Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Access control). Showing records 1 – 30 of 1052 total matches.

[1] [2] [3] [4] [5] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rutgers University

1. Badar, Nazia, 1983-. Towards automatic configuration of access control.

Degree: PhD, Business and Science, 2016, Rutgers University

Access control provide means to implement organizational security policies to both of its physical and electronic resources. To date, several access control mechanisms, including Role… (more)

Subjects/Keywords: Computers – Access control; Computer networks – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badar, Nazia, 1. (2016). Towards automatic configuration of access control. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

Chicago Manual of Style (16th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Doctoral Dissertation, Rutgers University. Accessed September 23, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

MLA Handbook (7th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Web. 23 Sep 2020.

Vancouver:

Badar, Nazia 1. Towards automatic configuration of access control. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2020 Sep 23]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

Council of Science Editors:

Badar, Nazia 1. Towards automatic configuration of access control. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

2. Peixoto, Rafael Pinto. Traceability-based access recommendation.

Degree: 2012, Instituto Politécnico do Porto

Devido à grande quantidade de dados disponíveis na Internet, um dos maiores desafios no mundo virtual é recomendar informação aos seus utilizadores. Por outro lado,… (more)

Subjects/Keywords: Traceability; Access policy recommendation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peixoto, R. P. (2012). Traceability-based access recommendation. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Thesis, Instituto Politécnico do Porto. Accessed September 23, 2020. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Web. 23 Sep 2020.

Vancouver:

Peixoto RP. Traceability-based access recommendation. [Internet] [Thesis]. Instituto Politécnico do Porto; 2012. [cited 2020 Sep 23]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peixoto RP. Traceability-based access recommendation. [Thesis]. Instituto Politécnico do Porto; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

3. Padayachee, Keshnee. An aspect-oriented approach towards enhancing optimistic access control with usage control.

Degree: Computer Science, 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padayachee, K. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26683

Chicago Manual of Style (16th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Doctoral Dissertation, University of Pretoria. Accessed September 23, 2020. http://hdl.handle.net/2263/26683.

MLA Handbook (7th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Web. 23 Sep 2020.

Vancouver:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/2263/26683.

Council of Science Editors:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26683


University of Pretoria

4. [No author]. An aspect-oriented approach towards enhancing optimistic access control with usage control .

Degree: 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07262010-142652/

Chicago Manual of Style (16th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Doctoral Dissertation, University of Pretoria. Accessed September 23, 2020. http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

MLA Handbook (7th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Web. 23 Sep 2020.

Vancouver:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2020 Sep 23]. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

Council of Science Editors:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/


University of Utah

5. Jana, Suman. On fast and accurate detection of unauthorized wireless access points using clock skews.

Degree: MS;, Computing (School of);, 2009, University of Utah

 We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and… (more)

Subjects/Keywords: Wireless LANs; Medium Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jana, S. (2009). On fast and accurate detection of unauthorized wireless access points using clock skews. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837

Chicago Manual of Style (16th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Masters Thesis, University of Utah. Accessed September 23, 2020. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

MLA Handbook (7th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Web. 23 Sep 2020.

Vancouver:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Internet] [Masters thesis]. University of Utah; 2009. [cited 2020 Sep 23]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

Council of Science Editors:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Masters Thesis]. University of Utah; 2009. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837


Royal Holloway, University of London

6. Farley, Naomi. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.

Degree: PhD, 2018, Royal Holloway, University of London

Access control policies specify permissible interactions between users and system resources, and are typically enforced by trusted components. Third parties (e.g. cloud servers) may not… (more)

Subjects/Keywords: Cryptography; Access Control; key management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farley, N. (2018). On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874

Chicago Manual of Style (16th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Doctoral Dissertation, Royal Holloway, University of London. Accessed September 23, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

MLA Handbook (7th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Web. 23 Sep 2020.

Vancouver:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2018. [cited 2020 Sep 23]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

Council of Science Editors:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Doctoral Dissertation]. Royal Holloway, University of London; 2018. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874

7. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2012, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Adaptive; Control; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2012). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed September 23, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Web. 23 Sep 2020.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. [cited 2020 Sep 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Control; Frame

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2013). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed September 23, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Web. 23 Sep 2020.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2020 Sep 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

9. Wu, Zhiping. Data Structures for Fast Access Control in ECM Systems.

Degree: 2014, University of Waterloo

 While many access control models have been proposed, little work has been done on the efficiency of access control systems. Because the access control sub-system… (more)

Subjects/Keywords: Access Control; ECM System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Z. (2014). Data Structures for Fast Access Control in ECM Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Thesis, University of Waterloo. Accessed September 23, 2020. http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Web. 23 Sep 2020.

Vancouver:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

10. Von Solms, Johan Sebastiaan. MOFAC : model for fine grained access control.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made… (more)

Subjects/Keywords: Computers - Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, J. S. (2014). MOFAC : model for fine grained access control. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Thesis, University of Johannesburg. Accessed September 23, 2020. http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Web. 23 Sep 2020.

Vancouver:

Von Solms JS. MOFAC : model for fine grained access control. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms JS. MOFAC : model for fine grained access control. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

11. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed September 23, 2020. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 23 Sep 2020.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Kuninobu, Shigeta. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuninobu, S. (n.d.). Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed September 23, 2020. http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Web. 23 Sep 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

13. Nitta, Naoya. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nitta, N. (n.d.). Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed September 23, 2020. http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Web. 23 Sep 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Universidade Nova

14. Pires, Mário Rui Dias. A type system for access control in an object-oriented language.

Degree: 2009, Universidade Nova

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

The need for a… (more)

Subjects/Keywords: Security; Access control; Type system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pires, M. R. D. (2009). A type system for access control in an object-oriented language. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Thesis, Universidade Nova. Accessed September 23, 2020. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Web. 23 Sep 2020.

Vancouver:

Pires MRD. A type system for access control in an object-oriented language. [Internet] [Thesis]. Universidade Nova; 2009. [cited 2020 Sep 23]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pires MRD. A type system for access control in an object-oriented language. [Thesis]. Universidade Nova; 2009. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

15. Uzun, Emre. Formal security analysis of access control models and their spatiotemporal extensions.

Degree: PhD, Management, 2015, Rutgers University

Providing restrictive and secure access to resources is a challenging and socially important problem. Today, there exists a variety of formal security models to meet… (more)

Subjects/Keywords: Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uzun, E. (2015). Formal security analysis of access control models and their spatiotemporal extensions. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/48785/

Chicago Manual of Style (16th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Doctoral Dissertation, Rutgers University. Accessed September 23, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

MLA Handbook (7th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Web. 23 Sep 2020.

Vancouver:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2020 Sep 23]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

Council of Science Editors:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/


Linköping University

16. Huang, Qing. An extension to the Android access control framework.

Degree: Computer and Information Science, 2011, Linköping University

  Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are… (more)

Subjects/Keywords: Android security; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Q. (2011). An extension to the Android access control framework. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Thesis, Linköping University. Accessed September 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Web. 23 Sep 2020.

Vancouver:

Huang Q. An extension to the Android access control framework. [Internet] [Thesis]. Linköping University; 2011. [cited 2020 Sep 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Q. An extension to the Android access control framework. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

17. Steenstra, C.T. (author). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.

Degree: 2016, Delft University of Technology

The widespread adoption of computer technologies fundamentally re-shaped the way companies operate. A deluge of systems and applications now support the daily activities of employees… (more)

Subjects/Keywords: privacy; access control; authorization; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steenstra, C. T. (. (2016). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d

Chicago Manual of Style (16th Edition):

Steenstra, C T (author). “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.” 2016. Masters Thesis, Delft University of Technology. Accessed September 23, 2020. http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

MLA Handbook (7th Edition):

Steenstra, C T (author). “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM.” 2016. Web. 23 Sep 2020.

Vancouver:

Steenstra CT(. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2020 Sep 23]. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

Council of Science Editors:

Steenstra CT(. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d


University of Victoria

18. Habibi, Ryan. Consent based privacy for eHealth systems.

Degree: Department of Computer Science, 2018, University of Victoria

Access to Personal Health Information (PHI) is a valuable part of the modern health care model. Timely access to relevant PHI assists care providers in… (more)

Subjects/Keywords: Access Control; eHealth; Consent; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Habibi, R. (2018). Consent based privacy for eHealth systems. (Masters Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/10010

Chicago Manual of Style (16th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Masters Thesis, University of Victoria. Accessed September 23, 2020. https://dspace.library.uvic.ca//handle/1828/10010.

MLA Handbook (7th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Web. 23 Sep 2020.

Vancouver:

Habibi R. Consent based privacy for eHealth systems. [Internet] [Masters thesis]. University of Victoria; 2018. [cited 2020 Sep 23]. Available from: https://dspace.library.uvic.ca//handle/1828/10010.

Council of Science Editors:

Habibi R. Consent based privacy for eHealth systems. [Masters Thesis]. University of Victoria; 2018. Available from: https://dspace.library.uvic.ca//handle/1828/10010


University of Ontario Institute of Technology

19. Sharghigoorabi, Mohammadhassan. Access control obligation specification and enforcement using behavior pattern language.

Degree: 2018, University of Ontario Institute of Technology

 Increasing the use of Internet-based devices offers novel opportunities for users to access and share resources anywhere and anytime so that such a collaborative environment… (more)

Subjects/Keywords: Access control; Obligation; Behavior; Language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharghigoorabi, M. (2018). Access control obligation specification and enforcement using behavior pattern language. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Thesis, University of Ontario Institute of Technology. Accessed September 23, 2020. http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Web. 23 Sep 2020.

Vancouver:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

20. Krishnan, Vivek. Relating Declarative Semantics and Usability in Access Control.

Degree: 2012, University of Waterloo

 This thesis addresses the problem of usability in the context of administration of access control systems. We seek to relate the notion of declarative semantics,… (more)

Subjects/Keywords: Usability; Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnan, V. (2012). Relating Declarative Semantics and Usability in Access Control. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Thesis, University of Waterloo. Accessed September 23, 2020. http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Web. 23 Sep 2020.

Vancouver:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Saskatchewan

21. Monir, Samiul 1989-. A Lightweight Attribute-Based Access Control System for IoT.

Degree: 2016, University of Saskatchewan

 The evolution of the Internet of things (IoT) has made a significant impact on our daily and professional life. Home and office automation are now… (more)

Subjects/Keywords: IoT; Access Control; Security; Attribute-based Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monir, S. 1. (2016). A Lightweight Attribute-Based Access Control System for IoT. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Thesis, University of Saskatchewan. Accessed September 23, 2020. http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Web. 23 Sep 2020.

Vancouver:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Internet] [Thesis]. University of Saskatchewan; 2016. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Thesis]. University of Saskatchewan; 2016. Available from: http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

22. Narouei, Masoud. A Top-Down Policy Engineering Framework for Attribute-Based Access Control.

Degree: 2020, University of North Texas

 The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from… (more)

Subjects/Keywords: Attribute-based Access Control; Policy Engineering; Access Control Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Narouei, M. (2020). A Top-Down Policy Engineering Framework for Attribute-Based Access Control. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1703379/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Narouei, Masoud. “A Top-Down Policy Engineering Framework for Attribute-Based Access Control.” 2020. Thesis, University of North Texas. Accessed September 23, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703379/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Narouei, Masoud. “A Top-Down Policy Engineering Framework for Attribute-Based Access Control.” 2020. Web. 23 Sep 2020.

Vancouver:

Narouei M. A Top-Down Policy Engineering Framework for Attribute-Based Access Control. [Internet] [Thesis]. University of North Texas; 2020. [cited 2020 Sep 23]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1703379/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Narouei M. A Top-Down Policy Engineering Framework for Attribute-Based Access Control. [Thesis]. University of North Texas; 2020. Available from: https://digital.library.unt.edu/ark:/67531/metadc1703379/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

23. Louwrens, Cecil Petrus. Single sign-on in heterogeneous computer environments.

Degree: 2012, University of Johannesburg

M.Sc.

The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO)… (more)

Subjects/Keywords: Computers - Access control.; Computers - Access control - Passwords.; Single sign-on.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). Single sign-on in heterogeneous computer environments. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Thesis, University of Johannesburg. Accessed September 23, 2020. http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Web. 23 Sep 2020.

Vancouver:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

24. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2013). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Doctoral Dissertation, Colorado State University. Accessed September 23, 2020. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Web. 23 Sep 2020.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/78814


University of Utah

25. Joseph, Jithu. Cenet – capability enabled networking: towards least-privileged networking.

Degree: MSin Computer Science, School of Computing, 2015, University of Utah

 In today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender… (more)

Subjects/Keywords: Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, J. (2015). Cenet – capability enabled networking: towards least-privileged networking. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409

Chicago Manual of Style (16th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Masters Thesis, University of Utah. Accessed September 23, 2020. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

MLA Handbook (7th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Web. 23 Sep 2020.

Vancouver:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Internet] [Masters thesis]. University of Utah; 2015. [cited 2020 Sep 23]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

Council of Science Editors:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Masters Thesis]. University of Utah; 2015. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409


Rochester Institute of Technology

26. Alshehri, Suhair. Toward Effective Access Control Using Attributes and Pseudoroles.

Degree: PhD, Computer Science (GCCIS), 2014, Rochester Institute of Technology

  Sharing of information is fundamental to modern computing environments across many application domains. Such information sharing, however, raises security and privacy concerns that require… (more)

Subjects/Keywords: Access control; Attribute-based access control; Fine-grained access control; Information security; Role-based security; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshehri, S. (2014). Toward Effective Access Control Using Attributes and Pseudoroles. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7938

Chicago Manual of Style (16th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Doctoral Dissertation, Rochester Institute of Technology. Accessed September 23, 2020. https://scholarworks.rit.edu/theses/7938.

MLA Handbook (7th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Web. 23 Sep 2020.

Vancouver:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2014. [cited 2020 Sep 23]. Available from: https://scholarworks.rit.edu/theses/7938.

Council of Science Editors:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Doctoral Dissertation]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/7938


Carnegie Mellon University

27. Sleeper, Manya. Everyday Online Sharing.

Degree: 2016, Carnegie Mellon University

 People make a range of everyday decisions about how and whether to share content with different people, across different platforms and services, during a variety… (more)

Subjects/Keywords: usability; privacy; social networking sites; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sleeper, M. (2016). Everyday Online Sharing. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sleeper, Manya. “Everyday Online Sharing.” 2016. Thesis, Carnegie Mellon University. Accessed September 23, 2020. http://repository.cmu.edu/dissertations/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sleeper, Manya. “Everyday Online Sharing.” 2016. Web. 23 Sep 2020.

Vancouver:

Sleeper M. Everyday Online Sharing. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2020 Sep 23]. Available from: http://repository.cmu.edu/dissertations/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sleeper M. Everyday Online Sharing. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

28. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed September 23, 2020. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 23 Sep 2020.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan Technological University

29. Hu, Lihui. A FIREWALL MODEL OF FILE SYSTEM SECURITY.

Degree: PhD, Department of Computer Science, 2014, Michigan Technological University

  File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of… (more)

Subjects/Keywords: Access control; File system; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, L. (2014). A FIREWALL MODEL OF FILE SYSTEM SECURITY. (Doctoral Dissertation). Michigan Technological University. Retrieved from http://digitalcommons.mtu.edu/etds/786

Chicago Manual of Style (16th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Doctoral Dissertation, Michigan Technological University. Accessed September 23, 2020. http://digitalcommons.mtu.edu/etds/786.

MLA Handbook (7th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Web. 23 Sep 2020.

Vancouver:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Internet] [Doctoral dissertation]. Michigan Technological University; 2014. [cited 2020 Sep 23]. Available from: http://digitalcommons.mtu.edu/etds/786.

Council of Science Editors:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Doctoral Dissertation]. Michigan Technological University; 2014. Available from: http://digitalcommons.mtu.edu/etds/786


Cornell University

30. Bender, Gabriel. Reasoning About Information Disclosure In Relational Databases.

Degree: PhD, Computer Science, 2014, Cornell University

 Companies and organizations collect and use vast troves of sensitive user data whose release must be carefully controlled. In practice, the access policies that govern… (more)

Subjects/Keywords: Database Security; Access Control; Explainable Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bender, G. (2014). Reasoning About Information Disclosure In Relational Databases. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/38815

Chicago Manual of Style (16th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Doctoral Dissertation, Cornell University. Accessed September 23, 2020. http://hdl.handle.net/1813/38815.

MLA Handbook (7th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Web. 23 Sep 2020.

Vancouver:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Internet] [Doctoral dissertation]. Cornell University; 2014. [cited 2020 Sep 23]. Available from: http://hdl.handle.net/1813/38815.

Council of Science Editors:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Doctoral Dissertation]. Cornell University; 2014. Available from: http://hdl.handle.net/1813/38815

[1] [2] [3] [4] [5] … [36]

.