Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(access control). Showing records 1 – 30 of 981 total matches.

[1] [2] [3] [4] [5] … [33]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rutgers University

1. Badar, Nazia, 1983-. Towards automatic configuration of access control.

Degree: PhD, Business and Science, 2016, Rutgers University

Access control provide means to implement organizational security policies to both of its physical and electronic resources. To date, several access control mechanisms, including Role… (more)

Subjects/Keywords: Computers – Access control; Computer networks – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badar, Nazia, 1. (2016). Towards automatic configuration of access control. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

Chicago Manual of Style (16th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Doctoral Dissertation, Rutgers University. Accessed April 01, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

MLA Handbook (7th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Web. 01 Apr 2020.

Vancouver:

Badar, Nazia 1. Towards automatic configuration of access control. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2020 Apr 01]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

Council of Science Editors:

Badar, Nazia 1. Towards automatic configuration of access control. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

2. Peixoto, Rafael Pinto. Traceability-based access recommendation.

Degree: 2012, Instituto Politécnico do Porto

Devido à grande quantidade de dados disponíveis na Internet, um dos maiores desafios no mundo virtual é recomendar informação aos seus utilizadores. Por outro lado,… (more)

Subjects/Keywords: Traceability; Access policy recommendation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peixoto, R. P. (2012). Traceability-based access recommendation. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Thesis, Instituto Politécnico do Porto. Accessed April 01, 2020. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peixoto, Rafael Pinto. “Traceability-based access recommendation.” 2012. Web. 01 Apr 2020.

Vancouver:

Peixoto RP. Traceability-based access recommendation. [Internet] [Thesis]. Instituto Politécnico do Porto; 2012. [cited 2020 Apr 01]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peixoto RP. Traceability-based access recommendation. [Thesis]. Instituto Politécnico do Porto; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/2831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

3. Padayachee, Keshnee. An aspect-oriented approach towards enhancing optimistic access control with usage control.

Degree: Computer Science, 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padayachee, K. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26683

Chicago Manual of Style (16th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Doctoral Dissertation, University of Pretoria. Accessed April 01, 2020. http://hdl.handle.net/2263/26683.

MLA Handbook (7th Edition):

Padayachee, Keshnee. “An aspect-oriented approach towards enhancing optimistic access control with usage control.” 2010. Web. 01 Apr 2020.

Vancouver:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/2263/26683.

Council of Science Editors:

Padayachee K. An aspect-oriented approach towards enhancing optimistic access control with usage control. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26683


University of Pretoria

4. [No author]. An aspect-oriented approach towards enhancing optimistic access control with usage control .

Degree: 2010, University of Pretoria

 With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis… (more)

Subjects/Keywords: Aspect-oriented programming; Usage control; Access control; Optimistic access control; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). An aspect-oriented approach towards enhancing optimistic access control with usage control . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07262010-142652/

Chicago Manual of Style (16th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Doctoral Dissertation, University of Pretoria. Accessed April 01, 2020. http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

MLA Handbook (7th Edition):

author], [No. “An aspect-oriented approach towards enhancing optimistic access control with usage control .” 2010. Web. 01 Apr 2020.

Vancouver:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2020 Apr 01]. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.

Council of Science Editors:

author] [. An aspect-oriented approach towards enhancing optimistic access control with usage control . [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/


University of Utah

5. Jana, Suman. On fast and accurate detection of unauthorized wireless access points using clock skews.

Degree: MS;, Computing (School of);, 2009, University of Utah

 We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and… (more)

Subjects/Keywords: Wireless LANs; Medium Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jana, S. (2009). On fast and accurate detection of unauthorized wireless access points using clock skews. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837

Chicago Manual of Style (16th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Masters Thesis, University of Utah. Accessed April 01, 2020. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

MLA Handbook (7th Edition):

Jana, Suman. “On fast and accurate detection of unauthorized wireless access points using clock skews.” 2009. Web. 01 Apr 2020.

Vancouver:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Internet] [Masters thesis]. University of Utah; 2009. [cited 2020 Apr 01]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837.

Council of Science Editors:

Jana S. On fast and accurate detection of unauthorized wireless access points using clock skews. [Masters Thesis]. University of Utah; 2009. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1504/rec/837

6. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2012, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Adaptive; Control; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2012). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed April 01, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Web. 01 Apr 2020.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. [cited 2020 Apr 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Control; Frame

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2013). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed April 01, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2013. Web. 01 Apr 2020.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2020 Apr 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

8. Von Solms, Johan Sebastiaan. MOFAC : model for fine grained access control.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made… (more)

Subjects/Keywords: Computers - Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, J. S. (2014). MOFAC : model for fine grained access control. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Thesis, University of Johannesburg. Accessed April 01, 2020. http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Web. 01 Apr 2020.

Vancouver:

Von Solms JS. MOFAC : model for fine grained access control. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms JS. MOFAC : model for fine grained access control. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed April 01, 2020. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 01 Apr 2020.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Kuninobu, Shigeta. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuninobu, S. (n.d.). Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed April 01, 2020. http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuninobu, Shigeta. “Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ.” Web. 01 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10061/3019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kuninobu S. Security assurance methods for access control systems using static analysis : 静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究; セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/3019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

11. Nitta, Naoya. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nitta, N. (n.d.). Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed April 01, 2020. http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nitta, Naoya. “Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ.” Web. 01 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10061/2933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Nitta N. Security verification of programs with stack inspection : スタック検査機能を持つプログラムに対するセキュリティ検証; スタック ケンサ キノウ オ モツ プログラム ニ タイスル セキュリティ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Penn State University

12. Luo, Bo. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.

Degree: PhD, Information Sciences and Technology, 2008, Penn State University

 As the eXtensible Markup Language (XML) has emerged as the de facto standard for storing and exchanging information in the Internet Age, the needs for… (more)

Subjects/Keywords: XML; Information Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, B. (2008). XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8523

Chicago Manual of Style (16th Edition):

Luo, Bo. “XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.” 2008. Doctoral Dissertation, Penn State University. Accessed April 01, 2020. https://etda.libraries.psu.edu/catalog/8523.

MLA Handbook (7th Edition):

Luo, Bo. “XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES.” 2008. Web. 01 Apr 2020.

Vancouver:

Luo B. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2020 Apr 01]. Available from: https://etda.libraries.psu.edu/catalog/8523.

Council of Science Editors:

Luo B. XML ACCESS CONTROL IN NATIVE AND RDBMS-SUPPORTED XML DATABASES. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8523


University of Victoria

13. Habibi, Ryan. Consent based privacy for eHealth systems.

Degree: Department of Computer Science, 2018, University of Victoria

Access to Personal Health Information (PHI) is a valuable part of the modern health care model. Timely access to relevant PHI assists care providers in… (more)

Subjects/Keywords: Access Control; eHealth; Consent; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Habibi, R. (2018). Consent based privacy for eHealth systems. (Masters Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/10010

Chicago Manual of Style (16th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Masters Thesis, University of Victoria. Accessed April 01, 2020. https://dspace.library.uvic.ca//handle/1828/10010.

MLA Handbook (7th Edition):

Habibi, Ryan. “Consent based privacy for eHealth systems.” 2018. Web. 01 Apr 2020.

Vancouver:

Habibi R. Consent based privacy for eHealth systems. [Internet] [Masters thesis]. University of Victoria; 2018. [cited 2020 Apr 01]. Available from: https://dspace.library.uvic.ca//handle/1828/10010.

Council of Science Editors:

Habibi R. Consent based privacy for eHealth systems. [Masters Thesis]. University of Victoria; 2018. Available from: https://dspace.library.uvic.ca//handle/1828/10010


Universidade Nova

14. Pires, Mário Rui Dias. A type system for access control in an object-oriented language.

Degree: 2009, Universidade Nova

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

The need for a… (more)

Subjects/Keywords: Security; Access control; Type system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pires, M. R. D. (2009). A type system for access control in an object-oriented language. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Thesis, Universidade Nova. Accessed April 01, 2020. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Web. 01 Apr 2020.

Vancouver:

Pires MRD. A type system for access control in an object-oriented language. [Internet] [Thesis]. Universidade Nova; 2009. [cited 2020 Apr 01]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pires MRD. A type system for access control in an object-oriented language. [Thesis]. Universidade Nova; 2009. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

15. Steenstra, C.T. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.

Degree: 2016, Delft University of Technology

 The widespread adoption of computer technologies fundamentally re-shaped the way companies operate. A deluge of systems and applications now support the daily activities of employees… (more)

Subjects/Keywords: privacy; access control; authorization; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steenstra, C. T. (2016). Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d

Chicago Manual of Style (16th Edition):

Steenstra, C T. “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.” 2016. Masters Thesis, Delft University of Technology. Accessed April 01, 2020. http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

MLA Handbook (7th Edition):

Steenstra, C T. “Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:.” 2016. Web. 01 Apr 2020.

Vancouver:

Steenstra CT. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2020 Apr 01]. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d.

Council of Science Editors:

Steenstra CT. Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM:. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d


University of Waterloo

16. Wu, Zhiping. Data Structures for Fast Access Control in ECM Systems.

Degree: 2014, University of Waterloo

 While many access control models have been proposed, little work has been done on the efficiency of access control systems. Because the access control sub-system… (more)

Subjects/Keywords: Access Control; ECM System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Z. (2014). Data Structures for Fast Access Control in ECM Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Thesis, University of Waterloo. Accessed April 01, 2020. http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Zhiping. “Data Structures for Fast Access Control in ECM Systems.” 2014. Web. 01 Apr 2020.

Vancouver:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10012/8614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu Z. Data Structures for Fast Access Control in ECM Systems. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

17. Krishnan, Vivek. Relating Declarative Semantics and Usability in Access Control.

Degree: 2012, University of Waterloo

 This thesis addresses the problem of usability in the context of administration of access control systems. We seek to relate the notion of declarative semantics,… (more)

Subjects/Keywords: Usability; Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnan, V. (2012). Relating Declarative Semantics and Usability in Access Control. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Thesis, University of Waterloo. Accessed April 01, 2020. http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krishnan, Vivek. “Relating Declarative Semantics and Usability in Access Control.” 2012. Web. 01 Apr 2020.

Vancouver:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10012/6893.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krishnan V. Relating Declarative Semantics and Usability in Access Control. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6893

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

18. Uzun, Emre. Formal security analysis of access control models and their spatiotemporal extensions.

Degree: PhD, Management, 2015, Rutgers University

Providing restrictive and secure access to resources is a challenging and socially important problem. Today, there exists a variety of formal security models to meet… (more)

Subjects/Keywords: Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uzun, E. (2015). Formal security analysis of access control models and their spatiotemporal extensions. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/48785/

Chicago Manual of Style (16th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Doctoral Dissertation, Rutgers University. Accessed April 01, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

MLA Handbook (7th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Web. 01 Apr 2020.

Vancouver:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2020 Apr 01]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

Council of Science Editors:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/


Linköping University

19. Huang, Qing. An extension to the Android access control framework.

Degree: Computer and Information Science, 2011, Linköping University

  Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are… (more)

Subjects/Keywords: Android security; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Q. (2011). An extension to the Android access control framework. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Thesis, Linköping University. Accessed April 01, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Qing. “An extension to the Android access control framework.” 2011. Web. 01 Apr 2020.

Vancouver:

Huang Q. An extension to the Android access control framework. [Internet] [Thesis]. Linköping University; 2011. [cited 2020 Apr 01]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Q. An extension to the Android access control framework. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Holloway, University of London

20. Farley, Naomi. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.

Degree: PhD, 2018, Royal Holloway, University of London

Access control policies specify permissible interactions between users and system resources, and are typically enforced by trusted components. Third parties (e.g. cloud servers) may not… (more)

Subjects/Keywords: Cryptography; Access Control; key management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farley, N. (2018). On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874

Chicago Manual of Style (16th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Doctoral Dissertation, Royal Holloway, University of London. Accessed April 01, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

MLA Handbook (7th Edition):

Farley, Naomi. “On key assignment schemes and cryptographic enforcement mechanisms for information flow policies.” 2018. Web. 01 Apr 2020.

Vancouver:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2018. [cited 2020 Apr 01]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874.

Council of Science Editors:

Farley N. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. [Doctoral Dissertation]. Royal Holloway, University of London; 2018. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/on-key-assignment-schemes-and-cryptographic-enforcement-mechanisms-for-information-flow-policies(9d010b23-5cd4-472b-bebc-dbf05cd0eb57).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792874


University of Ontario Institute of Technology

21. Sharghigoorabi, Mohammadhassan. Access control obligation specification and enforcement using behavior pattern language.

Degree: 2018, University of Ontario Institute of Technology

 Increasing the use of Internet-based devices offers novel opportunities for users to access and share resources anywhere and anytime so that such a collaborative environment… (more)

Subjects/Keywords: Access control; Obligation; Behavior; Language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharghigoorabi, M. (2018). Access control obligation specification and enforcement using behavior pattern language. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Thesis, University of Ontario Institute of Technology. Accessed April 01, 2020. http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharghigoorabi, Mohammadhassan. “Access control obligation specification and enforcement using behavior pattern language.” 2018. Web. 01 Apr 2020.

Vancouver:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10155/908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharghigoorabi M. Access control obligation specification and enforcement using behavior pattern language. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Louwrens, Cecil Petrus. Single sign-on in heterogeneous computer environments.

Degree: 2012, University of Johannesburg

M.Sc.

The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO)… (more)

Subjects/Keywords: Computers - Access control.; Computers - Access control - Passwords.; Single sign-on.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). Single sign-on in heterogeneous computer environments. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Thesis, University of Johannesburg. Accessed April 01, 2020. http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Web. 01 Apr 2020.

Vancouver:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Saskatchewan

23. Monir, Samiul 1989-. A Lightweight Attribute-Based Access Control System for IoT.

Degree: 2016, University of Saskatchewan

 The evolution of the Internet of things (IoT) has made a significant impact on our daily and professional life. Home and office automation are now… (more)

Subjects/Keywords: IoT; Access Control; Security; Attribute-based Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monir, S. 1. (2016). A Lightweight Attribute-Based Access Control System for IoT. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Thesis, University of Saskatchewan. Accessed April 01, 2020. http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monir, Samiul 1989-. “A Lightweight Attribute-Based Access Control System for IoT.” 2016. Web. 01 Apr 2020.

Vancouver:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Internet] [Thesis]. University of Saskatchewan; 2016. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10388/7556.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monir S1. A Lightweight Attribute-Based Access Control System for IoT. [Thesis]. University of Saskatchewan; 2016. Available from: http://hdl.handle.net/10388/7556

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Utah

24. Joseph, Jithu. Cenet – capability enabled networking: towards least-privileged networking.

Degree: MSin Computer Science, School of Computing, 2015, University of Utah

 In today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender… (more)

Subjects/Keywords: Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, J. (2015). Cenet – capability enabled networking: towards least-privileged networking. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409

Chicago Manual of Style (16th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Masters Thesis, University of Utah. Accessed April 01, 2020. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

MLA Handbook (7th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Web. 01 Apr 2020.

Vancouver:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Internet] [Masters thesis]. University of Utah; 2015. [cited 2020 Apr 01]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

Council of Science Editors:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Masters Thesis]. University of Utah; 2015. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409


Rochester Institute of Technology

25. Alshehri, Suhair. Toward Effective Access Control Using Attributes and Pseudoroles.

Degree: PhD, Computer Science (GCCIS), 2014, Rochester Institute of Technology

  Sharing of information is fundamental to modern computing environments across many application domains. Such information sharing, however, raises security and privacy concerns that require… (more)

Subjects/Keywords: Access control; Attribute-based access control; Fine-grained access control; Information security; Role-based security; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshehri, S. (2014). Toward Effective Access Control Using Attributes and Pseudoroles. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7938

Chicago Manual of Style (16th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Doctoral Dissertation, Rochester Institute of Technology. Accessed April 01, 2020. https://scholarworks.rit.edu/theses/7938.

MLA Handbook (7th Edition):

Alshehri, Suhair. “Toward Effective Access Control Using Attributes and Pseudoroles.” 2014. Web. 01 Apr 2020.

Vancouver:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2014. [cited 2020 Apr 01]. Available from: https://scholarworks.rit.edu/theses/7938.

Council of Science Editors:

Alshehri S. Toward Effective Access Control Using Attributes and Pseudoroles. [Doctoral Dissertation]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/7938


University of Notre Dame

26. Timothy Everett Wright. Privacy and Integrity in Collaborative, Virtual Environments</h1>.

Degree: PhD, Computer Science and Engineering, 2009, University of Notre Dame

  Collaborative, virtual environments (CVEs) leverage desktop virtual reality technologies to enable multiple, simultaneous participants to interact and work together. As immersive, multimedia-oriented systems, CVEs… (more)

Subjects/Keywords: virtual reality; access control; discretionary access; collaborative virtual environment; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wright, T. E. (2009). Privacy and Integrity in Collaborative, Virtual Environments</h1>. (Doctoral Dissertation). University of Notre Dame. Retrieved from https://curate.nd.edu/show/jq085h75x6k

Chicago Manual of Style (16th Edition):

Wright, Timothy Everett. “Privacy and Integrity in Collaborative, Virtual Environments</h1>.” 2009. Doctoral Dissertation, University of Notre Dame. Accessed April 01, 2020. https://curate.nd.edu/show/jq085h75x6k.

MLA Handbook (7th Edition):

Wright, Timothy Everett. “Privacy and Integrity in Collaborative, Virtual Environments</h1>.” 2009. Web. 01 Apr 2020.

Vancouver:

Wright TE. Privacy and Integrity in Collaborative, Virtual Environments</h1>. [Internet] [Doctoral dissertation]. University of Notre Dame; 2009. [cited 2020 Apr 01]. Available from: https://curate.nd.edu/show/jq085h75x6k.

Council of Science Editors:

Wright TE. Privacy and Integrity in Collaborative, Virtual Environments</h1>. [Doctoral Dissertation]. University of Notre Dame; 2009. Available from: https://curate.nd.edu/show/jq085h75x6k


Delft University of Technology

27. Spiele, P.A. Role Based Access Control Heineken Netherlands:.

Degree: 2009, Delft University of Technology

 The administration of users and their related permissions in the IT environment is a complex and expensive task. The growing number and variety of applications,… (more)

Subjects/Keywords: IAM; RBAC; Heineken; Role based access control; Identity and Access Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spiele, P. A. (2009). Role Based Access Control Heineken Netherlands:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d

Chicago Manual of Style (16th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Masters Thesis, Delft University of Technology. Accessed April 01, 2020. http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

MLA Handbook (7th Edition):

Spiele, P A. “Role Based Access Control Heineken Netherlands:.” 2009. Web. 01 Apr 2020.

Vancouver:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2020 Apr 01]. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

Council of Science Editors:

Spiele PA. Role Based Access Control Heineken Netherlands:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d


Nelson Mandela Metropolitan University

28. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed April 01, 2020. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 01 Apr 2020.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan Technological University

29. Hu, Lihui. A FIREWALL MODEL OF FILE SYSTEM SECURITY.

Degree: PhD, Department of Computer Science, 2014, Michigan Technological University

  File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of… (more)

Subjects/Keywords: Access control; File system; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, L. (2014). A FIREWALL MODEL OF FILE SYSTEM SECURITY. (Doctoral Dissertation). Michigan Technological University. Retrieved from http://digitalcommons.mtu.edu/etds/786

Chicago Manual of Style (16th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Doctoral Dissertation, Michigan Technological University. Accessed April 01, 2020. http://digitalcommons.mtu.edu/etds/786.

MLA Handbook (7th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Web. 01 Apr 2020.

Vancouver:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Internet] [Doctoral dissertation]. Michigan Technological University; 2014. [cited 2020 Apr 01]. Available from: http://digitalcommons.mtu.edu/etds/786.

Council of Science Editors:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Doctoral Dissertation]. Michigan Technological University; 2014. Available from: http://digitalcommons.mtu.edu/etds/786


Nelson Mandela Metropolitan University

30. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 01, 2020. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 01 Apr 2020.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2020 Apr 01]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507

[1] [2] [3] [4] [5] … [33]

.