria. Accessed March 01, 2021. http://hdl.handle.net/2263/26683.

MLA Handbook (7th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Web. 01 Mar 2021.

Vancouver:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/2263/26683.

Council of Science Editors:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26683

5. Kuninobu, Shigeta. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuninobu, S. (n.d.). Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 01, 2021. http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Web. 01 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

6. Nitta, Naoya. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nitta, N. (n.d.). Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 01, 2021. http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Web. 01 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Utah

7. Jana, Suman. On fast and accurate detection of unauthorized wireless access points using clock skews.

Degree: MS;, Computing (School of);, 2009, University of Utah

 We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and… (more)

Subjects/Keywords: Wireless LANs; Medium Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jana, S. (2009). On fast and accurate detection of unauthorized wireless access points using clock skews. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837

Chicago Manual of Style (16th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Masters Thesis, University of Utah. Accessed March 01, 2021. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

MLA Handbook (7th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Web. 01 Mar 2021.

Vancouver:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Internet] [Masters thesis]. University of Utah; 2009. [cited 2021 Mar 01]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

Council of Science Editors:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Masters Thesis]. University of Utah; 2009. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837


Royal Holloway, University of London

8. Farley, Naomi. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.

Degree: PhD, 2018, Royal Holloway, University of London

Access control policies specify permissible interactions between users and system resources, and are typically enforced by trusted components. Third parties (e.g. cloud servers) may not… (more)

Subjects/Keywords: Cryptography; Access Control; key management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farley, N. (2018). On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874

Chicago Manual of Style (16th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Doctoral Dissertation, Royal Holloway, University of London. Accessed March 01, 2021. https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

MLA Handbook (7th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Web. 01 Mar 2021.

Vancouver:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2018. [cited 2021 Mar 01]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

Council of Science Editors:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Doctoral Dissertation]. Royal Holloway, University of London; 2018. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874

9. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2012, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Adaptive; Control; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2012). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed March 01, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Web. 01 Mar 2021.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. [cited 2021 Mar 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Control; Frame

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2013). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed March 01, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Web. 01 Mar 2021.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2021 Mar 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

11. Wu, Zhiping. Data Structures for Fast Access Control in ECM Systems.

Degree: 2014, University of Waterloo

 While many access control models have been proposed, little work has been done on the efficiency of access control systems. Because the access control sub-system… (more)

Subjects/Keywords: Access Control; ECM System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Z. (2014). Data Structures for Fast Access Control in ECM Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Thesis, University of Waterloo. Accessed March 01, 2021. http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Web. 01 Mar 2021.

Vancouver:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

12. Von Solms, Johan Sebastiaan. MOFAC : model for fine grained access control.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made… (more)

Subjects/Keywords: Computers - Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, J. S. (2014). MOFAC : model for fine grained access control. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Thesis, University of Johannesburg. Accessed March 01, 2021. http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Web. 01 Mar 2021.

Vancouver:

Von Solms JS. MOFAC : model for fine grained access control. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms JS. MOFAC : model for fine grained access control. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

13. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed March 01, 2021. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 01 Mar 2021.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Nova

14. Pires, Mário Rui Dias. A type system for access control in an object-oriented language.

Degree: 2009, Universidade Nova

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

The need for a… (more)

Subjects/Keywords: Security; Access control; Type system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pires, M. R. D. (2009). A type system for access control in an object-oriented language. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Thesis, Universidade Nova. Accessed March 01, 2021. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Web. 01 Mar 2021.

Vancouver:

Pires MRD. A type system for access control in an object-oriented language. [Internet] [Thesis]. Universidade Nova; 2009. [cited 2021 Mar 01]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pires MRD. A type system for access control in an object-oriented language. [Thesis]. Universidade Nova; 2009. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

15. Huang, Qing. An extension to the Android access control framework.

Degree: Computer and Information Science, 2011, Linköping University

  Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are… (more)

Subjects/Keywords: Android security; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Q. (2011). An extension to the Android access control framework. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Thesis, Linköping University. Accessed March 01, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Web. 01 Mar 2021.

Vancouver:

Huang Q. An extension to the Android access control framework. [Internet] [Thesis]. Linköping University; 2011. [cited 2021 Mar 01]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Q. An extension to the Android access control framework. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

16. Steenstra, C.T. (author). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.

Degree: 2016, Delft University of Technology

The widespread adoption of computer technologies fundamentally re-shaped the way companies operate. A deluge of systems and applications now support the daily activities of employees… (more)

Subjects/Keywords: privacy; access control; authorization; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steenstra, C. T. (. (2016). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d

Chicago Manual of Style (16th Edition):

Steenstra, C T (author). “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.” 2016. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

MLA Handbook (7th Edition):

Steenstra, C T (author). “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.” 2016. Web. 01 Mar 2021.

Vancouver:

Steenstra CT(. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

Council of Science Editors:

Steenstra CT(. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d


University of Victoria

17. Habibi, Ryan. Consent based privacy for eHealth systems.

Degree: Department of Computer Science, 2018, University of Victoria

Access to Personal Health Information (PHI) is a valuable part of the modern health care model. Timely access to relevant PHI assists care providers in… (more)

Subjects/Keywords: Access Control; eHealth; Consent; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Habibi, R. (2018). Consent based privacy for eHealth systems. (Masters Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/10010

Chicago Manual of Style (16th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Masters Thesis, University of Victoria. Accessed March 01, 2021. https://dspace.library.uvic.ca//handle/1828/10010.

MLA Handbook (7th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Web. 01 Mar 2021.

Vancouver:

Habibi R. Consent based privacy for eHealth systems. [Internet] [Masters thesis]. University of Victoria; 2018. [cited 2021 Mar 01]. Available from: https://dspace.library.uvic.ca//handle/1828/10010.

Council of Science Editors:

Habibi R. Consent based privacy for eHealth systems. [Masters Thesis]. University of Victoria; 2018. Available from: https://dspace.library.uvic.ca//handle/1828/10010


University of Ontario Institute of Technology

18. Sharghigoorabi, Mohammadhassan. Access control obligation specification and enforcement using behavior pattern language.

Degree: 2018, University of Ontario Institute of Technology

 Increasing the use of Internet-based devices offers novel opportunities for users to access and share resources anywhere and anytime so that such a collaborative environment… (more)

Subjects/Keywords: Access control; Obligation; Behavior; Language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharghigoorabi, M. (2018). Access control obligation specification and enforcement using behavior pattern language. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Thesis, University of Ontario Institute of Technology. Accessed March 01, 2021. http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Web. 01 Mar 2021.

Vancouver:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

19. Krishnan, Vivek. Relating Declarative Semantics and Usability in Access Control.

Degree: 2012, University of Waterloo

 This thesis addresses the problem of usability in the context of administration of access control systems. We seek to relate the notion of declarative semantics,… (more)

Subjects/Keywords: Usability; Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnan, V. (2012). Relating Declarative Semantics and Usability in Access Control. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Thesis, University of Waterloo. Accessed March 01, 2021. http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Web. 01 Mar 2021.

Vancouver:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

20. Uzun, Emre. Formal security analysis of access control models and their spatiotemporal extensions.

Degree: PhD, Management, 2015, Rutgers University

Providing restrictive and secure access to resources is a challenging and socially important problem. Today, there exists a variety of formal security models to meet… (more)

Subjects/Keywords: Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uzun, E. (2015). Formal security analysis of access control models and their spatiotemporal extensions. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/48785/

Chicago Manual of Style (16th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Doctoral Dissertation, Rutgers University. Accessed March 01, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

MLA Handbook (7th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Web. 01 Mar 2021.

Vancouver:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2021 Mar 01]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

Council of Science Editors:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/


University of Saskatchewan

21. Monir, Samiul 1989-. A Lightweight Attribute-Based Access Control System for IoT.

Degree: 2016, University of Saskatchewan

 The evolution of the Internet of things (IoT) has made a significant impact on our daily and professional life. Home and office automation are now… (more)

Subjects/Keywords: IoT; Access Control; Security; Attribute-based Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monir, S. 1. (2016). A Lightweight Attribute-Based Access Control System for IoT. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Thesis, University of Saskatchewan. Accessed March 01, 2021. http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Web. 01 Mar 2021.

Vancouver:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Internet] [Thesis]. University of Saskatchewan; 2016. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Thesis]. University of Saskatchewan; 2016. Available from: http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Louwrens, Cecil Petrus. Single sign-on in heterogeneous computer environments.

Degree: 2012, University of Johannesburg

M.Sc.

The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO)… (more)

Subjects/Keywords: Computers - Access control.; Computers - Access control - Passwords.; Single sign-on.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). Single sign-on in heterogeneous computer environments. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Thesis, University of Johannesburg. Accessed March 01, 2021. http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Web. 01 Mar 2021.

Vancouver:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

23. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2013). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Doctoral Dissertation, Colorado State University. Accessed March 01, 2021. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Web. 01 Mar 2021.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/78814


University of North Texas

24. Narouei, Masoud. A Top-Down Policy Engineering Framework for Attribute-Based Access Control.

Degree: 2020, University of North Texas

 The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from… (more)

Subjects/Keywords: Attribute-based Access Control; Policy Engineering; Access Control Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Narouei, M. (2020). A Top-Down Policy Engineering Framework for Attribute-Based Access Control. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1703379/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Narouei, Masoud. “A Top-Down Policy Engineering Framework for Attribute-Based Access Control.” 2020. Thesis, University of North Texas. Accessed March 01, 2021. https://digital.library.unt.edu/ark:/67531/metadc1703379/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Narouei, Masoud. “A Top-Down Policy Engineering Framework for Attribute-Based Access Control.” 2020. Web. 01 Mar 2021.

Vancouver:

Narouei M. A Top-Down Policy Engineering Framework for Attribute-Based Access Control. [Internet] [Thesis]. University of North Texas; 2020. [cited 2021 Mar 01]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1703379/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Narouei M. A Top-Down Policy Engineering Framework for Attribute-Based Access Control. [Thesis]. University of North Texas; 2020. Available from: https://digital.library.unt.edu/ark:/67531/metadc1703379/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

25. Alshehri, Suhair. Toward Effective Access Control Using Attributes and Pseudoroles.

Degree: PhD, Computer Science (GCCIS), 2014, Rochester Institute of Technology

  Sharing of information is fundamental to modern computing environments across many application domains. Such information sharing, however, raises security and privacy concerns that require… (more)

Subjects/Keywords: Access control; Attribute-based access control; Fine-grained access control; Information security; Role-based security; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshehri, S. (2014). Toward Effective Access Control Using Attributes and Pseudoroles. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7938

Chicago Manual of Style (16th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Doctoral Dissertation, Rochester Institute of Technology. Accessed March 01, 2021. https://scholarworks.rit.edu/theses/7938.

MLA Handbook (7th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Web. 01 Mar 2021.

Vancouver:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2014. [cited 2021 Mar 01]. Available from: https://scholarworks.rit.edu/theses/7938.

Council of Science Editors:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Doctoral Dissertation]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/7938


University of Utah

26. Joseph, Jithu. Cenet – capability enabled networking: towards least-privileged networking.

Degree: MSin Computer Science, School of Computing, 2015, University of Utah

 In today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender… (more)

Subjects/Keywords: Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, J. (2015). Cenet – capability enabled networking: towards least-privileged networking. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409

Chicago Manual of Style (16th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Masters Thesis, University of Utah. Accessed March 01, 2021. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

MLA Handbook (7th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Web. 01 Mar 2021.

Vancouver:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Internet] [Masters thesis]. University of Utah; 2015. [cited 2021 Mar 01]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

Council of Science Editors:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Masters Thesis]. University of Utah; 2015. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409


Nelson Mandela Metropolitan University

27. Mogale, Miemie. Information security assurance model for an examination paper preparation process in a higher education institution.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2016, Nelson Mandela Metropolitan University

 In today’s business world, information has become the driving force of organizations. With organizations transmitting large amounts of information to various geographical locations, it is… (more)

Subjects/Keywords: Computer security  – Management  – Examinations; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mogale, M. (2016). Information security assurance model for an examination paper preparation process in a higher education institution. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/8509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mogale, Miemie. “Information security assurance model for an examination paper preparation process in a higher education institution.” 2016. Thesis, Nelson Mandela Metropolitan University. Accessed March 01, 2021. http://hdl.handle.net/10948/8509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mogale, Miemie. “Information security assurance model for an examination paper preparation process in a higher education institution.” 2016. Web. 01 Mar 2021.

Vancouver:

Mogale M. Information security assurance model for an examination paper preparation process in a higher education institution. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2016. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10948/8509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mogale M. Information security assurance model for an examination paper preparation process in a higher education institution. [Thesis]. Nelson Mandela Metropolitan University; 2016. Available from: http://hdl.handle.net/10948/8509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

28. Sleeper, Manya. Everyday Online Sharing.

Degree: 2016, Carnegie Mellon University

 People make a range of everyday decisions about how and whether to share content with different people, across different platforms and services, during a variety… (more)

Subjects/Keywords: usability; privacy; social networking sites; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sleeper, M. (2016). Everyday Online Sharing. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sleeper, Manya. “Everyday Online Sharing.” 2016. Thesis, Carnegie Mellon University. Accessed March 01, 2021. http://repository.cmu.edu/dissertations/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sleeper, Manya. “Everyday Online Sharing.” 2016. Web. 01 Mar 2021.

Vancouver:

Sleeper M. Everyday Online Sharing. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2021 Mar 01]. Available from: http://repository.cmu.edu/dissertations/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sleeper M. Everyday Online Sharing. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

29. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed March 01, 2021. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 01 Mar 2021.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cornell University

30. Bender, Gabriel. Reasoning About Information Disclosure In Relational Databases.

Degree: PhD, Computer Science, 2014, Cornell University

 Companies and organizations collect and use vast troves of sensitive user data whose release must be carefully controlled. In practice, the access policies that govern… (more)

Subjects/Keywords: Database Security; Access Control; Explainable Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bender, G. (2014). Reasoning About Information Disclosure In Relational Databases. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/38815

Chicago Manual of Style (16th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Doctoral Dissertation, Cornell University. Accessed March 01, 2021. http://hdl.handle.net/1813/38815.

MLA Handbook (7th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Web. 01 Mar 2021.

Vancouver:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Internet] [Doctoral dissertation]. Cornell University; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1813/38815.

Council of Science Editors:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Doctoral Dissertation]. Cornell University; 2014. Available from: http://hdl.handle.net/1813/38815

[1] [2] [3] [4] [5] … [36]

.